- Live Webcast: How to Instill Consumer Trust and Confidence in your Web Site
- The Internet has fundamentally changed the way people connect, communicate, and conduct commerce. But as the Internet becomes more central to consumers' lives, online fraud continues to evolve -- and consumer concerns about identity theft are...
- Webcast, 2008-04-02
- Sanity check: Five reasons to centralize your IT department
- The centralization vs. decentralization argument regularly rears its head in most IT organizations. Some of them fall into a cyclical pattern while others are more like a pendulum that swings back and forth from one extreme to the other. In order...
- Blog, 2008-03-31
- Geek Trivia: Contest(ed) winners
- If one definition of insanity is to try the same action over and over yet hope for different results, then Pepsi marketers might be able to defend a claim that their cola is the most insane soft drink on the planet. Why? Because Pepsi is still...
- Blog, 2008-04-01
- House raided by mob in Craigslist ad hoax
- A hoax Craigslist advertisement resulted in an Oregon man losing a sizable chunk of his possessions as hoards of bargain-hunters descended upon his home in a free-for-all grab. A number of ads apparently popped up on Saturday afternoon, claiming...
- Blog, 2008-03-31
- Help Desk Trouble Ticket Template
- The Help Desk Trouble Ticket is an important document for the technical support professional. This form contains all the essential fields for maintaining an organized, accountable tech support organization, including general ticket information and...
- Download, 2008-04-04
- Achieving Business Objectives through Strategic IT Investment
- Gone are the days when IT spending was simply another line in the budget, like telephones, maintenance, or transportation. Today, IT spending is increasingly recognized as an investment that will enable the business to continue growing well into the...
- Webcast, 2008-03-31
- Symantec Online Backup - Sign up by April 30, 2008 to receive your first three months free!
- Need help protecting and recovering your critical data? Symantec Online Backup is your answer! Easy to implement and manage, Symantec Online Backup is a secure and comprehensive solution that uses enterprise-class technology -- without enterprise...
- White paper, 2008-04-01
- Polstergeist Browser (exe)
- Produce daily briefing reports containing content from all your favorite websites with the click of a single button. Consolidate price targets, ratings, opinions, quotes and news stories from multiple sources for a particular stock. Gather news...
- Software download, 2008-03-28
- MyShortcuts (exe)
- MyShortcuts is an easy to use shortcuts organizer and application launcher. A good alternative to the Windows Start Menu. Friendly and intuitive. It provides quick access to your favorite programs, shortcuts, folders, documents and Web sites. This...
- Software download, 2008-03-28
- What constitutes workplace bullying?
- In a recent blog, I wrote about the prevalence of workplace bullying. Some of those who commented on the piece wondered exactly what constitutes bullying. Since workplace bullying can take so many forms,it's hard to assign a concrete definition...
- Blog, 2008-03-28
- Water-cooled toolbox PC mod
- This creative computer mod incorporates a water cooling system and a bright red toolbox. by Bill Detwiler...
- Image gallery, 2008-03-31
- Securely delete files with shred
- There are two utilities on a typical Linux box that can be used to delete files. Most users are familiar with the rm command. Most of the time, this command is sufficient for routine deletion, but for files that contain sensitive data, you might...
- Blog, 2008-03-31
- Optimizing Efficiency with Integrated Information
- Modern enterprises are awash with data from an ever-growing multitude of sources. Everyone agrees that all this information is extremely useful -- even if it isn't immediately apparent -- but providing access to all the people, applications and...
- Webcast, 2008-03-31
- RemoveAny (exe)
- RemoveAny finds spyware, adware, trojan horses, key-loggers, backdoors, rootkits on your computer. RemoveAny product recognizes malicious software by watching for suspicious behavior, not by searching for known signatures. It has constant protection...
- Software download, 2008-03-28
- Use prototyping to visualize project requirements
- A prototype represents the shell of an actual production application. Prototypes are built early in the development lifecycle, and they're used to provide valuable insight into the look, feel, and general workflow of an application. (Sometimes...
- Blog, 2008-04-01
- The science of computer forensics
- This week, I am introducing some tools used in computer forensics and investigations. This will probably be so much "ho-hum" to those of you already in the trade, but I thought this would be of interest to other TechRepublic members. As usual, I...
- Blog, 2008-04-04
- 50MB of Data - For the low low price of $100
- The hard drive blew out on my Tandy 1000 at home not too long ago. Seeing as how it's an XT-class machine, that means that replacement hard drive options are limited. I can either use an MFM hard drive or an RLL hard drive. There are some XT-IDE...
- Blog, 2008-04-04
- Get plenty of desktop with the Matrox TripleHead2Go
- For some of us, there is no such thing as too much desktop real estate. The multi-tasking world we live in is always calling on us to do more things on our PCs at the same time. One way to expand desktop real estate is provided by the Matrox...
- Blog, 2008-04-04
- Adapt to your audience with CSS media types
- In addition to worrying about browsers, Web standards, and more, you also have to consider the multitude of devices or media that may be used to view a site. The CSS media type provides the functionality to build Web applications whose presentation...
- Blog, 2008-04-04
- Will IT soon be facing malpractice suits for failed projects?
- This is a guest post from Larry Dignan (right). You can read the original article on Larry's blog Between the Lines on TechRepublic's sister site ZDNet. Does Waste Management's lawsuit against SAP indicate the beginning of a bevy of IT...
- Blog, 2008-04-04
- WiMAX's slow rollout may be technical
- There have been all sorts of possible explanations as to why WiMAX is not readily available. Most refer to business plans and political issues. Some recent news may very well point to the real reason for the slow rollout. Quite simply, providers are...
- Blog, 2008-04-04
- See benefits for your organization using "ITIL Lite"
- You work for a smaller business and have been hearing a lot about ITIL. Maybe you've heard how it can cut your costs, or you've seen evidence that it can improve service delivery. But then you take a closer look. At first glance, it looks like...
- Blog, 2008-04-04
- March marks third consecutive month of job losses
- Well, I'm just a font of joy this morning, aren't I? According to The New York Times, employers slashed 80,000 jobs in March alone. This figure is the highest since March 2003, when the labor market was still struggling to recover from the 2001...
- Blog, 2008-04-04
- Intel unveils new remote lock-out technology for stolen laptops
- At the Intel Developer Forum in Shanghai, China, this week, the world's leading chipmaker introduced the Intel Anti-Theft Technology, which will be integrated into the Active Management Technology suite that is part of Intel's vPro systems for...
- Blog, 2008-04-04
- TR Out Loud - April 4, 2008
- This week's TR Out Loud is a free for all! Find out more than you ever wanted to know about Beth and Sonja, including information about one of their adventures together outside the office. Oh, and all that forums-related stuff, too. Sonja had a...
- Blog, 2008-04-04
- News to know for Friday, April 4, 2008
- "News to know" is a joint venture between TechRepublic and ZDNet. The original post publishes every morning on business days in Between the Lines. Notable headlines: Tricia Liebert: Windows XP lives on! Sort of Jason Hiner: Sprint CEO stays...
- Blog, 2008-04-04
- Windows XP lives on! Sort of
- Microsoft's popular XP operating system has seen so many death sentences that it may well be referred to as "zombie-ware". Destined to reach "end of life" on June 30, 2008, the software giant is having a (limited) change of heart. Microsoft has...
- Blog, 2008-04-04
- Microsoft asked to pay 175 million in taxes in India
- A unit of Microsoft Corp. has been asked by an Indian appellate authority in income tax to pay more than 7 billion rupees - or about US $175 million on income earned for the assessment period of 1999 to 2005. The amount is computed based a tax...
- Blog, 2008-04-04
- Help Desk Trouble Ticket Template
- The Help Desk Trouble Ticket is an important document for the technical support professional. This form contains all the essential fields for maintaining an organized, accountable tech support organization, including general ticket information and...
- Download, 2008-04-04
- What would a Microsoft-Yahoo deal mean for Windows and Office?
- While there has been a storm of columnists, bloggers and self-styled pundits who have talked the Microsoft-Yahoo merger to death, very few of them have considered what a pair-up of these two companies could mean for Microsoft Windows and Microsoft...
- Blog, 2008-04-03