IT Policies

  • White Papers // Sep 2014

    Ovum Report: New Versions of IBM Notes and Domino Show Microsoft the Way Forward

    Ovum's assessments of IBM's collaboration portfolio over the last four years have put IBM ahead of the field in terms of technical capability. Read how Ovum believes this momentum will translate to improved market leadership for IBM Notes and Domino as well.

    Provided By IBM

  • White Papers // Sep 2014

    Evolving Toward the Next Phase of Email

    According to most corporate decision makers and influencers, email is the single most important application they have deployed! The typical user spends two hours per day working in the corporate email system and sends or receives a median of 130 emails per day. Moreover, email is the primary method for:...

    Provided By IBM

  • White Papers // Sep 2014

    Improving Collaboration by Adding Social Capabilities to Email

    This IDC Technology Spotlight paper takes a look at why Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. In addition, as relationships across all...

    Provided By IBM

  • White Papers // Sep 2014

    Is your server security system leaving you hanging in the cloud?

    Are you in need of a server security system that can protect your cloud servers, as well as physical and virtual environments? The new McAfee Server Security Suite can.

    Provided By Intel Security McAfee

  • White Papers // Sep 2014

    Which provider earned the highest rating in endpoint protection?

    NSS Labs tested 11 popular Endpoint Protection Products (EPP) to measure their effectiveness in protecting Windows computers against exploits. If you are seeking protection from exploit driven attacks on your business’ desktop PCs and laptops, you should examine the results from this test very closely.

    Provided By Intel Security McAfee

  • White Papers // Sep 2014

    Can your endpoint protection provider respond to the growing number of threats in real time?

    If you work on the front lines of security, real-time security tools can tell you the state of endpoints in seconds, can help you to immediately respond to advanced threats, and can scale to your growing enterprise. Take a look at this infographic and understand how McAfee is revolutionizing security...

    Provided By Intel Security McAfee

  • Videos // Sep 2014

    Free Online Seminar - Securing Your Hybrid Data Centres

    Are you concerned about the security challenges in your hybrid data centre? Join us in a must-watch online seminar and learn how to tackle the security challenges of your hybrid data centre. Limited spots available. Register for free today.

    Provided By Intel Security McAfee

  • White Papers // Sep 2014

    Aberdeen: Exploit Data To Improve The Customer Experience

    Analyst report from Aberdeen on how companies using analytics as part of customer service activities perform compared to those without analytics.

    Provided By IBM

  • White Papers // Sep 2014

    Aberdeen: Improving Efficiency and Reducing Costs

    Analyst Insight report from Aberdeen on HCM trends that examines how organizations are digitizing information & investing in document management solutions to lift administrative burden placed on HR, centralize all information & improve the way they operate.

    Provided By IBM

  • White Papers // Sep 2014

    Forrester: The Business Value of Social Content

    Analyst report from Forrester on how leading organizations are investing in integrated collaborative and social solutions, and find out how to develop a strategy that will drive the most value for your business.

    Provided By IBM

  • White Papers // Sep 2014

    The Berliner Volksbank Increases its Network Flexibility

    A case study on HP’s partnership with Berliner Volksbank, one of the largest cooperative banks in Germany, and how HP Networking provides them everything they need for their WAN and LAN solutions. HP is the sponsor of this material. By submitting your information you agree to be contacted by...

    Provided By Hewlett-Packard (HP)

  • White Papers // Sep 2014

    Store Less, Spend Less: Managing Data According to Its Economic Value

    Not storing data is cheaper than storing it. As enterprise data continues to grow and IT budgets remain flat, organizations need to more effectively maximize existing storage capacity and manage storage spend based on data value. In this white paper, Enterprise Strategy Group Sr. Analyst Mark Peters demonstrates how IBM's...

    Provided By IBM

  • White Papers // Sep 2014

    Novartis AG Increases Disposition Capability Ten-Fold

    Novartis, the multinational pharmaceutical company, required an efficient, defensible approach to retain information of business value or subject to regulatory requirement, preserve information needed for litigation and discard unnecessary information.

    Provided By IBM

  • White Papers // Sep 2014

    Buyer Brief: Improving the Management and Governance of Unstructured Data

    Maximize efficiency with deeper insight to data value and automated, policy-based compliance, retention & disposition.

    Provided By IBM

  • White Papers // Sep 2014

    Disposing of Digital Debris: Information Governance Strategy and Practice in Action

    Read this report from the Compliance, Governance and Oversight Council (CGOC) to learn how to reduce costs and increase performance by disposing of digital debris.

    Provided By IBM

  • White Papers // Sep 2014

    Information Lifecycle Governance Leader Reference Guide

    Data is growing at unprecedented rates. But how much of it is useful to your business? Read this leader guide from the Compliance, Governance and Oversight Council (CGOC) to learn how to deal with excessive data, get more value from information assets, control costs, ensure compliance, and reduce risk.

    Provided By IBM

  • White Papers // Sep 2014

    Information Lifecycle Governance Requirements Kit

    Data volumes are getting out of control, but choosing the right information life cycle governance solution can be a huge challenge, with multiple stakeholders, numerous business processes, and extensive solution requirements. Use this requirements kit from the Compliance, Governance and Oversight Council (CGOC) to find the tools and technology you...

    Provided By IBM

  • White Papers // Sep 2014

    Are You a Data Hoarder?

    This Information Week article discusses the big data craze’s impact on IT managers. In conjunction with the Compliance, Governance and Oversight Council (CGOC), the article explores how hoarding your organization’s data may be a bad idea.

    Provided By IBM

  • Case Studies // Sep 2014

    US Industrial Products Company Enhances Compliance

    This case study explores how one US company was inspired by the TV appearance of IBM Watson to revolutionize their records management company wide, a discovery with far-reaching implications for your organization as well as categorizing content consistently, uniformly and accurately, complying more easily with internal and governmental compliance, and...

    Provided By IBM

  • White Papers // Sep 2014

    The Central Role of Content Management in Case Management

    MWD Advisers report on how Case Management technology can help drive effective outcomes and how a clear Content Management strategy underpins success in Case Management.

    Provided By IBM

  • White Papers // Sep 2014

    Winning the Paper Wars - Capture the Content and Mobilize the Process Troops

    The paybacks from paper-free processes can be dramatic: much improved response times and greater productivity of back-office staff. Extending capture to mobile devices provides even closer coupling to back-office workflows. Yet the progress being made towards paper-free processes is very slow. In this report, AIIM looks at the reasons for...

    Provided By IBM

  • White Papers // Sep 2014

    The Cross-Browser Configuration Conundrum

    With the proliferation of available browsers, plus the boom in usage of devices to navigate the Internet, cross-browser testing has become a vital part of website development. Developers must ensure that, no matter which browsers are used to view their website the site will look and function the same way.

    Provided By Micro Focus

  • White Papers // Aug 2014

    7 Key Steps to ITSM Goodness

    Every service management project or operation must be built as a collaborative process with customers, and it must be focused on business outcomes, not simply based around technology or process. ITSM Goodness targets the need to listen to customers and to establish a structure of outcome-driven services. This Whitepaper...

    Provided By Citrix

  • eBooks // Aug 2014

    Sensible Service Management eBook

    This Sensible service management guide written by Rob England, the IT Skeptic, aims to cut through all the noise and jargon to tell IT managers why service management can be useful and why it doesn’t need to be so complex. The guide is broken into 11 best practices. Check this...

    Provided By Citrix

  • White Papers // Aug 2014

    The Future of Service Desk

    What does the future of the service desk look like? Of course, the answer to this question depends on how far ahead we want to look. What can we do right now to prepare for the future? The first thing is to ensure that you have all the service...

    Provided By Citrix

  • White Papers // Aug 2014

    BYOD - The Future of IT is Now

    The wave toward Bring Your Own Devices (BYOD) and Bring Your Own Applications (BYOA) has been building since roughly 2007, but has now become a tsunami. Many organizations are realising the variety of benefits provided by BYODA and are embracing them. However, while IT may have warmed to the...

    Provided By Citrix

  • Research // Aug 2014

    The Hidden Cost of Compliance

    Database auditing is an integral part of every organization’s compliance protocol, but the built-in auditing tools that come with your database exact a heavy toll on hardware, software, storage, and human resource costs. Businesses have to comply with data protection statutes in more than 100 countries around the world,...

    Provided By Imperva

  • White Papers // Aug 2014

    Interactive Infographic: A Personal Training Guide for Your Journey to the Cloud

    Is your IT infrastructure healthy or is it struggling to meet the intensifying demands placed on it by today's evolving business environment?, are emerging trends in cloud computing, big data, mobility, and security making your IT organisation leaner, smarter and more agile, or is it making it obsolete, unresponsive, and...

    Provided By NetApp

  • White Papers // Aug 2014

    Managing the Complexity of Today's Hybrid IT Environments

    There are many factors driving the complexity of IT today, each making it harder for organizations to get their hands around IT. As a result IT managers, need new ways to effectively manage and secure their environment and ensure IT service and business success. Read this whitepaper to...

    Provided By Kaseya

  • White Papers // Aug 2014

    IBM Threat Protection System

    IBM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.

    Provided By IBM

  • White Papers // Aug 2014

    InfoTech Cloud File Sharing Market Report

    Organizations are increasingly turning to cloud file sharing solutions to meet end-user's needs for a lightweight and effective collaboration tool. In this report, Info-Tech highlights their evaluation of eight leading vendors in this market, including Google, Dropbox, Microsoft, Box and others. See how each scored and find out who emerged...

    Provided By Box

  • White Papers // Aug 2014

    2014 Gartner Critical Capabilities for SIEM

    IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases. Gartner notes that SIEM...

    Provided By IBM

  • White Papers // Aug 2014

    IBM PureApplication System for IBM WebSphere Application Server Workloads

    Businesses that depend on web applications look to increase efficiency and reduce complexity, but many tasks required for application development and deployment are time-consuming and costly. IBM PureApplication System for IBM WebSphere Application Server can address these challenges.

    Provided By IBM

  • White Papers // Aug 2014

    Empowering your Organization Through Patterns of Expertise

    The skills needed to design, test, configure and integrate solutions can be costly. IT managers may be unable to develop and deploy applications efficiently, even in virtual and cloud environments. IBM PureSystems is designed to deliver faster time-to-value, reduced costs and lower risk.

    Provided By IBM

  • White Papers // Aug 2014

    Easily deploy and move enterprise applications in the cloud

    "What if your organization could take advantage of emerging business opportunities by deploying new applications dramatically faster than you ever could before? What if you could increase the value of your existing application investments by leveraging them in the cloud—and easily move your apps across off-premises and on-premises cloud options?...

    Provided By IBM

  • White Papers // Aug 2014

    The Future of Data Services Delivery and Management Starts Here

    When today’s businesses succeed, they can outstrip the capabilities of existing data systems. Data workloads are evolving and as a result data services need to be more robust and scalable. IBM PureApplication System and IBM PureData System for Transactions are designed to meet these needs.

    Provided By IBM

  • White Papers // Aug 2014

    Simple is STILL Better - Embraced Speed & Simplicity for a Competitive Edge

    First generation warehouses were not designed to manage data at today's volume or variety. Coercing older technologies to satisfy new demands can be inefficient, burdensome and costly. Read how IBM PureData System for Analytics is built for simplicity and speed.

    Provided By IBM

  • White Papers // Aug 2014

    Resolving the Database Performance Blame Game

    When an application slows down, can you immediately tell which component is underperforming? If not, you need to see how Dell Foglight for Databases shows the operational and performance health of each component all on a single pane of glass. Download the white paper to see how you can end...

    Provided By Dell Software

  • White Papers // Aug 2014

    Forrester Report: Build a Better Business Case for UC

    This report details Forrester Research, Inc.’s recommendation for IT professionals building out a Unified Communications and Collaboration infrastructure within their business. The key to success of a UC deployment is delivering benefits to both users and business units. This report guides IT professionals through the key needs, drivers, and likely...

    Provided By ShoreTel

  • White Papers // Jul 2014

    Whitepaper: What Your Peers Are Doing to Prime Their  Human Resources and Financial Systems

    Businesses facing growth and change require systems that evolve with them. The fact is, traditional software is simply too rigid to keep pace. Your savvy peers are transforming their systems to run in the cloud. Read the whitepaper to learn how you can, too, and benefit long into the future.

    Provided By Workday

  • White Papers // Jul 2014

    IDC Report: The Future of eMail is Social

    This IDC white paper looks at the current state of enterprise email and perceived and real problems that surround its use. The paper discusses the changing nature of collaboration and work fueled by the social web by examining email trends and the emergence of new social collaboration tools. It reveals...

    Provided By IBM

  • Downloads // Nov 2012

    ASP.NET developer interview cheat sheet

    This list of open-ended proficiency questions and answers will come in handy for hiring managers interviewing ASP.NET developer candidates -- and it will be a useful interview prep tool for the candidates themselves.

    Provided By Tony Patton

  • White Papers // Mar 2014

    Best Practices for recruiting the right talent

    This white paper examines best practices in recruiting and the technology behind those practices. It discusses how to reduce time to hire by up to 50 percent, reduce cost per hire by up to 70 percent, and improve recruiter efficiency in finding the right talent.

    Provided By Oracle

  • White Papers // Jul 2014

    Maximize your UC&C Outcomes

    Unified communications and collaboration (UC&C) solutions like Microsoft® Lync® are transforming the workplace. With presence, real-time voice, HD video, and rich collaboration capabilities seamlessly integrated into their office productivity suite, today’s employees can engage customers and connect with colleagues and partners from anywhere, at any time, using any device. Read...

    Provided By HP US

  • eBooks // Feb 2014

    Achieve Deeper Network Security and Application Control (ebook)

    Next-generation firewalls have revolutionized network security. Traditional firewalls that focus on stateful packet inspection and access control rules are ineffective. Learn how to protect your organization from ever-evolving threats with a firewall that delivers a deeper level of network security.

    Provided By Dell Software

  • White Papers // Jan 2014

    Cyber Security Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

    Provided By IBM

  • White Papers // Jul 2008

    Application Retirement: Road Map for Legacy Applications

    As technology becomes obsolete and organizations deploy new applications, many enterprise applications wind up outliving their usefulness and become known as a "Legacy application". Every organization needs to be actively looking at their IT portfolios for applications, systems, and platforms that cost them more to maintain than the value they...

    Provided By Solix Technologies

  • White Papers // Jun 2005

    Problem Management - Key Best Practices

    The ITIL framework supplies an excellent relational model on how to manage Incidents, Problems and Changes. But this model becomes much more powerful when best practices are applied; such as planning and documenting Roles and Responsibilities, proper Operational Metrics and defined processes for Knowledge Management, Root Cause Analysis, ROI Calculation...

    Provided By NetworkD

  • White Papers // Jun 2014

    HP Data sheet: IT process automation across physical, virtual, and cloud architectures

    In this report HP Data sheet: IT process automation across physical, virtual, and cloud architectures brings some insights on how to overcome the increasingly complex data centre challenges and implement a successful IT process automation.

    Provided By HP US

  • White Papers // Oct 2013

    Know What Your Customers Want Before They Do

    Webcast Summary: Today’s consumers and B2B companies only want interactions that are relevant, personalized, and based on a customer’s situation and preferences. Companies that fail to provide relevant offers will be left behind.

    Provided By Oracle

  • White Papers // Jul 2011

    Balancing Profitability and Risk in Banking: Overcoming Common Risk Analysis and Reporting Challenges

    Banks need a robust enterprise risk analysis and reporting solution to improve reporting accuracy and efficiency while reducing the costs and burdens of compliance. This paper will focus on the many risk reporting challenges facing banks. It will then outline the best practices banks need to improve reporting and manage...

    Provided By SAP

  • White Papers // Feb 2014

    Research - Google Apps ranked #1 by Radicati

    The Radicati Group has done some homework for companies choosing a cloud business email provider. In a report entitled “Cloud Business Email - Market Quadrant 2013”, the firm ranks Google Apps for Business ahead of all other players. A summary of Radicati’s findings can be downloaded here. Download this quick...

    Provided By Google

  • White Papers // Oct 2013

    HP ProLiant DL360p & DL380p Gen8 Servers: Power, Flexibility and Serviceability

    Explore the Power, Flexibility and Serviceability HP ProLiant DL360p and DL380p Gen8 Servers The DL360p and DL380p deliver innovative advances in performance, serviceability and lifecycle automation to address the pressing demands of today’s data-intensive and virtualized IT environments. Based on the HP ProActive Insight architecture, these intelligent servers can...

    Provided By HP & Intel® Xeon® Processor

  • Downloads // Feb 2005

    Create a site for e-commerce with PHP, MySQL, and PayPal

    This how-to article offers step-by-step instructions for adding e-commerce capabilities to your existing Web site using PHP, MySQL, and PayPal. The method outlined here lets you add e-business functionality to your corporate portal without a major allocation of scarce development resources.

    Provided By TechRepublic

  • Tools & Templates // Aug 2002

    Sample project proposal template

    Being able to quickly explain the potential benefits of an added Web site feature can help a consultant address a client's concerns over a project's importance. This project proposal sheet will help persuade your clients to take the plunge.

    Provided By TechRepublic

  • Book chapters // Jul 2005

    Measure help desk performance more effectively

    This sample chapter, taken from McGraw-Hill's Introduction to Help Desk Concepts and Skills, examines different approaches to measuring help desk performance. Accurately measuring help desk performance is challenging. Statistics that seem impressive at first glance are often misleading when examined more closely. Help desk managers must look beyond an...

    Provided By McGraw-Hill Professional

  • Downloads // Feb 2006

    Avoid support headaches with this program rollout checklist

    Rolling out a new application can introduce chaos among users and support staff if the process isn't handled in an organized way. This comprehensive checklist will help you gather the information you need to manage the rollout and minimize support overhead. A poorly planned rollout of a new application...

    Provided By TechRepublic

  • Downloads // Jan 2006

    Troubleshoot 10 common Exchange problems with these expert answers

    This list outlines 10 common Exchange problems and solutions. This handy two-page list outlines 10 familiar Exchange problems and an assortment of solutions. From user access errors to mail delivery problems, this list is great quick reference for every Exchange administrator.Here's a sample:Number 1: Users cannot access server. -...

    Provided By TechRepublic

  • Downloads // Oct 2009

    100 keyboard shortcuts for moving faster in Windows 7

    You don't have to experiment to find out which traditional shortcuts still work in Windows 7 -- or search for ones that have been added to the new OS. Just refer to this quick reference to speed common Windows 7 tasks.

    Provided By Greg Shultz

  • White Papers // Aug 2014

    Interactive Infographic: A Personal Training Guide for Your Journey to the Cloud

    Is your IT infrastructure healthy or is it struggling to meet the intensifying demands placed on it by today's evolving business environment?, are emerging trends in cloud computing, big data, mobility, and security making your IT organisation leaner, smarter and more agile, or is it making it obsolete, unresponsive, and...

    Provided By NetApp

  • eBooks // Oct 2014

    From Chaos to Control: Creating a Mature File Transfer Process

    Read this ebook from Aberdeen to learn why leading organizations are moving away from the chaos of multiple methods to a single managed file transfer platform, and get best practices for developing a secure, best-in-class file transfer process of your own.

    Provided By IBM

  • White Papers // Oct 2014

    Infographic: Symantec’s 2014 Internet Security Threat Report

    An infographic report showing the trends of cyber attacks with corresponding statistics to help you understand the current situation of security cyberspace. It looks at vulnerabilities in mobile OS as well as browsers along with spear phishing, spam and bots and gives you in depth information about how Symantec is...

    Provided By Symantec

  • Downloads // Dec 2010

    My 10 favorite Office tips of the year

    During 2010, Susan Harkins wrote more than 200 tips to help Office users and the techs who support them. To wrap up the year, she's selected 10 of the ones she (and TR members) liked the most.This download is also available as an entry in our 10 Things blog.

    Provided By Susan Harkins

  • Downloads // Feb 2011

    10 easy ways to speed up an Access database

    Even your least technical Access users can improve the performance of their databases. Susan Harkins shares some basic tips those users can put to work right away.This download is also available as an entry in our 10 Things blog.

    Provided By Susan Harkins

  • Downloads // Mar 2011

    Five tips for efficient file management in Windows 7

    Share these tips with Windows 7 newbies to reduce initial confusion and help them get up to speed quickly.This download is also available as an entry in our Five Tips blog.

    Provided By Susan Harkins

  • Downloads // Apr 2011

    10 cool add-ins for Office 2007 and 2010

    Add-ins let you enhance your Office apps so they can do more things -- and do things better. Susan Harkins combed through the vast sea of Office add-ins to produce this list of winners.This download is also available as an entry in our 10 Things blog and as a...

    Provided By Susan Harkins

  • Downloads // Jun 2010

    10 QuickBooks issues and how to resolve them

    When something goes wrong with QuickBooks, the consequences can be pretty dire. Luckily, many common problems are easy to fix -- once you know about them.This download is also available as an entry in our 10 Things blog.

    Provided By Jack Wallen

  • Downloads // Mar 2011

    Five tips for faster Web browsing

    If you're wasting too much time waiting (and waiting and waiting) for Web pages to load, give these tips a try. You should see an immediate, noticeable boost in speed, making your browsing experience faster and more efficient.This download is also available as an entry in our Five Tips blog.

    Provided By Jack Wallen

  • Downloads // Apr 2011

    Five tips for using Ccleaner to degunk your system

    Ccleaner is one of the best all-around tools for keeping your computer optimized and free of the junk that accumulates from Internet surfing, obsolete apps, and other fragments that clog up your system.This download is also available as an entry in our Five Tips blog.

    Provided By Jack Wallen

  • Book chapters // Aug 2006

    CCNA 1 Labs and Study Guide: Networking Basics

    Boost your understanding of networking basics and prepare for CCNA 1 course assessments with this chapter from Networking Basics CCNA 1 Labs and Study Guide, the revised and only authorized labs and study guide for the Cisco Networking Academy Program CCNA 1 curriculum. In the study guide section, test...

    Provided By Cisco Press

  • Downloads // Jun 2010

    Remove the Internet Explorer Content Advisor Password

    Users wanting to disable the Internet Explorer Content Advisor will sometimes find they have forgotten the required password. Fortunately, this annoying little problem can be solved quickly with a Windows Registry edit. This download is also available as an entry in the TechRepublic Microsoft Windows Blog.

    Provided By Mark W. Kaelin

  • Downloads // Nov 2006

    Use C# and the .NET Framework to develop your own plugin architecture

    Many dynamic applications allow third parties to create plugins that extend the functionality of the application. In the past creating an architecture that would allow plugins was difficult, which caused many developers to develop workarounds to solve business needs. Zach Smith explains how developers can leverage the .NET...

    Provided By Zach Smith

  • Downloads // Mar 2007

    Manage WinForm controls using the Anchor and Dock properties

    Many beginning WinForms developers have trouble keeping the controls on their forms uniform and organized. Often the controls look fine at design time, but when the form is resized at runtime the controls either lose their positions or don't compensate for the resized form. To alleviate this problem,...

    Provided By Zach Smith

  • Downloads // Jan 2008

    How do I... Modify Word documents using C#?

    Accessing Word components from C# isn't quite as straight-forward as many other features of C# and the .NET Framework. With that said -- it's not rocket science either. You simply need to know what to reference and how to use the components. Zach Smith lays out exactly what you need...

    Provided By Zach Smith

  • Downloads // Jun 2011

    Five Word tips that could change your life

    Searching for ways to increase your Word productivity may get in the way of your productivity. So here are a few tricks you don't need to unearth. Efficient, simple to use, easy to remember.This download is also available as an entry in our Five Tips blog.

    Provided By Jody Gilbert

  • White Papers // Sep 2011

    Development of an Expert System for Dust Explosion Risk Management Based on ASP.Net and Prolog

    Dust explosions always claim lives and cause huge financial losses. Dust explosion risk can be prevented by inherently safer design or mitigated by engineering protective system. Design of explosion prevention and protection needs comprehensive knowledge and data on the process, workshop, equipment, and combustible materials. The knowledge includes standards, expertise...

    Provided By Academy Publisher

  • Downloads // Jul 2010

    10 ways Backstage view helps streamline tasks in Office 2010

    Office 2010 offers an improved, more logical interface for performing common file tasks. Here's a look at where various familiar features are located in Backstage view, along with a few brand new items.This download is also available as an entry in our 10 Things blog.

    Provided By Katherine Murray

  • Downloads // Jul 2008

    Track a user's Internet Explorer History with IEHistoryView

    Tracking a user's browsing history can be both an expensive and a daunting task, especially if you're a one-man shop in a small company. IEHistoryView from NirSoft is a simple, yet powerful, tool you can use to quickly see a user's browsing history. This download is also available as an...

    Provided By Wally Bahny

  • Downloads // Apr 2011

    10 tips for smarter, more efficient Internet searching

    These days, everyone is expected to be up to speed on Internet search techniques. But there are still a few tricks that some users -- and even savvy searchers -- may not be aware of.This download is also available as an entry in our 10 Things blog.

    Provided By Alan Norton

  • Downloads // Jun 2007

    How do I... fill Word form fields with Access data?

    Filling a Word form with Access data can be useful when you need to use Word's formatting features to present that data in just the right way. Fortunately, the process is simple, whether sharing one record or thousands. Access expert Susan Harkins walks through this technique and provides the VBA...

    Provided By Susan Harkins