At the Whiteboard
- TR Dojo
- CIO Sanity Savers
- News Video
- Techrepublic Video
- TR Out Loud
- At the Whiteboard
- The Green Enterprise
- Cracking Open
- All videos
Online video from TechRepublic features quick peeks at new technologies and hot products, tips and hacks for improving IT and digital living, and technology news and analysis from ZDNet.
July 12, 2006, 12:01am PDT
Sponsored: Like traditional data networks, voice networks carry their share of security risks. VOIP Watch's Andy Abramson explains "SPIT" (Spam over Internet Telephony) as well as the security concerns that come with VoIP and how to protect yourself. The content for this video was sponsored and provided by VOIP Watch.
May 30, 2006, 5:01pm PDT
Parts of the corporate network, such as disk drives and servers, can be at risk of intrusion without a proper data protection architecture. Ron Willis of Cipher Optics explains how companies are using this architecture to secure their networks.
May 9, 2006, 9:11pm PDT
Shannon Poulin, Intel's enterprise marketing director, explains its work in "ecosystem enabling." He describes how different groups within the company are working with customers to help them lower costs, mitigate risk, and grow their businesses.
April 6, 2006, 10:57pm PDT
Securing networks from the outside are a prime concern in the business world. However, Rob Meinhardt of KACE explains how complexities inside the network also can pose a major problem for organizations.
November 18, 2005, 10:43pm PST
With viruses rife and three billion spam messages flowing around the world each day, some of them Zombies sent from your own desktop, Anne Bonaparte of MailFrontier says that mail servers need to be protected with a solution that is comprehensive, affordable and easy.
November 4, 2005, 5:25pm PST | 2 | Latest comment by petike222
Madhu Yarlagadda from Yahoo says that text, voice and video are converging over the same set of protocols used by VoIP and that Instant Messenger will be the application that enables users to seamlessly move between them -- creating 'CoIP', communications over IP.
September 15, 2005, 4:37pm PDT
Day-long, painful, annual budget meetings can be a thing of the past. Cast aside the 'set in stone' budget for a 'rolling forecast,' which allows you to change your budget as business needs evolve and new opportunities arise.
September 15, 2005, 12:52am PDT
LCDs (liquid crystal displays) are more cool-looking than traditional CRTs (cathode ray tubes), but they cost twice the price. However, when you add energy costs into your TCO calculation, the difference in cost shrinks significantly.
August 10, 2005, 9:49pm PDT
Wireless Application Protocol allows you to access the internet from your cellular phone. Burton Katz of Buongiorno explains how it works and says that with faster cellular networks, better screens and more compelling content -- it's here to stay.
August 3, 2005, 10:12pm PDT
Any great website eventually runs out of capacity. Horizontal scalability with load balancers between the tiers offers redundancy -- keeping the site up and running.
August 2, 2005, 11:12pm PDT
Many people collaborate on projects via e-mail. But e-mail threads can be cumbersome, attached documents can get lost, and who has the latest version anyway? Wikis allow everyone who has access to a page to read and change it.
July 21, 2005, 9:05pm PDT
The Blackberry is the current champ in the PDA market, but it may be under threat from Windows Mobile because Exchange Server 2003 SP2 allows smart phones to scale to a level that the Blackberry can't.
July 21, 2005, 8:54pm PDT
Rootkits attack deep within operating systems and make themselves invisible to the anti-spyware and anti-virus software sent out to detect them. Learn how to use rootkit detectors, which use the same tricks as the rootkits themselves.
May 24, 2005, 9:04pm PDT
The costs of security in terms of downtime and clean-up can be considerable. But as Determina's Charles Renert explains, there are also hidden costs, such as false positives and performance hits.
April 4, 2005, 10:33pm PDT
In the traditional data center, storage, network and server experts don't tread on each other's turf. But as these tiers converge in blades servers, there's potential for a big shake-up.