Skip to content

TechRepublic

Trending Now

Laptop featuring MuleSoft Logo.
Image: Adobe Stock
Article

MuleSoft Connect 2022: Automation fuels digital transformation

Hacker in data security concept. Hacker using laptop. Hacking the Internet. Cyber attack.
Image: Adobe Stock
Article

The business of hackers-for-hire threat actors

Opensea NFT non-fungible token marketplace
Image: Proxima Studio/Adobe Stock
Article

Data breach of NFT marketplace OpenSea may expose customers to phishing attacks

Internet technology concept
Image: tippapatt/Adobe Stock
Article

Best IT management software for 2022

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of kevinbrown

kevinbrown

Send kevinbrown an email

Latest from kevinbrown

  • New book does a great job covering SQL Server and XML
    Data Management

    New book does a great job covering SQL Server and XML

    Developing applications utilizing Microsoft SQL Server offers many challenges. This new book by Ken Henderson provides many real-world answers and tips to make this job considerably easier.

    kevinbrown
    Published:  December 23, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:27 AM PDT Read More See more Data Management
  • Create an embedded Web server to administer your application
    Data Centers

    Create an embedded Web server to administer your application

    Embedding a Web server for displaying status information and administering an application offers many benefits. Follow these steps to create your own embedded Web server.

    kevinbrown
    Published:  November 25, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:27 AM PDT Read More See more Data Centers
  • Need a reference for Ant? Stick to the online documentation
    CXO

    Need a reference for Ant? Stick to the online documentation

    Ant is an excellent build tool for Java projects, but documentation is sparse. In this review of the latest O'Reilly title, we tell you why you should probably save your money and read the online docs to learn more about this handy tool.

    kevinbrown
    Published:  November 11, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:16 AM PDT Read More See more CXO
  • How does the Java logging API stack up against log4j?
    Developer

    How does the Java logging API stack up against log4j?

    The log4j logging package is very popular, but does it duplicate the functionality that's readily available in the standard Java JDK logging package?

    kevinbrown
    Published:  July 24, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:14 AM PDT Read More See more Developer
  • Counting lines of code can help measure progress
    Developer

    Counting lines of code can help measure progress

    One developer has come around to thinking that counting lines of code can yield useful information. He explains why and shares a sample app that automates the process.

    kevinbrown
    Published:  July 12, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:13 AM PDT Read More See more Developer
  • Use JCE to share Java cryptography keys
    Developer

    Use JCE to share Java cryptography keys

    The Java Cryptography Extension (JCE) simplifies the process of using encryption and digital signatures and allows the necessary keys to be shared with non-Java systems. Here's one way to use this powerful feature.

    kevinbrown
    Published:  July 1, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:13 AM PDT Read More See more Developer
  • Solve application issues with the factory pattern
    Developer

    Solve application issues with the factory pattern

    The factory pattern streamlines application issues, like when a developer must reply to users based upon the machine they are using. Learn how to use it with these examples.

    kevinbrown
    Published:  June 11, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:13 AM PDT Read More See more Developer
  • Develop strategic metrics during design
    CXO

    Develop strategic metrics during design

    New development in your organization calls for core metrics that will help you measure the success of your system. This article discusses the importance of working with strategic metrics and providing important feedback to your organization.

    kevinbrown
    Published:  June 3, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:12 AM PDT Read More See more CXO
  • Collect metrics in your Java applications
    Developer

    Collect metrics in your Java applications

    Collecting metrics is an important, but often overlooked, aspect of every development project. Add these Java classes to your next application to accumulate vital data.

    kevinbrown
    Published:  May 30, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:13 AM PDT Read More See more Developer
  • Increase SQL Server stored procedure performance with these tips
    Data Management

    Increase SQL Server stored procedure performance with these tips

    Database developers often use stored procedures to increase performance. Here are three tips to help you get the most from your SQL Server stored procedures. We've even thrown in a bonus performance tip for counting records without accessing a table.

    kevinbrown
    Published:  March 5, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:13 AM PDT Read More See more Data Management
  • 1
  • 2
  • 3
  • Next
25 results

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice