MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
AskMen.com
Mr. Mafioso
How To Make Threats The principles of negotiating with threats can be widely applied, even to business situations. mark for My Articles similar articles
InternetNews
September 6, 2005
Jim Wagner
IMlogic Tackles Zero-Day Chat Threats The Real Time Threat Protection System attempts to block fledgling worms and viruses before they become a problem for network administrators. mark for My Articles similar articles
HBS Working Knowledge
January 26, 2004
Deborah M. Kolb
Keeping Your Cool in Negotiations Tips for deflecting the other side's power grab. mark for My Articles similar articles
HBS Working Knowledge
September 6, 2004
Don A. Moore
Use Deadlines for Powerful Negotiations You can use deadlines to your strategic advantage in negotiations--but so can your opponent. Here's how to make the most of time pressure. mark for My Articles similar articles
PC Magazine
August 17, 2005
Ryan Naraine
The Lookout: Ducking Spyware More that 90% of Internet users in the United States have altered their online behavior significantly to counter the threat of spyware programs, according to a study. mark for My Articles similar articles
T.H.E. Journal
February 2005
Patrick Hinojosa
Information Security: Where We've Been and Where We Need to Go Proactive technologies that can protect against new, unknown threats without human intervention must be deployed to ensure the integrity of IT systems. mark for My Articles similar articles
HBS Working Knowledge
April 5, 2004
Deepak Malhotra
Six Ways to Build Trust in Negotiations All negotiations involve risk. That's why establishing trust at the bargaining table is crucial. The author presents strategies to build trustworthiness. mark for My Articles similar articles
Insurance & Technology
November 5, 2008
Peggy Bresnick Kendler
Virtual Roundtable: Online Risk Industry experts discuss how to manage the risks, liabilities, and solutions associated with electronic processes and interactions related to conducting business over the Internet. mark for My Articles similar articles
National Defense
July 2014
Stew Magnuson
Funding Not Following Concerns About Insider Threats Spies, disgruntled workers and intellectual property thieves have always been a problem in both government and private sector organizations. mark for My Articles similar articles
InternetNews
June 16, 2005
Tim Gray
Browser-Based Attacks on the Rise Browser-based attacks such as pharming and phishing scams are now the fastest-growing security threat on the Internet. mark for My Articles similar articles
Inc.
August 2003
Rob Walker
Take It Or Leave It: The Only Guide to Negotiating You Will Ever Need If you want to be a better negotiator, you can buy 24 books, take 12 courses, and attend 7 seminars -- or, you can read this article . mark for My Articles similar articles
InternetNews
July 28, 2010
Cisco Warns on Enterprise Security Threats In its latest quarterly Global Threat Report, networking giant Cisco outlines a broad-ranging list of threats to enterprise security culled from its various security products. mark for My Articles similar articles
HBS Working Knowledge
February 14, 2005
Lawrence Susskind
Striking a Deal with a Difficult Negotiator One of the trickiest aspects of negotiation is figuring out how to deal with an individual who cannot be convinced by the merits of evidence or arguments. The article uses a sales call as an example. mark for My Articles similar articles
AskMen.com
September 2, 2005
Mr. Mafioso
11 Negotiation Strategies Negotiation, real negotiation, involves more than saving a few bucks. Done properly, both parties come out happy. Here is a refresher course. mark for My Articles similar articles
InternetNews
April 6, 2005
Sean Michael Kerner
Report: IM Threats All The Rage The first-quarter report by the IMlogic Threat Center says attack increase will likely continue. mark for My Articles similar articles
HBS Working Knowledge
May 29, 2006
Lawrence Susskind
Why Technology Negotiations Are Different You can anticipate four specific problems to crop up more often in technology negotiations. mark for My Articles similar articles
HBS Working Knowledge
October 3, 2007
Malhotra & Bazerman
Dealing with the 'Irrational' Negotiator The Harvard professors' new book, Negotiation Genius, combines expertise in psychology with practical examples to show how anyone can improve dealmaking skills. In this excerpt, they describe what to do when the other party's behavior does not make sense. mark for My Articles similar articles
Search Engine Watch
March 14, 2006
Greg Jarboe
Winning a Search Advertising Bid War Your pay-per-click campaign is advancing steadily until suddenly, another company launches a surprise attack, overruns your position, and pins you down in a bloody bidding war. What do you do? Pull back? Hunker down? Or counter-attack? mark for My Articles similar articles
Information Today
May 5, 2015
Cisco Integrates Solutions for Threat Protection Cisco integrated its Cisco Application-Centric Infrastructure data center solution with its FirePOWER Next Generation Intrusion Prevention System to provide automated threat protection for combating emerging data center security threats. mark for My Articles similar articles
National Defense
November 2013
Stew Magnuson
Companies Ill-Prepared to Fend Off Insider Threats Two high-profile cases are putting a spotlight on insider threats in the private sector, particularly companies that do business with the Defense Department, intelligence agencies and other government organizations. mark for My Articles similar articles
InternetNews
August 4, 2005
Tim Gray
IM Threats Bombard Systems The increase in attacks on instant messaging systems has corporations on guard. mark for My Articles similar articles
National Defense
February 2015
Sarah Sicard
Experts: Thwarting Insider Threats Takes A Holistic Approach Insider threats, whether they are foreign spies, disgruntled employees or embezzlers, can't be stopped with software alone, experts at a cyber security summit recently warned. mark for My Articles similar articles
AboutSafety
May 4, 2001
Developing And Implementing A Workplace Violence Prevention Program And Policy The first priority in developing violence prevention policy is to establish a system for documenting violent incidents in the workplace... mark for My Articles similar articles
D-Lib
Sep/Oct 2012
Vermaaten et al.
Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment Digital preservation strategies, as well as the processes and tools that implement those strategies, are designed to secure the long-term future of digital materials. A successful digital preservation strategy must account for and mitigate the impact of various threats. mark for My Articles similar articles
HBS Working Knowledge
August 9, 2004
Adam D. Galinsky
When to Make the First Offer in Negotiations Substantial psychological research suggests that, more often than not, negotiators who make first offers come out ahead. mark for My Articles similar articles
Entrepreneur
June 2008
Robert Kiyosaki
Stand Tall The fear of fighting is much worse than the actual fight, so don't be afraid to go after goliath. mark for My Articles similar articles
InternetNews
April 26, 2005
Tim Gray
SurfControl Tackles Spyware The company will join the growing number of software companies offering network-based tools for fighting spyware. mark for My Articles similar articles
InternetNews
June 7, 2004
Jeremy Jarrell
ArcSight Counters Threats Unseen Current Subscriber Identity Module (SIM) technology provides protection against existing threats, but how do you combat something that isn't there? mark for My Articles similar articles
The Motley Fool
September 1, 2011
Dan Radovsky
A Game of Patents: Acquire or Die Tech companies fight tooth and nail for protection against patent litigation. mark for My Articles similar articles
Bank Technology News
November 2007
McAfee's Top 10 Threats for 2008 McAfee released its 2008 threat predictions this week. Here's the first half of the list. mark for My Articles similar articles
InternetNews
April 5, 2010
Security Experts: 'Malware Like a Sniper' A panel of security experts had some grim news on the state of security. How does IT prepare for what's coming? mark for My Articles similar articles
PHONE+
February 3, 2010
Jean Kelley
Enhance Your Professional Credibility In order for others to view you as credible, you have to consistently and deliberately act your way into credibility. mark for My Articles similar articles
Searcher
June 2001
Seymour Satin
Negotiating: From First Contact to Final Contract The information professional's job description changes so rapidly from day to day, it's hard to keep up. From researcher to Web designer to information guru, the latest skill set all information professionals need is how to negotiate... mark for My Articles similar articles
InternetNews
April 9, 2008
Stuart J. Johnston
Microsoft's Security Bundle Goes Beta A public beta test starts for Microsoft's 'Stirling' security products. mark for My Articles similar articles
IndustryWeek
November 1, 2008
Nick Zubko
Powers of Persuasion Successful negotiators each have their own unique approach, but they also have a few things in common. mark for My Articles similar articles