Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of elisabethnelson

elisabethnelson

Send elisabethnelson an email

Latest from elisabethnelson

  • Connectivity is the biggest VPN problem
    Networking

    Connectivity is the biggest VPN problem

    If you're having VPN difficulties, chances are that connectivity is the culprit. That's what 44 percent of respondents to this Polling Place Quick Poll indicated. See what other issues are often to blame.

    elisabethnelson
    Published:  February 1, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:06 AM PDT Read More See more Networking
  • Policies for wireless technology are rare
    Networking

    Policies for wireless technology are rare

    With the proliferation of wireless technologies, such as cell phones, BlackBerries, and Internet-enabled PDAs, you might think that most companies would have policies concerning their use. But not so, according to these Polling Place results.

    elisabethnelson
    Published:  January 30, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:17 AM PDT Read More See more Networking
  • Don’t miss fixes for ICQ client and Novell apps
    Security

    Don’t miss fixes for ICQ client and Novell apps

    This week, Exterminator looks at a CERT advisory for the ICQ instant messaging service and offers the lowdown on Novell's newest patches. You can also catch Trend Micro reports on the MyParty worm and several other recent viruses.

    elisabethnelson
    Published:  January 30, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:34 AM PDT Read More See more Security
  • Interest in wireless Ethernet drops
    Networking

    Interest in wireless Ethernet drops

    Respondents to this Polling Place Quick Poll indicated that adoption of a wireless Ethernet solution isn't likely. Here are the results.

    elisabethnelson
    Published:  January 29, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:30 AM PDT Read More See more Networking
  • Laptops and PDAs boosted productivity the most
    Hardware

    Laptops and PDAs boosted productivity the most

    When we asked our IT Manager members to indicate which mobile computing device had the largest impact on productivity last year, the clear winner was the laptop computer. Take a look at the results.

    elisabethnelson
    Published:  January 25, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:09 AM PDT Read More See more Hardware
  • Consultants should brush up on government and healthcare
    CXO

    Consultants should brush up on government and healthcare

    With so much attention focused on industries and businesses that have experienced layoffs, there's been scant attention given to sectors that will likely hire consultants this year. Here's where TechRepublic members predict the jobs will be.

    elisabethnelson
    Published:  January 25, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:15 AM PDT Read More See more CXO
  • Get updates for Novell’s Internet Messaging System
    Security

    Get updates for Novell’s Internet Messaging System

    Exterminator brings you weekly updates on bug fixes, virus recovery, service release announcements, and security notices for Windows, Novell, Linux, and other systems. Novell issuesRegarding: NetWare 4.2Date posted: Jan. 17, 2002Patch URL: Click here to download the patch.Information URL: Click here for more information. This patch fixes a problem with an earlier patch, PK411.NLM v9.05, which was ...

    elisabethnelson
    Published:  January 23, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:30 AM PDT Read More See more Security
  • IT departments are not likely to grow this year
    Tech & Work

    IT departments are not likely to grow this year

    Don't expect a flurry of hiring activity this year. More than 60 percent of respondents to this Polling Place Quick Poll expect their IT department to remain the same size or shrink in the coming year.

    elisabethnelson
    Published:  January 23, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:34 AM PDT Read More See more Tech & Work
  • Spending on technology projects should remain stable
    CXO

    Spending on technology projects should remain stable

    When asked about their spending plans for 2002, almost half of the respondents to this Polling Place Quick Poll indicated that they don't expect their spending to change at all.

    elisabethnelson
    Published:  January 23, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:24 AM PDT Read More See more CXO
  • Purchasing PCs far outnumbers leasing
    Banking

    Purchasing PCs far outnumbers leasing

    Despite leasing's advantages, almost five times as many organizations prefer to buy their desktop workstations. Take a look at the numbers, and then post a comment about why you prefer to buy or lease.

    elisabethnelson
    Published:  January 22, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:09 AM PDT Read More See more Banking
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 10
  • 20
  • Next
200 results

TechRepublic Premium

  • TechRepublic Premium

    How to recruit and hire a Scrum Master

    Recruiting a Scrum Master with the right combination of technical expertise and experience will require a comprehensive screening process. This hiring kit provides a customizable framework your business can use to find, recruit and ultimately hire the right person for the job. This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  August 5, 2022, 5:00 PM PDT Modified:  August 7, 2022, 4:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Web 3.0 quick glossary

    Knowing the terminology associated with Web 3.0 is going to be vital to every IT administrator, developer, network engineer, manager and decision maker in business. This quick glossary will introduce and explain concepts and terms vital to understanding Web 3.0 and the technology that drives and supports it.

    Downloads
    Published:  August 4, 2022, 5:00 PM PDT Modified:  August 7, 2022, 1:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire a User Experience Designer

    While the perfect color palette or the most sublime button shading or myriad of other design features play an important role in any product’s success, user interface design is not enough. Customer engagement and retention requires a strategic plan that attempts to measure, quantify and ultimately create a complete satisfying user experience on both an ...

    Published:  August 4, 2022, 5:00 PM PDT Modified:  August 7, 2022, 3:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice