There's a Hole in the Server, eLiza, eLiza
Checklist Feature Parity, Baby
The Jewish Home and Hospital of N.Y. uses an assortment of products from a variety of companies to manage its network.
Impending pressure from the FBI or Congress may force companies to share evidence of break-ins, or disclose the SEC level of information security preparedness. Is your company ready?
A hardened operating systems brings security to the Bahá‘í International Community's Web site.
Technology workers think employers don't do enough to ensure their personal safety (and that of their property) but will strongly resist any security measures that might infringe on their personal life.
What's really happened to the security of information technology since Sept. 11?
Many of the seasoned veterans of the first generation of host integration are moving on to the next level—not only more tightly integrating their host platforms to the Web, but also linking into newer application environments from across their heterogeneous environments.
It's not always enough to assume that "the financial people" are keeping a close eye on things. As a project leader, you should be able to read between the lines of a company's financial report to spot potential problems.
Outsourcing is suddenly fashionable again as business managers, confronting lean economic times, take another hard look at what is and isn't a "core competency."
A hardened operating systems brings security to the Bahá‘í International Community's Web site.