MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 9841-9850 Newer>
InternetNews
January 14, 2011
Security Lags Behind Enterprise Advances New survey of top enterprises finds most have been hit data breaches that could have been prevented if security apps, policies had been updated. mark for My Articles 358 similar articles
InternetNews
January 14, 2011
Rise of Mobile Apps to Challenge IT Bosses IT managers are looking to deploy an ever-expanding array of mobile apps in the enterprise in 2011, but with that new focus also come management challenges. mark for My Articles 136 similar articles
BusinessWeek
January 13, 2011
Chris Burritt
Home Depot's Fix-It Lady Chief Financial Officer Carol Tome has a shot at CEO, if she can solve the retailer's technology problems mark for My Articles 152 similar articles
InternetNews
January 13, 2011
Does Cloud Computing Stimulate IT Hiring? A new survey details the impact of cloud computing projects on IT hiring and also shows quite a gap between enterprise and small business plans to leverage cloud platforms. mark for My Articles 1074 similar articles
InternetNews
January 13, 2011
Google Pays Out Record Bug Bounty for Chrome 8 Google to shell out more than $14,000 in its incentive program for crowd-sourcing the discovery of security vulnerabilities in its Chrome 8 Web browser and operating system. mark for My Articles 235 similar articles
Food Processing
January 2011
Dave Fusaro
Can Software Solve the Food Industry's Problems? If the new year brings surging demand or new government regulations...Software can solve it mark for My Articles 155 similar articles
National Defense
February 2011
Lawrence P. Farrell Jr.
To Improve Cyber-Security, U.S. Needs Cohesive Public-Private Partnership NDIA member companies recently put together a white paper on the necessity to better acquire and field cyber-capabilities. mark for My Articles 119 similar articles
InternetNews
January 12, 2011
Hacker to Expose Wi-Fi Flaw Using Amazon EC2 At next week's Black Hat conference, a security expert reportedly plans to divulge method for breaking wireless networking passwords through brute force attack. mark for My Articles 98 similar articles
InternetNews
January 11, 2011
Microsoft Patch Tuesday Hits One Critical Bug After inundating security administrators with dozens of patches, many for critical flaws, in recent months, Microsoft issued just two patches this month for three flaws, with only one critical. mark for My Articles 355 similar articles
Bank Technology News
January 2011
Bankers' Wikileaks Lessons: Securing the Cloud and Your Data How can you negotiate contracts with cloud-based providers to ensure reliable access? What more should banks be doing to mitigate the risk of malicious insiders? mark for My Articles 218 similar articles
<Older 9841-9850 Newer>    Return to current articles.