Latest from TechRepublic
-
One surprising statistic explains why phishing will remain the most common cyberattack for the next few years
Phishing is now as simple as buying the right tools, making it impractical to fight. It's time for users to accept responsibility.
-
Survey: Has smart office tech made your work life easier, or caused more hassles?
Take this quick survey and tell us about your experience with digital assistants, videoconferencing solutions, connected thermostats, and other smart office tech.
-
Why Oracle can't buy its way to success in the cloud wars
Oracle is used to buying its way into markets, but that won't work in the cloud. Here's why.
-
Dell shows off new 'world's smallest' 13" laptop in anticipation of CES 2018
The new XPS 13 laptop is filled with improvements, and Dell manages to pack them all into a smaller machine.
-
Want to set up a network of Raspberry Pi computers? Here's how to do it
The Raspberry Pi Foundation has released PiServer, a tool which allows users to easily set up a network of Raspberry Pi computers.
-
System update policy
To ensure security and stability, it’s critical to have standardized, well-documented practices for installing software updates. This policy offers guidelines for managing the update process, logging ...
-
AT&T aims to have real 5G in 12 markets by the end of 2018
The company also plans to expand its advanced LTE and Fiber networks to several metro areas throughout the year.
-
How to fix macOS Touch ID after High Sierra update
Some upgrades to macOS High Sierra have reportedly caused Touch ID to stop working. If that's happened to you, Jack Wallen has the fix.
-
ASUS unveils portable OLED 4K monitor for business travelers
Ahead of CES, the firm also revealed a new home mesh network system and external GPU enclosure.
-
Top 5: Tech trends that will make headlines in 2018
With each new year comes a fresh crop of tech stories. Here are Tom Merritt's predictions about the five topics we'll hear most about in 2018.
-
Google Apps Script vulnerability could lead SaaS apps to download malware
Hackers are leveraging Software as a Service platforms including Google Drive to download malware to victims, according to Proofpoint.
-
How to access your local iCloud folder from the terminal
Working within the terminal window doesn't mean you can't keep your code, configuration files, or text files in sync with your iCloud account. Jack Wallen shows you how to make this easy.
-
Critical DHS breach put 250K employees' personal data at risk
The case management system used by the DHS Office of the Inspector General was breached, but the organization said it wasn't the result of a cyberattack.
-
Incident response policy
Every enterprise needs to establish a plan of action to assess and then recover from unauthorized access to its network. This policy provides a foundation from which to start building your specific pr...
-
Nissan's plan for safer autonomous driving? Connect the car to a human brain
Instead of removing the driver, new Nissan technology builds off the human brain for safer, more comfortable driving.
-
Massive Intel CPU flaw: Understanding the technical details of Meltdown and Spectre
Two critical architectural flaws in CPUs allow user processes to read kernel memory, affecting Intel, AMD, and ARM processors. Here's what you need to know.
-
HP's newest 'zero' client offers improved security, VMware and Amazon integrations
The t310 G2 All-in-One Zero Client is powered by Teradici and has a full HD display.
-
10 ways AI will impact the enterprise in 2018
Despite AI's promise across many industries, some companies still face implementation challenges.











