On The Insider: EXCLUSIVE: Who Went to Britney's Party?
What to do when you screw up
Sooner or later everyone screws up. Leadership coach John M McKee says that how you react and what you do next can either derail you, or help you move up the ladder. by John McKee
Tags: Criticism, Career, Professional Development, Leadership, Management, John McKee
Help desk techs are owed overtime pay
Many managers assume that salaried employees are exempt from overtime pay, but this is not necessarily true. According to U.S. labor laws, many support techs may be due for overtime compensation, regardless of what employers may want to believe. Are you affected? by William Jones
Tags: Overtime, Benefits, Payroll Solutions, Help Desk, William Jones, Job, Human Resources, It Operations, Call Centers, U.S. Department Of Labor
10 dumb things you can do to your Cisco router and how to fix them
David Davis points out the dumb things you can do to mess up your Cisco router and how to fix them. He also lists some important resources for each step to give you even more detailed instructions. by David Davis
Tags: David Davis, Networking, Router, Routers & Switches, Cisco Systems Inc., Cisco Router, Network Technology, Cisco IOS
TR Member Spotlight with Ed Woychowsky
The TR Member Spotlight strikes again, this time shining a light on Ed Woychowsky, who is not only a member of TechRepublic but also a contributor writer for the Programming and Development blog. by Sonja Thompson
Tags: Programming, TechRepublic Inc., Sonja Thompson, Development Tools, Emerging Technologies, Software Development, Podcasts, Software As A Service (SaaS), Software/Web Development, Internet
What is your best definition of a virtual machine?
The definition of a virtual machine. If you haven't participated in a group discussion, I encourage you to do so as I am very curious as to how people out in the field will define a virtual machine. by Steven Warren
Tags: Steven Warren, Desktop Virtualization, Computer, Virtual Machine, Operating System
Using cryptographic hashes with Ruby
The uses of cryptographic hash functions for security capabilities in software are many and varied. Ruby provides simple and easy options for generating and comparing cryptographic hashes. by Chad Perrin
Tags: Ruby, Web Development, Hash, SHA-1, SHA-2, Scripting Languages, MD5, Software/Web Development, Chad Perrin
How do I create my first snapshot in VMware Workstation?
In a previous post, I explained how snapshots work in VMware Workstation. Let's take it a step further now and create our first snapshot. by Steven Warren
Tags: Snapshot, Steven Warren, Desktop Virtualization, Workstation, VMware Inc., Virtual Machine, VMware Workstation
Can a small IT consultancy benefit from a Web site?
For many businesses, the Internet is the land of opportunity, but is it the right frontier for a small IT consultancy? Susan Harkins ponders whether a Web site will pay off for her business. by Susan Harkins
Tags: Channel Management, Susan Harkins, Web Site, Web Technology, Web, Web Site Development, Information Technology, Benefit, Marketing, Internet
Tech support rap video: 'Stack the Memory'
Don't you wish that your inimitable tech support skills had a catchy hip-hop theme song that conveyed your awesomeness to those trippin' non-techies out there? No? Well, the Sniper Twins made it anyway. by Jay Garmon
Tags: Tech, Video, Jay Garmon, Desktops, Marketing, Hardware, Corporate Communications, Memory
Is Microsoft's legacy holding it back from being more innovative?
Microsoft has a huge legacy issue; even the slightest mistake in breaking backwards compatibility can make millions of people unable to work. Do you think Microsoft's legacy is holding it back from being more innovative? by Justin James
Tags: Management, Operating Systems, Software, Justin James, Strategy, Microsoft Corp., Marketing, Microsoft Windows, Corporate Communications
Mistakes can be the start of something good
Think a mistake is the end of the world? In some cases, making a mistake and learning from it can be the best thing to happen to you. by Toni Bowers
Tags: Typewriter, Mistake, Toni Bowers
Supporting home users? Share your experience and take the poll
It seems that supporting home users could provide a huge market for IT pros, but most would prefer to focus their attention on the business user. What are some pros and cons of supporting home users, what are some of the pitfalls to avoid, and what would be the right...
Tags: Joe Rosberg, Document Management, Software, Home User, Managerial Accounting, Enterprise Software, Finance
1950's IT without tailfins and leather jackets
Usually when talking computer classics, I stick to computers from the 70's, 80's and 90's. This video from IBM shows a state of the art accounting computer from the 1950's. See how far we've come. by John Sheesley
Tags: Video, RAMAC Restoration Website, RAMAC, Accounting, John Sheesley, Floppy Disk, Information Technology, Computer, Productivity, Marketing
Mashups: No SOA required, but keep IT in the loop
Everyone is excited about the possibility that business end users will be able to design mashups for their own purposes without having to wait for IT to build the interface. Check out the five common mistakes to avoid with mashups. by Joe McKendrick
Tags: SOA, Service-Oriented Architecture (SOA), Web Services, Software, Collaboration, Information Technology, Joe McKendrick, Mashup, Enterprise Software
10 things to look for in a flat-panel monitor
Flat-panel monitors offer numerous benefits, and quality and prices continue to improve. But you'll need to consider several factors when you begin to weigh the choices -- everything from resolution, latency, and power consumption to display controls and warranties. Here's a rundown of the key things to keep in mind....
Tags: HDMI Input, Resolution, Flat Panel, Monitors & Displays, Model, Erik Eckel, Monitor, Components, Hardware
Video: Four obstacles to implementing VoIP
Voice over IP is growing in popularity but fewer than half of all businesses are using VoIP because of a few drawbacks. This episode of Sanity Savers for IT Executives discusses the biggest obstacles standing in the way of widespread corporate adoption of VoIP. by Jason Hiner
Tags: Telephony, Telecommunications, Jason Hiner, Video, Networking, Marketing, VOIP, Corporate Communications
How do I ... tweak Windows Explorer to open in a directory of my choosing?
Because Microsoft Windows XP has been around for a fairly long time now, there are numerous tweaks you can make to how it works. Tweaks that make XP bend to your will. Mark Kaelin shows you one tweak he uses all the time to help him get where he is...
Tags: Microsoft Windows Explorer, Operating Systems, Folder, Software, Microsoft Windows XP, Microsoft Windows, Mark Kaelin
All major Linux distros compliant with IPv6 mandates
In the ramped efforts for organizations to meet the qualifications for IPv6-compliant technology, the Linux Foundation declares that all major Linux distributions now meet the U.S. DoD's certification standards. by Selena Frye
Tags: Linux Foundation, Telecommunications, Operating Systems, Networking, Software, IPv6, Linux, Open Source, U.S. Department Of Defense, Selena Frye
Are your virtual servers really secure?
Brad Bird takes a look at virtual servers and their level of security compared to physical servers. What makes a virtual server a richer target for attack? Are you prepared for the security considerations? by Brad Bird
Tags: Servers, Brad Bird, Server Virtualization, Security, Virtual Server, Ip storage, Hardware, Virtualization
CRM and the real cost of e-mail
For every e-mail campaign your company does, you'll need to manage white-list listings, enforce e-mail formats and gauge performance. Here are some more details. by Jay Rollins
Tags: E-mail, CRM, Online Communications, Jay Rollins
Hotmail Login
I have a user who is running WinXP and frequently uses Hotmail as a backup when her office email goes down. After loading Ad-Aware SE she can no longer login to her Hotmail account from this system. After creating a new Hotmail account for a different user, we...
Tags: e-mail, Microsoft Internet Explorer, Developr, MSN Hotmail
How to stop Office/Outlook 2003 from synchronizing
This seems to be a common and frustrating problem, and I haven't been able to find an answer anywhere. My computer periodically tells me that Microsoft Office 2003 is synchronizing folders. While it's doing that - and it takes awhile - not much else ca
Tags: ebecca@..., microsoft officer 2003, Microsoft Outlook, Microsoft Outlook 2003, software, Microsoft Office, synchronization, computer, outlook 2003, synchronizing
The IT Strategic Plan Step-By-Step
It's April and you are four months into your organization's fiscal year. You know that within six months you'll need to have your operating plan for the upcoming year in fairly solid shape. You also know that creating an operating plan without a longer-range strategic view is like driving a...
Tags: Management, Plan, Strategy, Information Technology, Forrester Research Inc.
How To Use the Six Laws of Persuasion during a Negotiation
In order to be successful, you must master the persuasion process, which will enable you to deliberately create the attitude change and subsequent actions necessary for persuading others to your way of thinking. In other words, you have to be able to "sell" your ideas in order to make changes...
Tags: Free Trade, Global Knowledge Network Inc., Negotiation, Finance
IT Dojo: Create your own bootable USB flash drive for Windows XP
Booting Windows XP from a USB Flash drive gives you great IT support tool. For example, you can make a troubleshooting toolkit for booting and analyzing seemingly dead PCs. Or you could always have your favorite support applications at your fingertips.In this IT Dojo video, Bill Detwiler, TechRepublic's Head Technology...
Tags: pe builder, bootable usb, usb flash drive, microsoft windows xp, bios, bootable device, it dojo
Mercury LoadRunner Tips for Configuration, Scripting, and Execution
This white paper provides tips and tricks for Mercury LoadRunner configuration, scripting, and execution. This guide is intended to help testers just learning to use LoadRunner, as well as to provide new best practices for those who have used LoadRunner for many years.
Tags: Mercury LoadRunner
Download this project plan template
If you've taken on a small to midsize project that doesn't warrant a full-scale plan in Microsoft Project, download this Excel spreadsheet template sent in by a TechRepublic member for quick and easy project management.
Tags: Management, Microsoft Excel, TechRepublic Inc., Project Management, Office Suites, Software, Microsoft Office, It Operations, It service Management, Strategy
Use these four Registry tweaks to accelerate Windows XP
Plenty of third-party programs claim to tweak or optimize Windows. However, most of them simply make Registry edits. Here are four manual tweaks that experienced IT professionals can make to improve the speed of Windows XP.Title: Windows XP Hacks, 2nd Edition ISBN: 0596009186 Published: February 2005 Author: Preston Gralla Chapter:...
Tags: Registry, Operating Systems, Software, Microsoft Windows XP, Microsoft Windows, O'Reilly Media Inc.
See why Verizon's new BlackBerry is stirring up a Storm
Research in Motion's BlackBerry Storm has been one of the most widely anticipated IT products of 2008. In this special episode of Sanity Savers for IT Executives, get a look at the hits and misses of the Storm and see how well it stacks up against the iPhone as a...
Tags: Verizon Communications Inc., Management, TechRepublic Inc., Strategy, Information Technology, RIM BlackBerry, Handhelds, Hardware, sanity savers
Explore the benefits of the IBM BladeCenter S from the inside out
The perfect mix of performance and energy savings, the IBM BladeCenter S is ideal for the small to mid-sized office and the remote office. It neatly consolidates your storage, servers and networking into a single chassis that plugs into a standard electrical outlet, supports virtually all applications, and uses less...
Tags: Blade Servers, Servers, IBM eServer BladeCenter, Benefit, IBM Corp., Hardware
10+ essential (and free) Windows applications
When George Ou builds a new Windows computer, he installs a dozen of his favorite free apps. Not only do they fill essential functions, they're all well-behaved installers and uninstallers: no crashing the computer or gunking it up. See how to make the most of your computer without spending a...
Tags: Windows Application, Computer, Productivity, Photograph
Cracking Open the $8000 Alienware Area 51 ALX
The Area 51 ALX systems from Alienware are their cream of the crop, flagship, desktop computers. Our review unit came with three nVidia GeForce 280 GTX video cards, each carrying 1GB of dedicated GPU RAM. We had to crack open the case to see what a case full of video...
Tags: Video Card, geekend, Video, Components, Video Cards, Hardware, Alienware, TechRepublic Inc., Cracking open, Marketing
TCP/IP Troubleshooting
Troubleshooting is a necessary part of supporting any network installation. Determining and repairing problems can consume a lot of time, especially if you don't know what to do or how to do it correctly and quickly. This On Demand Web Seminar explains how you might consider troubleshooting different problems that...
Tags: Tcp/Ip, Networking, Network, Global Knowledge Network Inc., Productivity
Boot Windows XP from a USB flash drive
Almost everyone who has worked with computers for any lengthof time at all has run into at least one situation in which a problem left a PCunbootable. What if you could return the machine to a bootable state just byinserting a USB flash drive though? Believe it or not, it...
Tags: USB flash drive, Microsoft Windows XP, Microsoft Windows, Brien M. Posey MCSE
System Explorer (exe)
This full-featured system analyzing tool lets you take a sneak peek at everything that's going on in your system, from currently active processes to installed drivers, including also network collections, startup applications and Internet Explorer add-ons, if you have any. you can end any active process or delete items from...
Tags: Viruses And Worms, Security, Microsoft Internet Explorer, Antivirus, Productivity, Process, Web Browsers, Internet
Download Windows Server 2008 Hyper-V to support server virtualization
Server virtualization, also known as hardware virtualization, is a hot topic in the IT world because of the potential for serious economic benefits. Server virtualization enables multiple operating systems to run on a single physical machine as virtual machines VMs. With server virtualization, you can consolidate workloads across multiple underutilized...
Tags: Servers, Microsoft Windows Server, Operating Systems, Microsoft Windows Server 2008, Server Virtualization, Software, Microsoft Windows, Hardware, Virtualization
CCNA Boot Camp v2.0
View Available Dates and LocationsBased on our Cisco ICND1 and ICND2 courses, our CCNA e-Camp is an intensive program, designed to help you achieve your CCNA certification in the shortest period of time possible. Instruction includes instructor-recorded training and hands-on labs where you'll learn to install, configure, operate, and troubleshoot...
Tags: Dallas, Washington, Toronto, Networking, Network, Schaumburg, Chicago, Instruction, CCNA
Sanity check: Five reasons why Windows Vista failed
With Windows Vista's public perception in shambles and most IT departments stubbornly refusing to adopt it, has the time come for an early post-mortem on Vista? Here are the top five reasons why Vista has failed. Hint: Most of them aren't technical. by Jason Hiner
Tags: Jason Hiner, Operating Systems, Microsoft Windows Vista (Longhorn), Software, Microsoft Windows XP, Information Technology, Microsoft Windows Vista, Microsoft Corp., Microsoft Windows, IT Department
10 Tech Skills You Should Develop Over the Next Five Years
If you want a job where you can train in a particular skill set and then never have to learn anything new, IT isn't the field for you. But if you like to be constantly learning new things and developing new skills, you're in the right business. In the late...
Tags: Skill, Workforce Management, Servers, Tcp/Ip, Operating Systems, TechRepublic Inc., Networking, Human Resources, Software, Network Technology
Windows cannot access specified device, path or file...
I have a problem that has developed on my user account. When I try to open any EXE file or MDB file on a network drive I get the following message.Windows cannot access the specified device, path or file. You may not have the appropriate permissions to access the item.I...
Tags: firewall, permission, exe, windows, networking, mdb, software, windows xp sp 2, security, Microsoft Windows

Essential Topics

From our sponsors

Most Whitepapers in Enterprise Apps

TechRepublic features a vast library of resources from the world's leading technology companies.

TechRepublic: The Web's largest community of IT leaders

TechRepublic helps IT decision-makers identify technologies and strategies to empower workers and streamline business processes. The site delivers a unique blend of original content by IT professionals, peer-to-peer advice from the largest community of IT leaders on the Web, and a vast library of professional resources from the leading vendors in the IT industry. TechRepublic features blogs, community forums, vendor white papers, software downloads, Webcasts, and research.

Harness the Full Power of Internet Explorer
This pre-packaged presentation contains everything you need to instruct end users about how to the most out of the Internet and Internet Explorer--eve ...
Buy Now
Crash Course: HTML
This pre-packaged presentation contains everything you need to get end users up to speed about HTML --even if you don't consider yourself a public spe ...
Buy Now

Upcoming Webcasts

Upcoming Webcasts from leading IT vendors

More Upcoming and Recent Events »