IT Policies

  • Downloads // Jun 2006

    IP subnetting made easy

    IP subnetting is a fundamental subject that's critical for any IP network engineer to understand, yet students have traditionally had a difficult time grasping it. After years of watching confused students struggle through school and in practice when dealing with subnetting, TechRepublic's George Ou created a simple, graphical approach that...

    Provided By George Ou

  • White Papers // Sep 2010

    University Reaches More Students Online, Spending Less

    Munich University is one of the largest institutions of its kind in Germany, with partner universities in Europe, North America, South America, and Asia, and 14,000 students. Some 11 percent of the students are located abroad. To better accommodate this international presence, the university chose Cisco WebEx™ Meeting Center to...

    Provided By Cisco Systems

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Provided By Imperva

  • White Papers // Aug 2012

    The Importance of Managing Privileged Accounts

    Discover invaluable insights on the benefits of properly managing administrative privileges, developing a policy for managing privileged accounts and enforcing those policies. Could you be managing your privileged accounts better? Download the whitepaper today and find out.

    Provided By Dell Software

  • White Papers // Feb 2014

    FTP vs MFT: Why it’s time to make the change

    Get the facts you need to make the case for managed file transfer. Read the report to get head-to-head comparisons of cost, reliability, visibility, security & management and get the information you need to make a compelling case for moving to MFT.

    Provided By IBM

  • eBooks // Mar 2014

    6 Secrets to Offering Exceptional Customer Service

    The vast majority of people are not experiencing great service. Nearly a third of consumers believe that businesses are now paying less attention to providing good customer service. On top of that, just 7% of those polled say that customer service experiences they have with companies typically exceed their...

    Provided By

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Provided By Imperva

  • White Papers // Apr 2014

    Preparing Audit Ready Financials - Best Practices to Avoid Common Pitfalls

    Independent external audits of GAAP financial statements are an inescapable reality for finance professionals. External audits are required by statute for public companies and are also becoming the norm among private companies experiencing growing demands for transparency from regulators, investors, and other stakeholders. Cloud accounting software helps finance teams...

    Provided By Intacct

  • White Papers // Jun 2014

    The 2015 Buyer's Guide to Accounting and Financial Software

    In the last few years, the demands on the finance department—from real-time reporting to global consolidation—have increased significantly. At the same time, the choices for accounting and financial software have become much more complex. How do you begin to research, evaluate, and select the right software for your business? ...

    Provided By Intacct

  • White Papers // Jul 2014

    IDC Report: The Future of eMail is Social

    This IDC white paper looks at the current state of enterprise email and perceived and real problems that surround its use. The paper discusses the changing nature of collaboration and work fueled by the social web by examining email trends and the emergence of new social collaboration tools. It reveals...

    Provided By IBM

  • Tools & Templates // Jan 2006

    Build your own consulting contract using this sample form

    Both independent consultants and their clients benefit when they're working with a solid contract. Download this sample contract from TechRepublic member and IT consultant Randy Barger as a guide for preparing your next consulting agreement. E-mail makes it easy to assume a fairly informal relationship with your clients. But...

    Provided By TechRepublic

  • Downloads // Sep 2001

    Sample service level agreement for application support

    Consulting firms that provide support to their clients use service-level agreements to make sure both sides get what they need. This SLA template, updated in November 2003, can be used to hammer out what consultants will provide for their clients.

    Provided By TechRepublic

  • Downloads // Nov 2012

    ASP.NET developer interview cheat sheet

    This list of open-ended proficiency questions and answers will come in handy for hiring managers interviewing ASP.NET developer candidates -- and it will be a useful interview prep tool for the candidates themselves.

    Provided By Tony Patton

  • White Papers // Mar 2014

    Best Practices for recruiting the right talent

    This white paper examines best practices in recruiting and the technology behind those practices. It discusses how to reduce time to hire by up to 50 percent, reduce cost per hire by up to 70 percent, and improve recruiter efficiency in finding the right talent.

    Provided By Oracle

  • White Papers // Jan 2014

    Cyber Security Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

    Provided By IBM

  • White Papers // Jul 2008

    Application Retirement: Road Map for Legacy Applications

    As technology becomes obsolete and organizations deploy new applications, many enterprise applications wind up outliving their usefulness and become known as a "Legacy application". Every organization needs to be actively looking at their IT portfolios for applications, systems, and platforms that cost them more to maintain than the value they...

    Provided By Solix Technologies

  • White Papers // Jun 2005

    Problem Management - Key Best Practices

    The ITIL framework supplies an excellent relational model on how to manage Incidents, Problems and Changes. But this model becomes much more powerful when best practices are applied; such as planning and documenting Roles and Responsibilities, proper Operational Metrics and defined processes for Knowledge Management, Root Cause Analysis, ROI Calculation...

    Provided By NetworkD

  • White Papers // Oct 2013

    Know What Your Customers Want Before They Do

    Webcast Summary: Today’s consumers and B2B companies only want interactions that are relevant, personalized, and based on a customer’s situation and preferences. Companies that fail to provide relevant offers will be left behind.

    Provided By Oracle

  • White Papers // Jul 2011

    Balancing Profitability and Risk in Banking: Overcoming Common Risk Analysis and Reporting Challenges

    Banks need a robust enterprise risk analysis and reporting solution to improve reporting accuracy and efficiency while reducing the costs and burdens of compliance. This paper will focus on the many risk reporting challenges facing banks. It will then outline the best practices banks need to improve reporting and manage...

    Provided By SAP

  • White Papers // Feb 2014

    Research - Google Apps ranked #1 by Radicati

    The Radicati Group has done some homework for companies choosing a cloud business email provider. In a report entitled “Cloud Business Email - Market Quadrant 2013”, the firm ranks Google Apps for Business ahead of all other players. A summary of Radicati’s findings can be downloaded here. Download this quick...

    Provided By Google

  • White Papers // Oct 2013

    HP ProLiant DL360p & DL380p Gen8 Servers: Power, Flexibility and Serviceability

    Explore the Power, Flexibility and Serviceability HP ProLiant DL360p and DL380p Gen8 Servers The DL360p and DL380p deliver innovative advances in performance, serviceability and lifecycle automation to address the pressing demands of today’s data-intensive and virtualized IT environments. Based on the HP ProActive Insight architecture, these intelligent servers can...

    Provided By HP & Intel® Xeon® Processor

  • Downloads // Oct 2009

    100 keyboard shortcuts for moving faster in Windows 7

    You don't have to experiment to find out which traditional shortcuts still work in Windows 7 -- or search for ones that have been added to the new OS. Just refer to this quick reference to speed common Windows 7 tasks.

    Provided By Greg Shultz

  • White Papers // Aug 2014

    Interactive Infographic: A Personal Training Guide for Your Journey to the Cloud

    Is your IT infrastructure healthy or is it struggling to meet the intensifying demands placed on it by today's evolving business environment?, are emerging trends in cloud computing, big data, mobility, and security making your IT organisation leaner, smarter and more agile, or is it making it obsolete, unresponsive, and...

    Provided By NetApp

  • eBooks // Oct 2014

    From Chaos to Control: Creating a Mature File Transfer Process

    Read this ebook from Aberdeen to learn why leading organizations are moving away from the chaos of multiple methods to a single managed file transfer platform, and get best practices for developing a secure, best-in-class file transfer process of your own.

    Provided By IBM

  • White Papers // Oct 2014

    Infographic: Symantec’s 2014 Internet Security Threat Report

    An infographic report showing the trends of cyber attacks with corresponding statistics to help you understand the current situation of security cyberspace. It looks at vulnerabilities in mobile OS as well as browsers along with spear phishing, spam and bots and gives you in depth information about how Symantec is...

    Provided By Symantec

  • Downloads // Feb 2006

    Avoid support headaches with this program rollout checklist

    Rolling out a new application can introduce chaos among users and support staff if the process isn't handled in an organized way. This comprehensive checklist will help you gather the information you need to manage the rollout and minimize support overhead. A poorly planned rollout of a new application...

    Provided By TechRepublic

  • Downloads // Dec 2010

    My 10 favorite Office tips of the year

    During 2010, Susan Harkins wrote more than 200 tips to help Office users and the techs who support them. To wrap up the year, she's selected 10 of the ones she (and TR members) liked the most.This download is also available as an entry in our 10 Things blog.

    Provided By Susan Harkins

  • Downloads // Feb 2011

    10 easy ways to speed up an Access database

    Even your least technical Access users can improve the performance of their databases. Susan Harkins shares some basic tips those users can put to work right away.This download is also available as an entry in our 10 Things blog.

    Provided By Susan Harkins

  • Downloads // Mar 2011

    Five tips for efficient file management in Windows 7

    Share these tips with Windows 7 newbies to reduce initial confusion and help them get up to speed quickly.This download is also available as an entry in our Five Tips blog.

    Provided By Susan Harkins

  • Downloads // Apr 2011

    10 cool add-ins for Office 2007 and 2010

    Add-ins let you enhance your Office apps so they can do more things -- and do things better. Susan Harkins combed through the vast sea of Office add-ins to produce this list of winners.This download is also available as an entry in our 10 Things blog and as a...

    Provided By Susan Harkins

  • Downloads // Jun 2010

    10 QuickBooks issues and how to resolve them

    When something goes wrong with QuickBooks, the consequences can be pretty dire. Luckily, many common problems are easy to fix -- once you know about them.This download is also available as an entry in our 10 Things blog.

    Provided By Jack Wallen

  • Downloads // Mar 2011

    Five tips for faster Web browsing

    If you're wasting too much time waiting (and waiting and waiting) for Web pages to load, give these tips a try. You should see an immediate, noticeable boost in speed, making your browsing experience faster and more efficient.This download is also available as an entry in our Five Tips blog.

    Provided By Jack Wallen

  • Downloads // Apr 2011

    Five tips for using Ccleaner to degunk your system

    Ccleaner is one of the best all-around tools for keeping your computer optimized and free of the junk that accumulates from Internet surfing, obsolete apps, and other fragments that clog up your system.This download is also available as an entry in our Five Tips blog.

    Provided By Jack Wallen

  • Book chapters // Aug 2006

    CCNA 1 Labs and Study Guide: Networking Basics

    Boost your understanding of networking basics and prepare for CCNA 1 course assessments with this chapter from Networking Basics CCNA 1 Labs and Study Guide, the revised and only authorized labs and study guide for the Cisco Networking Academy Program CCNA 1 curriculum. In the study guide section, test...

    Provided By Cisco Press

  • Downloads // Jun 2010

    Remove the Internet Explorer Content Advisor Password

    Users wanting to disable the Internet Explorer Content Advisor will sometimes find they have forgotten the required password. Fortunately, this annoying little problem can be solved quickly with a Windows Registry edit. This download is also available as an entry in the TechRepublic Microsoft Windows Blog.

    Provided By Mark W. Kaelin

  • Downloads // Nov 2006

    Use C# and the .NET Framework to develop your own plugin architecture

    Many dynamic applications allow third parties to create plugins that extend the functionality of the application. In the past creating an architecture that would allow plugins was difficult, which caused many developers to develop workarounds to solve business needs. Zach Smith explains how developers can leverage the .NET...

    Provided By Zach Smith

  • Downloads // Mar 2007

    Manage WinForm controls using the Anchor and Dock properties

    Many beginning WinForms developers have trouble keeping the controls on their forms uniform and organized. Often the controls look fine at design time, but when the form is resized at runtime the controls either lose their positions or don't compensate for the resized form. To alleviate this problem,...

    Provided By Zach Smith

  • Downloads // Jan 2008

    How do I... Modify Word documents using C#?

    Accessing Word components from C# isn't quite as straight-forward as many other features of C# and the .NET Framework. With that said -- it's not rocket science either. You simply need to know what to reference and how to use the components. Zach Smith lays out exactly what you need...

    Provided By Zach Smith

  • Downloads // Jun 2011

    Five Word tips that could change your life

    Searching for ways to increase your Word productivity may get in the way of your productivity. So here are a few tricks you don't need to unearth. Efficient, simple to use, easy to remember.This download is also available as an entry in our Five Tips blog.

    Provided By Jody Gilbert

  • White Papers // Sep 2011

    Development of an Expert System for Dust Explosion Risk Management Based on ASP.Net and Prolog

    Dust explosions always claim lives and cause huge financial losses. Dust explosion risk can be prevented by inherently safer design or mitigated by engineering protective system. Design of explosion prevention and protection needs comprehensive knowledge and data on the process, workshop, equipment, and combustible materials. The knowledge includes standards, expertise...

    Provided By Academy Publisher