MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 6761-6770 Newer>
CIO
August 8, 2008
Thomas Wailgum
Free Wi-Fi: Should Retailers Offer It to Customers? Customers now expect complimentary Wi-Fi Hotspot connectivity, but many businesses such as Starbucks, McDonald's, Borders and Panera Bread are taking varied approaches to offering up and paying for Wi-Fi service. mark for My Articles 466 similar articles
Bank Systems & Technology
August 4, 2008
Orla O'Sullivan
RFID Technology Comes of Age as Price is Right for Banks For assets tracking, radio tags are much easier and quicker to use than bar coding. mark for My Articles 363 similar articles
Popular Mechanics
August 6, 2008
David Barron
Olympic Video Feed-ing Frenzy Shows Bandwidth Weakness IT departments at some U.S. companies could face network-straining levels of traffic as employees tune into video feeds from NBC. mark for My Articles 33 similar articles
Global Services
August 5, 2008
Namita Goel
Sourcing Catalysts The downturn has supposedly worked well for the vendor-management tools providers as companies are increasingly opting for these performance-management and monitoring tools to manage complex multilevel and multivendor outsourcing relationships mark for My Articles 80 similar articles
Bank Systems & Technology
July 29, 2008
Carl Frappaolo
E-Mail Fraud Comes in Many Shapes The challenge laid before today's organizations is to develop and document a policy regarding the use of e-mail. The policy should then be enforced through the use of a host of content security technologies. mark for My Articles 185 similar articles
Bank Systems & Technology
July 29, 2008
Alan Pelz-Sharpe
The Truth Is, E-Mail Security Can Never Be 100 Percent Effective Before we get paranoid about stopping malicious e-mails from the outside, we need to remember that the most damage often is caused by those we employ and who have full and secure access to our systems. mark for My Articles 35 similar articles
Bank Systems & Technology
July 29, 2008
Kieron Dowling
The E-Mail Archive Can Also Serve as a Security Solution Implementing an e-mail archiving solution will enable companies to detect security breaches by implementing rules and policies that will check each e-mail being sent and flag potential violations. mark for My Articles 99 similar articles
Bank Systems & Technology
July 23, 2008
Anne Rawland Gabriel
American National Bank Thwarts ID Thieves A routine information security assessment triggered an ID theft prevention overhaul at American National Bank. mark for My Articles 65 similar articles
Financial Advisor
August 2008
Gail Liberman
Turmoil Brings New Business Independent advisors are signing up new clients who are uneasy about the stock market and unhappy with their money managers. mark for My Articles 274 similar articles
Financial Advisor
August 2008
Joel Bruckenstein
The Other Side Of The Ledger Financial Crossing helps manage client liabilities. mark for My Articles 1838 similar articles
<Older 6761-6770 Newer>    Return to current articles.