Skip to content

TechRepublic

Trending Now

Close-up Shot of Female IT Engineer Working in Monitoring Room. She Works with Multiple Displays.
Image: Gorodenkoff/Adobe Stock
Article

Why IT support is needed for no-code and low-code applications

Woman using Microsoft Outlook application, close-up
Image: FellowNeko/Adobe Stock
Article

How to import a Google calendar into Microsoft Outlook

report organizations ransomware
Image: normalfx/Adobe Stock
Article

Black Basta may be an all-star ransomware gang made up of former Conti and REvil members

best cybersecurity certifications 2022
Image: Ico Maker/Adobe Stock
Article

Best cybersecurity certifications in 2022

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of jim.wells

jim.wells

Send jim.wells an email

Latest from jim.wells

  • Create your own IT governance audit program
    CXO

    Create your own IT governance audit program

    Providing oversight to IT presents unique challenges, but implementing a governance program is essential to keeping IT on track with the business goals. This article provides some important guidelines.

    jim.wells
    Published:  September 27, 2004, 12:00 AM PDT Modified:  June 8, 2007, 9:53 AM PDT Read More See more CXO
  • TechProGuild FastAnswer: Sasser worm reboot problem can be delayed
    Security

    TechProGuild FastAnswer: Sasser worm reboot problem can be delayed

    The Sasser worm patch is easily applied to a system connected to the Internet. Unfortunately, that connection is not possible because of constant system reboots. This FastAnswer shows you how to delay the reboot so you can apply the patch.

    jim.wells
    Published:  June 18, 2004, 12:00 AM PDT Modified:  June 8, 2007, 9:52 AM PDT Read More See more Security
  • Learn what the experts have to say about network security
    Enterprise Software

    Learn what the experts have to say about network security

    A guide to security-related audio Webcasts created for IT professionals by IT professionals.

    jim.wells
    Published:  June 4, 2004, 8:19 AM PDT Modified:  June 8, 2007, 9:52 AM PDT Read More See more Enterprise Software
  • Download this handout to change the Windows XP Product Key
    Microsoft

    Download this handout to change the Windows XP Product Key

    This FastAnswer handout will help you change an invalid Windows XP Product Key by tweaking the registry.

    jim.wells
    Published:  June 4, 2004, 12:00 AM PDT Modified:  June 8, 2007, 9:52 AM PDT Read More See more Microsoft
  • Help recover lost Admin passwords by downloading this preformatted handout
    Microsoft

    Help recover lost Admin passwords by downloading this preformatted handout

    This FastAnswer handout will help you recover lost Admin passwords.

    jim.wells
    Published:  June 3, 2004, 12:00 AM PDT Modified:  June 8, 2007, 9:52 AM PDT Read More See more Microsoft
  • Customize your own Service Level Agreement (SLA) using our template
    Project Management

    Customize your own Service Level Agreement (SLA) using our template

    TechProGuild recognizes the importance of the service level agreement and has created a downloadable case document to spell out some of the important features it should include.

    jim.wells
    Published:  May 27, 2004, 12:00 AM PDT Modified:  June 8, 2007, 9:52 AM PDT Read More See more Project Management
  • QuickBase quickly becoming a force in project management solutions
    Project Management

    QuickBase quickly becoming a force in project management solutions

    QuickBase offers a no-hassle approach to Web-based project management.

    jim.wells
    Published:  April 27, 2004, 6:42 AM PDT Modified:  June 8, 2007, 9:50 AM PDT Read More See more Project Management
  • Conquer wireless networking challenges with this guide
    Networking

    Conquer wireless networking challenges with this guide

    For a comprehensive look at wireless networking issues, buy our Wireless Networking Survival Guide to improve your wireless knowledge.

    jim.wells
    Published:  April 16, 2004, 6:45 AM PDT Modified:  June 8, 2007, 9:50 AM PDT Read More See more Networking
  • RogueWatch does the watching for you
    Security

    RogueWatch does the watching for you

    Learn about a product that can help you monitor for rogue access points on your wireless network.

    jim.wells
    Published:  April 8, 2004, 12:00 AM PDT Modified:  June 8, 2007, 9:50 AM PDT Read More See more Security
  • Remote registry administration in Windows XP Professional
    Microsoft

    Remote registry administration in Windows XP Professional

    Enabling remote registry access is easy in XP Pro, as long as the permissions are set up properly.

    jim.wells
    Published:  April 1, 2004, 12:00 AM PST Modified:  June 8, 2007, 9:50 AM PDT Read More See more Microsoft
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
110 results

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice