Baseline Issue January 2008By Baselinemag | Posted 2008-06-16 Email Print
Modernizing Authentication — What It Takes to Transform Secure Access
Private Eyes Stake Out Digital Monopoly
Cybercrime scenes stretch from personal desktops to global networks, and computer forensic specialists cross jurisdictions.
PI Laws: Obstacles and Solutions
Challenges faced by digital forensic specialists
Evaluating Your Forensic Vendor
Finding the right forensic specialist
Quants: Unlockingthe Numbers
Quantitative analytical specialists are in demand.
Tuning Tech To Business
Aligning technology with business needs.
Celtics Shoot And Score With New Malware Point Guard
Celtics turn to a gateway appliance to defeat malware and spyware.
Q&A: Alstom Transport’s Nikk Gilbert
The French rail manufacturer protects itself with a formal security program.
San Size Fits All
A storage area network helps the printing company nab clients.
A Toy Company That Means Business
Toy giant Funrise Toy deploys Web-based project management.
Halting The Import Of Hazardous Goods
The nation’s system to stop unsafe imports won’t be complete until 2011.
How Good Are Your Slas?
Get more out of your service-level agreements.
Desperately Seeking App Dev Metrics
Most enterprises fail to gather or accurately track application development.
Scaling Up Or Out?
How to determine the best server strategy for your organization.
Starting Point: Lawrence M. Walsh
What a subprime mess we’ve made.
Tech Track: Michael Vizard
Rich internet apps: the best of thick and thin.
Real Numbers: Paul A. Strassmann
Five secure reasons for thin clients.