MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 6941-6950 Newer>
InternetNews
October 13, 2008
Richard Adhikari
Security Spending to Grow, Will Differ by Region Not all companies in the country have the same security needs or emphases. mark for My Articles 3 similar articles
InternetNews
October 10, 2008
Andy Patrizio
Datacenter Dollars Seen as Steady Spend You might not be traveling as much but you'll be greener than Ireland on St. Paddy's Day. mark for My Articles 50 similar articles
CIO
September 24, 2008
Michael Fitzgerald
How to Overcome the Obstacles to Mobile Enterprise Apps There's help, and some tools, for IT departments challenged with taking enterprise departments wireless mark for My Articles 23 similar articles
CIO
September 24, 2008
Diane Frank
So You've Inherited a Crummy Outsourcing Contract... CIOs share tips for fixing problem relationships. mark for My Articles 635 similar articles
CIO
October 10, 2008
Diane Frank
How to Renegotiate an Outsourcing Contract CIO tips for getting what you want from the vendor. mark for My Articles 528 similar articles
InternetNews
October 10, 2008
Sean Michael Kerner
Apple Updates to Fix Open Source Security Issues Latest Apple security fix list tackles at least 15 flaws that could leave Mac users at risk. mark for My Articles 1099 similar articles
InternetNews
October 10, 2008
Richard Adhikari
Alert Victim Helped Shell Nab Alleged Data Thief A call to the Texas Workforce Commission by a Shell Oil employee whose Social Security number had been stolen kicked off an investigation that led to the discovery of the alleged thief. mark for My Articles 195 similar articles
InternetNews
October 9, 2008
Judy Mottl
Employees Like Mobility Despite Extra Work Hours Which would you rather lose, your car or Internet access? mark for My Articles 10 similar articles
InternetNews
October 9, 2008
Sean Michael Kerner
No/Low/High-Tech Hacking: It All Matters Don't point the finger at hackers for all security woes. Point hacker tools at yourself to see what's wrong with your stuff, instead. mark for My Articles 61 similar articles
InternetNews
October 8, 2008
Sean Michael Kerner
Metasploit 3.2 Offers More 'Evil Deeds' Hacking into systems (albeit for testing purposes) is apparently getting easier with the upcoming open source Metasploit 3.2 framework, according to its creator. mark for My Articles 32 similar articles
<Older 6941-6950 Newer>    Return to current articles.