| Old Articles: <Older 8981-8990 Newer> |
 |
Bank Technology News May 2010 Jim Schlegel |
US: To EMV Or Not? The promise of EMV is a borderless credit and debit card payment system that stops fraud early in its tracks at point of sale.  |
CIO April 28, 2010 Elizabeth Heichler |
How BP Manages Its Enterprise Architecture BP pilots a new assessment framework designed to drive business value from its enterprise architecture.  |
InternetNews April 28, 2010 |
Data Breaches Dent U.S. Corporate Coffers Regulations requiring U.S. companies to notify customers when their data has been compromised is taking its toll on corporate bottom lines.  |
InternetNews April 28, 2010 |
Microsoft Warns Infected PCs on the Rise Microsoft's latest Security Intelligence Report found that the number of infected PCs rose by 1.7 million in the second half of 2009, but improved monitoring is helping flag and clean the corrupted systems.  |
InternetNews April 28, 2010 |
Application Delivery Meets Virtualization A panel of experts mulls virtualizing Application Delivery Controllers. Does the idea make sense?  |
InternetNews April 28, 2010 |
Obama Tech Chiefs Post Agencies' e-Gov Ratings Federal CTO Chopra and CIO Kundra post score card evaluating agencies' open government plans as a pair of studies surface describing increasing citizen engagement with government online.  |
InternetNews April 27, 2010 |
HP Shares Lessons in Data Center Consolidation How much of a payoff can enterprises expect from consolidating their servers and data centers? HP executives speaking at Interop share their experience in data center downsizing.  |
InternetNews April 27, 2010 |
Microsoft Forecasts SMB Spending Surge in 2010 A new survey canvassing Microsoft's Small Business Specialist partner in five IT markets has found reason for optimism amid sluggish economic recovery.  |
InternetNews April 27, 2010 |
McAfee Makes Amends For Embarrassing Gaffe McAfee is offering to reimburse customers who had to go into their own pockets to resolve a false positive that wreaked havoc on users' systems.  |
InternetNews April 27, 2010 |
Passwords Should Be Last Line of Defense Longer passwords with numbers and capitalizations may make life a bit more difficult for identity thieves, but the truth is the relative strength or weakness of users' passwords should be beside the point.  |
| <Older 8981-8990 Newer> Return to current articles. |