Old Articles: <Older 2721-2730 Newer> |
|
PC Magazine December 13, 2007 Matthew D. Sarrel |
Symantec Endpoint Protection 11 This muscular self-defense package is the most comprehensive centrally managed endpoint security solution for businesses. |
Macworld December 12, 2007 Christopher Breen |
WireTap Studio 1.0.1 Intuitive audio-capture tool delivers non-destructive editing. |
Entrepreneur January 2008 Mike Hogan |
Get Out of the Office For basic business applications, think outside the software box. |
Entrepreneur January 2008 Amanda C. Kooser |
In iControl Go online to keep your company under lock and key. |
PC Magazine December 12, 2007 Neil J. Rubenking |
Security Suites 2008 Threats lined up against your PC have never been worse. But don't panic; there also has never been a better selection of security suites available to keep your system safe. |
Insurance & Technology December 7, 2007 Anthony O'Donnell |
AAA of Southern California Chooses Guidewire Guidewire's Web-based ClaimCenter will replace the largest AAA member's legacy claims systems and drive improved efficiency and service. |
Insurance & Technology December 6, 2007 Anne Rawland Gabriel |
Nationwide Gets More From Its Infrastructure With Less Investment How HyPerformix Performance Optimizer improved IT systems performance and reduced capital expenditures to help the P&C insurer remain competitive. |
T.H.E. Journal December 2007 |
SchoolRecruiter 2.0 by Netchemia SchoolRecruiter 2.0 streamlines hiring by storing applicant information and human resources documentation in one relational database, accessible via the internet by both job seekers and school administrators according to security permissions. |
T.H.E. Journal December 2007 |
StudentWatch Suite by PublicSchoolWorks StudentWatch Suite is a new web-based suite for tracking and reporting on student safety issues, from bullying to sportsrelated accidents. |
PC World December 6, 2007 Erik Larkin |
Are You Wasting Your Money Buying Antispyware Software? Antivirus programs often surpass antispyware applications at detecting and blocking threats. |
<Older 2721-2730 Newer> Return to current articles. |