MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
March 10, 2006
Sean Michael Kerner
Marcus Ranum, CSO, Tenable Network Security Firewall inventor Marcus Ranum sounds off on security threats and how open source doesn't necessarily make software better. mark for My Articles similar articles
InternetNews
July 12, 2006
Clint Boulton
Secure Computing Buys Messaging Trust Secure Computing agreed to acquire messaging security appliance leader CipherTrust for $273.6 million in cash and stock. mark for My Articles similar articles
InternetNews
April 1, 2005
Michael Singer
Jeff Pulver, CEO, Pulver.com The VON trade show and Free World Dialup founder sees many opportunities in VoIP -- if service providers play their cards right. mark for My Articles similar articles
PC Magazine
February 3, 2004
Leon Erlanger
IM and P2P Security The explosion of IM and P2P in the workplace can be a security nightmare. Here's how to keep your network--and your company--safe. mark for My Articles similar articles
Unix Insider
November 2000
Sandra Henry-Stocker
Tapping on the walls Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. Here's how to stay one step ahead of your enemy... mark for My Articles similar articles
T.H.E. Journal
August 2004
Ozkan & Gunay
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. mark for My Articles similar articles
Popular Mechanics
August 2007
Joel Johnson
How to Donate Your PC's Downtime to Scientific Research Your computer rarely employs 100 percent of its processing capability, and it uses very little while sitting idle. Distributed computing combines the unused processing-power of multiple Internet-connected computers for scientific number crunching. mark for My Articles similar articles
InternetNews
March 16, 2004
Ryan Naraine
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
David Joachim
Q&A With Allstate Security Boss Kim Van Nostern An interview about how, in today's environment, it takes more than technical expertise to run a secure insurance enterprise. mark for My Articles similar articles
InternetNews
April 16, 2004
Clint Boulton
Q&A: Hal Stern, CTO Sun Services The exec discusses how Sun's competition with IBM and recent pact with Microsoft factor in its utility computing strategy. mark for My Articles similar articles
PC World
September 1, 2000
Jeff Sengstack
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. mark for My Articles similar articles
T.H.E. Journal
June 2007
Extracurricular :: For Technologists Who do Their Homework The expectations of technology directors who have yet to implement 1-to-1 computing programs positively reflect the experiences of tech directors who have 1-to-1 plans already established. mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
Bank Systems & Technology
November 1, 2005
Steven Marlin
Defending the New Frontier An interview with Matthew Speare, Chief Information Security Officer at M&T Bank on the greatest security threats to banks and what banks to do to fight back. mark for My Articles similar articles
Insurance & Technology
November 24, 2003
Julie Gallagher
Is Grid Computing Next Wave? Insurance companies that need to perform large processing tasks like scanning policies to see which ones are likely to generate claims can save money on hardware with grid computing. mark for My Articles similar articles
InternetNews
May 26, 2006
Tim Scannell
Jamie de Guerre, Director, Partner Programs, Cloudmark Spam isn't going anywhere, and Jamie de Guerre's company is tracking its trails through our inboxes. mark for My Articles similar articles
InternetNews
December 31, 2009
VoIP Security Issues on the Rise McAfee said its latest research found almost 60 vulnerabilities in VoIP products. mark for My Articles similar articles
InternetNews
June 22, 2007
Clint Boulton
Sneaky Web Apps to Get The Stealth Treatment Startup Palo Alto Networks proposes a new firewall for detecting sneaky Web 2.0 applications and threats. mark for My Articles similar articles
PC Magazine
October 1, 2004
Neil J. Rubenking
Personal Firewall--Don't Surf Without It To gauge the effectiveness of two popular firewall packages, we took the gloves off and attacked the firewall process using techniques available to a malicious program. McAfee Personal Firewall Plus 6.0... Norton Personal Firewall 2005... mark for My Articles similar articles
CIO
September 15, 2005
Susannah Patton
Dial VoIP For Vulnerability Voice over Internet Protocol offers great savings in long-distance calls. But without extensive safeguards, VoIP can expose your phone system to the havoc affecting the rest of the Web. mark for My Articles similar articles
BusinessWeek
January 31, 2005
Michael Capellas On The New MCI The CEO explains how Internet technology will be key to future growth and why he thinks his company has the edge there mark for My Articles similar articles
InternetNews
May 22, 2006
Erin Joyce
Mike Nash, Microsoft's Security Technology unit The soon-to-be outgoing Microsoft security honcho chats up the big Vista security picture. mark for My Articles similar articles
RootPrompt.org
April 10, 2000
Lance Spitzner
Auditing Your Firewall How to Audit Your Firewall Setup. mark for My Articles similar articles
IEEE Spectrum
May 2012
Tekla S. Perry
John L. Hennessy: Risk Taker Stanford University's president predicts the death of the lecture hall as university education moves online mark for My Articles similar articles
Bank Technology News
December 2005
Glen Fest
Voip Security Threats: Swimming With The Sleeping Sharks? Banks' enthusiasm for installing VoIP shows no signs of waning. Will hackers, spammers, phishers and other criminals soon notice and start to take advantage? mark for My Articles similar articles
InternetNews
April 7, 2006
Tim Scannell
Norm Laudermilch, CTO, Trust Digital Most companies aren't prepared to prevent malicious code from hopping from cell phones to enterprise networks, or tracking it when it happens. mark for My Articles similar articles
InternetNews
January 2, 2004
Erin Joyce
Q&A: Gopi Gopinath, President, Equant The president of the data networking company's products division talks about who's sitting on the fence about VoIP, and who isn't. mark for My Articles similar articles
PC Magazine
March 28, 2008
Erik Rhey
Q&A: Nicholas Carr - The World Wide Computer Explained The author of The Big Switch tells us why a sea change is coming to computing. mark for My Articles similar articles
InternetNews
September 3, 2004
Ryan Naraine
Edmund Fish, General Manager, AOL Desktop Messaging The general manager of America Online's desktop messaging unit talks about IM interoperability, innovation and the state of the corporate IM market. mark for My Articles similar articles
InternetNews
November 10, 2005
Tim Gray
IM Use Is Surging, Says (IM Provider) AOL The popularity of instant messaging continued to grow this year, as many Americans embraced the technology both for personal and business purposes, according to a new survey. mark for My Articles similar articles
InternetNews
June 9, 2009
Stuart J. Johnston
Microsoft's Biggest Bug Stomp Ever Security firms say Tuesday's patches fix more bugs than ever before, meaning plenty of work to do. mark for My Articles similar articles
IndustryWeek
December 16, 2010
Are You Prepared for BusiLeaks? Mobile workforces, cloud computing and social networking pose significant threats to IT security. mark for My Articles similar articles
InternetNews
July 29, 2005
Colin C. Haley
Bob Plaschke, CEO, Sonim Technologies Plaschke took a risk coming to Sonim Technologies when Silicon Valley was still recovering. Now the CEO, he sees new markets for VoIP services. mark for My Articles similar articles
PC World
November 2003
Andrew Brandt
Privacy Watch: Make Sure Your Firewall Is Sturdy Test your firewall to find out if it has any holes -- and then plug them up. mark for My Articles similar articles
The Motley Fool
December 7, 2005
Alyce Lomax
Yahoo! Answers the Call The Internet giant prepares to launch a VoIP product through its instant-messenger service. Whether this move will bring in additional revenue for Yahoo! and help its messenger service gain more users remains to be seen. mark for My Articles similar articles
Insurance & Technology
November 24, 2003
George V. Hulme
Microsoft Vows Better Security Microsoft promises improved patch management, firewall measures. mark for My Articles similar articles
InternetNews
January 25, 2006
David Needle
Apple iTunes For Education Apple's new iTunes U program helps universities get their content online. mark for My Articles similar articles
PC Magazine
November 14, 2007
John Brandon
Q&A: Ken Graham, National Weather Service The director of the National Weather Service's (NWS) integrated services talks about tech advances in forecasting. mark for My Articles similar articles
CAUSE/EFFECT
Vol 22 Num 4 1999
Sarah Michalak
Decentralized Information Technology Requires Central Coordination! What does an institutional history of extraordinarily decentralized computing mean for 21st-century technology support, and how can necessary changes be made in a deeply rooted institutional culture? mark for My Articles similar articles
BusinessWeek
July 26, 2004
Jim Kerstetter
Scott McNealy Takes On His Critics Corporate computing giant Sun Microsystems may be struggling, but in a pair of recent interviews its CEO is as feisty as ever. mark for My Articles similar articles
InternetNews
December 19, 2003
Colin Haley
Q&A: AT&T's VoIP Boss Cathy Martine The executive tapped to spearhead the carrier's VoIP rollout talks about the technology, the strategy and the red-hot market. mark for My Articles similar articles
HBS Working Knowledge
October 18, 2006
Roger Thompson
New at the Helm: A Talk with HBS Dean Light Harvard Business School Dean Jay Light discusses the opportunities brought by globalism, challenges in recruiting and developing faculty, and program innovation needed to meet the needs of 21st-century business leaders. mark for My Articles similar articles
Information Today
March 19, 2007
Yahoo! Answers Adds Personal Networking Yahoo! Answers, a Q&A site on the Web, has introduced "knowledge networking," an easy way for people to connect to others online and to build a personal network of people to exchange knowledge with on specific areas of interest. mark for My Articles similar articles
RootPrompt.org
June 26, 2000
Lance E. Spitzner
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. mark for My Articles similar articles
InternetNews
November 18, 2005
Colin C. Haley
Mark Goldston, CEO, United Online Do dial-up users really want VoIP? Mark Goldston, the man who powers the NetZero ISP thinks so. mark for My Articles similar articles
InternetNews
September 14, 2010
Patch Tuesday Fixes Another Stuxnet Vulnerability Thirteen security holes get patches in the latest roundup of fixes from Microsoft. mark for My Articles similar articles