Never Throw Anything Away

Krapf, Eric
March 2004
Business Communications Review;Mar2004, Vol. 34 Issue 3, p4
Trade Publication
Editorial. Introduces articles in the February 2004 issue of "Business Communications Review". Challenges in success of instant messaging system; Uses of digital rights management in the enterprise.


Related Articles

  • What you might not know about messengers. Altom, Tim // Indianapolis Business Journal;8/4/2008, Vol. 29 Issue 22, p30 

    The article focuses on the issue concerning instant messengers. It is stated that messengers are useful in any transactions, but it encourage users to tighten up their language almost to the point of absurdity. It is pointed out that the technology is not safe for the enterprise products....

  • Cryptography Techniques for Secure Communications. Winding, Robert // Certification Magazine;Jul2005, Vol. 7 Issue 7, p34 

    This article deals with the use of cryptography to secure business communications. Cryptography can be used to provide message confidentiality and integrity and sender verification. The basic functions of cryptography are encryption, decryption and cryptographic hashing. Cryptographic hashing is...

  • Digital Sleuthing. Deutschman, Alan // Fast Company;Mar2006, Issue 103, p66 

    The article features a growing number of digital sleuths who can detect suspicious activity within a company. Digital sleuths can store all online communications for possible use in future lawsuits or government investigations. Cataphora combines the intelligence of investigators with its own...

  • IM Me When You're Ready. Lindorff, Dave // Treasury & Risk Management;Dec/Jan2003, Vol. 13 Issue 1, p47 

    Discusses the increasing popularity of instant messaging (IM) among executives in the United States. Introduction of software programs designed to address the concerns of corporate customers; Ability to instant message within a company while firewalls remain intact; Monitoring and archiving of...

  • Data Security: An Ounce of Prevention. Britt, Phillip // Information Today;Jun2006, Vol. 23 Issue 6, p1 

    The article offers some advice on how to protect information on computers. The first thing to do is to educate the computer user about security. This will help users to keep the issue on their minds. This will also make security a part of the organization's culture. Second is to assign security...

  • Computer-based Monitoring for Decision Support Systems and Disaster Preparedness in Buildings. Vinh, Alan // Journal of Systemics, Cybernetics & Informatics;2009, Vol. 7 Issue 2, p51 

    The operation of modern buildings can support a vast amount of static and real-time data. Static information such as building schematics is vital for security and rescue purposes. There is a need for building managers and for first responders to be notified of designated building alerts in...

  • Protect your business against disasters, big or small. Freyer, Jeff // Fairfield County Business Journal;6/28/2010, Vol. 49 Issue 26, p22 

    The article presents ways on how to protect the business against disasters in Fairfield County, Connecticut. One is to have a comprehensive disaster plan that must be reviewed with the staff regularly so that they could access it in times of emergency. Another is to prevent data loss through...

  • VIRUSES TARGET IM. Cassavoy, Liane; McLeod, Ramon G. // PCWorld;Jun2004, Vol. 22 Issue 6, p24 

    The article offers tips on avoiding computer viruses via instant messaging (IM). When it comes to viruses and worms, e-mail gets all the attention. But now that IM has infiltrated both home and office, it too has become an attractive and easy target for virus writers. From 2002 to 2003, worms...

  • PRIVACY SHOULDN'T SCARE YOU. KOBEISSI, NADIM // New Internationalist;Dec2012, Issue 458, p20 

    The article discusses the creation and development of the Instant Messaging application Cryptocat, designed to encrypt messages and increase online security. It addresses increasing interest in and need for computer privacy and security tools, as well as notes opposition to encryption from...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics