Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of Guest Contributor

Guest Contributor

Send Guest Contributor an email

Latest from Guest Contributor

  • A hand touching a hologram that says edge computing.
    Image: ra2 studio/Adobe Stock
    Edge

    Debunking edge predictions of 2023

    While predictions may claim edge computing will boom in 2023, Dr. Ritesh Mukherjee. SVP and General Manager at Inseego, reckons there is room for debate.

    Guest Contributor
    Published:  February 23, 2023, 7:41 AM EST Modified:  February 21, 2023, 4:51 PM EST Read More See more Edge
  • Stock image depicting layoffs.
    Image: Andrii Yalanskyi/Adobe Stock
    CXO

    Leading after layoffs: How CIOs can reengage to support recovery

    CIOs aren’t immune from the emotional and organizational effects of layoffs. But, downsizing doesn’t have to threaten the remaining team.

    Guest Contributor
    Published:  February 10, 2023, 4:49 PM EST Modified:  February 10, 2023, 4:49 PM EST Read More See more CXO
  • A person using a phone with internet of things symbols.
    Image: tippapatt/Adobe Stock
    Internet of Things

    iSIMs imminent? What the evolution of SIM cards means for enterprise IoT

    Luc Vidal-Madjar, head of IoT solutions, BICS, discusses the integration SIM and its implications for businesses.

    Guest Contributor
    Published:  February 3, 2023, 2:55 PM EST Modified:  February 3, 2023, 2:55 PM EST Read More See more Internet of Things
  • Passwords that are too simple on sticky notes.
    Image: Vitalii Vodolazskyi/Adobe Stock
    Security

    The headache of changing passwords

    Change Your Password Day — an annual reminder of just how bad passwords really are.

    Guest Contributor
    Published:  February 1, 2023, 4:59 PM EST Modified:  February 1, 2023, 4:59 PM EST Read More See more Security
  • A data scientist using process mining to refine processes.
    Image: Artem/Adobe Stock
    Big Data

    The evolution of process mining

    Process mining is a data science and process management technique that's evolving with digital transformation business projects. Learn how process mining is impacting modern enterprises and business resilience goals.

    Guest Contributor
    Published:  January 30, 2023, 6:37 PM EST Modified:  January 31, 2023, 4:58 PM EST Read More See more Big Data
  • A businessman looking at a world covered in network connections.
    Image: denisismagilov/Adobe Stock
    Mobility

    Mobile Ecosystem Forum foresees IoT security and sustainability standards in 2023

    Dario Betti, CEO of Mobile Ecosystem Forum, talked with the trade body’s members to share their predictions for the mobile industry.

    Guest Contributor
    Published:  January 26, 2023, 6:37 AM EST Modified:  January 25, 2023, 7:06 PM EST Read More See more Mobility
  • A web of internet of things devices.
    Image: bakhtiarzein/Adobe Stock
    Internet of Things

    The internet of every damn thing

    Portnox CEO Denny LeCompte offers a damn interesting read on IoT, security and even a cold beverage.

    Guest Contributor
    Published:  January 23, 2023, 12:36 PM EST Modified:  January 23, 2023, 12:36 PM EST Read More See more Internet of Things
  • People in a business meeting gesturing with their hands.
    Image: Panumas/Adobe Stock
    Software

    Follow these steps when choosing an ERP system

    The ERP software market has many solutions that can improve workflows, save time and money, and reduce errors. Follow these steps to pick the right one.

    Guest Contributor
    Published:  December 29, 2022, 12:22 PM EST Modified:  December 29, 2022, 3:15 PM EST Read More See more Software
  • Data center infrastructure.
    Image: Corona Borealis/Adobe Stock
    CXO

    Gartner analysis: IT infrastructure trends for 2023

    One Gartner analyst predicts skills growth, the cloud and architecture will all impact IT infrastructure in 2023.

    Guest Contributor
    Published:  December 12, 2022, 10:39 AM PST Modified:  December 12, 2022, 10:39 AM PST Read More See more CXO
  • An upset person looking at multiple screens that say ransomware.
    Image: zephyr_p/Adobe Stock
    Security

    Recognize the commonalities in ransomware attacks to avoid them

    Learn how your organization can use the MITRE ATT&CK framework to prevent data breaches, fines, and the loss of clients and customers induced by ransomware threats.

    Guest Contributor
    Published:  December 9, 2022, 8:58 AM PST Modified:  December 9, 2022, 8:58 AM PST Read More See more Security
  • 1
  • 2
  • 3
  • 4
  • 5
  • 10
  • 20
  • 30
  • Next
3677 results

TechRepublic Premium

  • TechRepublic Premium

    Employee privacy policy

    PURPOSE This policy describes the organization’s employee privacy guidelines and outlines employee privacy expectations. From the policy: POLICY DETAILS The organization’s IT equipment, services and systems are intended for business use only. However, the organization acknowledges that staff, consultants and volunteers occasionally require opportunities to make or receive personal phone calls, access personal email, utilize ...

    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Security response policy

    PURPOSE The purpose of this Security Response Policy from TechRepublic Premium is to outline the security incident response processes which must be followed. This policy will assist to identify and resolve information security incidents quickly and effectively, thus minimizing their business impact and reducing the risk of similar incidents recurring. It includes requirements for both ...

    Downloads
    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    End user data backup policy

    PURPOSE This policy from TechRepublic Premium provides guidelines for reliable and secure backups of end user data. It outlines the responsibilities of IT departments and employees to identify tasks and action items for each group. The policy can be customized to fit the needs of your organization. From the policy: IT STAFF RESPONSIBILITIES IT staff ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 5:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Electronic communication policy

    This policy from TechRepublic Premium provides guidelines for the appropriate use of electronic communications. It covers topics such as privacy, confidentiality and security; ensures electronic communications resources are used for appropriate purposes; informs employees regarding the applicability of laws and company policies to electronic communications; and prevents disruptions to and misuse of company electronic communications ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 3:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice