Skip to content

TechRepublic

Trending Now

Image: ClickUp
Article

ClickUp: Project management software review

A Black man waves to his colleague on a video call from his office
Image: Meeko Media/Adobe Stock
Article

Report: Tech workers favor hybrid work to full-time remote setups

Two factor authentication
Image: Microgen/Adobe Stock
Article

Top 5 alternatives to Google Authenticator

Article

Microsoft Office files opened in Google Docs, Sheets or Slides now automatically sync for offline use

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of edwinsmith

edwinsmith

Send edwinsmith an email

Latest from edwinsmith

  • Finding your niche in IT consulting
    CXO

    Finding your niche in IT consulting

    Do you ever feel like your skills and talents are going to waste? It might be because you haven't found your niche within the IT consulting market. Contributing writer Edwin Smith explains how it's done.

    edwinsmith
    Published:  January 8, 2001, 12:00 AM PST Modified:  June 8, 2007, 9:05 AM PDT Read More See more CXO
  • Three steps to making an ethical decision
    CXO

    Three steps to making an ethical decision

    For most consultants, our first instinct will tell us if we're about to make an unethical decision. But what if you're in a situation where the choice isn't so cut-and-dried? Follow these rules to determine whether or not you're doing the right thing.

    edwinsmith
    Published:  November 2, 2000, 12:00 AM PST Modified:  June 8, 2007, 9:17 AM PDT Read More See more CXO
  • Ethical consulting: The Lone Ranger provides guiding principles
    CXO

    Ethical consulting: The Lone Ranger provides guiding principles

    You might think the Lone Ranger is the last folk hero who could teach you how to do business. But the masked man can guide your conduct in your dealings with clients and keep you on the right side of ethical behavior.

    edwinsmith
    Published:  October 26, 2000, 12:00 AM PDT Modified:  June 8, 2007, 9:05 AM PDT Read More See more CXO
  • Ten reasons to offer familiarization training to your clients
    CXO

    Ten reasons to offer familiarization training to your clients

    When you've finished a technology implementation for a client, make sure the client's staff understands how to use it. Read why familiarization training is necessary for your clients, and some reasons why you should offer it.

    edwinsmith
    Published:  October 16, 2000, 12:00 AM PDT Modified:  June 8, 2007, 9:36 AM PDT Read More See more CXO
  • Win the RFP game with a smart strategy
    CXO

    Win the RFP game with a smart strategy

    When it comes time to respond to a request for proposal, you'll want to be ready. These tips will help you through every step of the process.

    edwinsmith
    Published:  September 11, 2000, 12:00 AM PDT Modified:  June 8, 2007, 9:10 AM PDT Read More See more CXO
  • Protect against these critical Internet security threats
    Security

    Protect against these critical Internet security threats

    If you're worried about viruses and DoS attacks to your clients' systems, check out the SANS Institute's list of the most critical Internet security threats to the enterprise.

    edwinsmith
    Published:  August 8, 2000, 12:00 AM PDT Modified:  June 8, 2007, 9:08 AM PDT Read More See more Security
  • Aspiring consultants take heed: Here are some of the good and the bad sides about striking out on your own
    CXO

    Aspiring consultants take heed: Here are some of the good and the bad sides about striking out on your own

    If you're thinking about taking the plunge and becoming an independent consultant, it helps to know what kinds of obstacles and rewards await you. This rundown of some of the ups and downs of self-employment will prepare you for what lies ahead.

    edwinsmith
    Published:  July 25, 2000, 12:00 AM PDT Modified:  June 8, 2007, 9:05 AM PDT Read More See more CXO

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice