MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 7401-7410 Newer>
InternetNews
March 2, 2009
Richard Adhikari
Sikorsky, Feds Hunting Down Marine One Leak Classified data on the presidential helicopter fleet crops up on a computer in Iran - and officials are hurrying to find out how. mark for My Articles 20 similar articles
InternetNews
March 2, 2009
Richard Adhikari
Here Come New Virtualization Tools Enterprises that are virtualizing their environments can include their virtual machines in disaster recovery and backup plans. mark for My Articles 662 similar articles
InternetNews
March 2, 2009
Richard Adhikari
ID Theft Threat Grows With 1M Already Hit in '09 A new report shows identify theft is off to a rapid start this year - and the figures could be even worse than expected. mark for My Articles 408 similar articles
CFO
March 1, 2009
Bob Violino
As the Economy Sinks, Data Breaches Rise Many companies still fail to address rudimentary security issues. Despite budget pressures, they can't afford to ignore them much longer. mark for My Articles 91 similar articles
CIO
February 27, 2009
Jarina D'Auria
Automation Can Save You Time and Money How Brookdale Senior Living benefited by automating its employee identity management systems mark for My Articles 4 similar articles
CIO
February 27, 2009
Rick Swanborg
Mitre's Knowledge Management Journey Internal sponsorship and experimentation key to company's KM success mark for My Articles 8 similar articles
CIO
February 27, 2009
Best Buy's CIO Bob Willett Offers His Crisis Agenda Advice Best Buy's CIO Bob Willett advises targeting customers, growth, housekeeping and communication mark for My Articles 541 similar articles
CIO
February 27, 2009
Diane Frank
Sounding Board: Global Sourcing Management Global sourcing is becoming standard operating procedure for many companies. That's why you need to do a better job of vendor management. mark for My Articles 124 similar articles
InternetNews
February 26, 2009
Richard Adhikari
Adobe Patches Flash, But Expect More Problems Adobe's Flash application is great for creating and watching rich multimedia applications, but it's one of the applications security researchers fear most because it is highly vulnerable to hackers. mark for My Articles 572 similar articles
InternetNews
February 26, 2009
Richard Adhikari
Obama Proposes Millions for Cybersecurity Security experts are praising the new administration's increased spending on national network security efforts. mark for My Articles 203 similar articles
<Older 7401-7410 Newer>    Return to current articles.