N - R Topics
-
Great places to take an introvert on a date
Jessica Mills notes that many of her fellow geeks share her insecurities about social situations. If this sounds like you too, read her suggestions (some of which are unconventional) about where to go...
-
IT consultants bear client education burden
It's not your fault when an older application isn't compatible with a newer OS, but clients may not see it that way. The key is to educate clients about how to minimize such issues.
-
Four ways to generate or process Inkscape vector graphics automatically
Marco Fioretti shows you how to use the open source program Inkscape to automatically generate or modify vector graphics.
-
Introduction to GIMP image editing tool with simple demos
Ryan Boudreaux offers an overview of the GIMP image editing features and uses some of them to demonstrate what you can do with this tool.
-
How to deal with DDoS extortions
Patrick Lambert looks at some of the ways you can protect your website from DDoS extortion threats.
-
Top 10 IT consulting posts in 2012
Here are the 10 most-read TechRepublic posts about IT consulting in 2012.
-
A developer's guide to copyright and trademark in Google Play
Android app developer William J. Francis interviews attorney Suzy Fulton, an IP and due diligence specialist, about trademarks, copyrights, and patents. She advises app developers to maintain a sense ...
-
10 ways tech support has changed since the 1980s
Over the past 30 years, IT has seen some monumental changes -- and they've had a huge impact on the field of tech support. See if you remember the way it used to be.
-
T-shirt of the week: Buccaneer-Americans
For those who are wondering why many of their more Internet-addicted coworkers and associates are adopting a Jack Sparrow accent of late, it's because today is "Talk Like a Pirate Day."
-
Samsung Galaxy Note II S Pen tips and tricks
Jack Wallen highlights some S Pen features that will help you make the most out of your Samsung Galaxy Note II.
-
Survey says: People do care about their privacy
Finally, someone asked users how important it was to remain private while online. Michael Kassner shares what the research team found, including some surprises.
-
Scariest stuff from BlackHat 2012
NFC hacking, ultra-stealthy malware, and hotel room lock and keycard weaknesses made this list of some of the scariest demonstrated exploits at BlackHat 2012.
-
The problem with project risk management
Michelle Symonds argues that risk management fails to effectively address the real project risks: the unknown unknowns.