Artificial intelligence and data
Best lists and buying guides
Latest from TechRepublic
-
Employees did not like the old office. Here are the office changes they want
Turns out, a little more natural light could go a long way in meeting employee office expectations as companies return to the on-site workplace after a year of remote work.
-
The 5 best standing desks and converters to add ergonomics and mobility to the workday
From compact standing desks and spacious electric options to lightweight desk risers, here are some of the best options to consider for the office or preferred home workspace.
-
4 often overlooked Google Workspace features for super administrators
Learn how a Google Workspace super administrator can adjust admin access, modify session length, check security alerts and review reports.
-
DC and Marvel superheroes top breached password lists
Even our favorite superheroes can't defend us against cyberattacks.
-
Container security: How to get the most out of best practices
Containers are complex virtual entities that provide proven benefits to the business but also require strong security guidelines. Learn how to get the most out of container security best practices.
-
Research: Increased use of low-code/no-code platforms poses no threat to developers
Thanks to low-code and no-code platforms, employees don’t need to know how to code to become a coder. This reality has increased low-code and no-code platform usage across businesses small and large. ...
-
Linux 101: Is your heart at $HOME?
An explanation of the Linux home directory for new users from Jack Wallen.
-
Developer training: Learn how to code in Python, Java, PHP and more at your own pace
Get more than 35 hours of instructions on the server side of web and app development in these online training courses.
-
Linux 101: Explaining the $PATH in Linux
Another Linux 101 tip from Jack Wallen. This time he explains and demonstrates the Linux $PATH.
-
Awareness of cyberattacks and cybersecurity may be lacking among workers
A survey of business professionals by Armis points to a lack of knowledge about recent incidents and proper cyber hygiene.
-
Linux 101: Explaining the SUID permission
Jack Wallen explains the SUID permission in his Linux 101 series.
-
Non-relational's quiet revolution in databases
Commentary: It's no longer exciting to talk about the rise of non-relational databases, but it's happening all the same.
-
How to install the iOS 15 public beta
Anyone who wants to brave beta bugs can try iOS 15 now with Apple's newly available public beta. Here's how to install it, along with the public betas for watchOS 8 and iPadOS 15.
-
Daily Standup Meeting Policy
Daily standup meetings are a common way for teams and groups to touch base on their ongoing activities and responsibilities. Employees can discuss progress they have made, tasks underway, upcoming mil...
-
Linux 101: Open a terminal quickly in a specific directory
Jack Wallen shows you a shortcut that will make working with the Linux terminal on a desktop easier.
-
The possible reasons Google is moving away from APKs on Android
Google has announced it is moving away from the APK format for Android apps. Jack Wallen offers his opinion on why this could be happening.
-
Survey: Low-code and no-code platform usage increases
47% of respondents' organizations currently use the technology.
-
How to set Google Search History to auto-delete on Android
If you don't like the idea of your Android search history being saved, Jack Wallen wants to show you how to set it to auto-delete.




















