Skip to content

TechRepublic

Trending Now

Laptop featuring MuleSoft Logo.
Image: Adobe Stock
Article

MuleSoft Connect 2022: Automation fuels digital transformation

Hacker in data security concept. Hacker using laptop. Hacking the Internet. Cyber attack.
Image: Adobe Stock
Article

The business of hackers-for-hire threat actors

Opensea NFT non-fungible token marketplace
Image: Proxima Studio/Adobe Stock
Article

Data breach of NFT marketplace OpenSea may expose customers to phishing attacks

Internet technology concept
Image: tippapatt/Adobe Stock
Article

Best IT management software for 2022

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of larkgroup

larkgroup

Send larkgroup an email

Latest from larkgroup

  • TechRepublic Tutorial: Use Access as an alternative for departmental-level applications
    Software

    TechRepublic Tutorial: Use Access as an alternative for departmental-level applications

    Benefits of using Microsoft Access as a development platform

    larkgroup
    Published:  December 5, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:48 AM PDT Read More See more Software
  • Secure SQL Server: Encryption and SQL injection attacks
    Data Management

    Secure SQL Server: Encryption and SQL injection attacks

    A total security plan for SQL Server should include encryption and protection against SQL injection attacks. In this last article of the series, we give you a lesson in SQL Server security that could save you from making some expensive mistakes.

    larkgroup
    Published:  October 17, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:47 AM PDT Read More See more Data Management
  • XPath provides an easier way to select information in Jet database
    Developer

    XPath provides an easier way to select information in Jet database

    In the Microsoft .NET Framework, extracting information from a Jet database can be accomplished using SQL queries or XPath. Each method has pros and cons, but you may find yourself using XPath more often as .NET becomes more prevalent.

    larkgroup
    Published:  September 18, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:46 AM PDT Read More See more Developer
  • Get started with the Microsoft application blocks
    Developer

    Get started with the Microsoft application blocks

    The Microsoft Patterns & Practices group offers chunks of reusable code for developers who are working with .NET languages. Here's a look at the eight application blocks and how you can use them in your next application.

    larkgroup
    Published:  September 8, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:46 AM PDT Read More See more Developer
  • Make sure your contract protects your intellectual property
    CXO

    Make sure your contract protects your intellectual property

    Consultants who write applications for their clients are wise to spell out their ownership rights in their contracts with clients. Here's a look at what one consultant checks when he's signing a contract with his clients.

    larkgroup
    Published:  August 27, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:46 AM PDT Read More See more CXO
  • SQL Server: Grant access but maintain security
    Data Management

    SQL Server: Grant access but maintain security

    Using SQL Server requires interaction with objects inside the database. And interaction requires that users be granted permission to access objects. This installment of our series on SQL Server security provides an overview of how user access is granted.

    larkgroup
    Published:  August 26, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:46 AM PDT Read More See more Data Management
  • Which is better for distributed applications: Web services or remoting?
    Enterprise Software

    Which is better for distributed applications: Web services or remoting?

    While it hasn't always been the case, consultants who work on distributed applications for their clients have a variety of choices. Two of the most common include Web services and remoting. Which one is best for your clients?

    larkgroup
    Published:  August 18, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:46 AM PDT Read More See more Enterprise Software
  • Decision Support: Choose the right Microsoft database for your development needs
    Data Management

    Decision Support: Choose the right Microsoft database for your development needs

    Choose the right Microsoft database

    larkgroup
    Published:  July 31, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:45 AM PDT Read More See more Data Management
  • Configure authentication in your ASP.NET app
    Developer

    Configure authentication in your ASP.NET app

    ASP.NET offers developers plenty of options when it comes to authentication. Here's a look at how to make ASP.NET's authentication settings work with IIS.

    larkgroup
    Published:  July 22, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:45 AM PDT Read More See more Developer
  • Windows Application Verifier can help you build better code
    Microsoft

    Windows Application Verifier can help you build better code

    If you're building an application, it's likely that you'll want it to play nice with Windows. Microsoft's Windows Application Verifier can ensure that your application will work with current and future versions of Windows.

    larkgroup
    Published:  July 3, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:44 AM PDT Read More See more Microsoft
  • 1
  • 2
  • 3
  • Next
24 results

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice