Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of mahmoodahmed

mahmoodahmed

Send mahmoodahmed an email

Latest from mahmoodahmed

  • WAP phones, part 2: Moving the browser into the field
    Networking

    WAP phones, part 2: Moving the browser into the field

    In the second part of our series on Wireless Application Protocol (WAP), we see how this technology can be used in the field. Mahmood Ahmed explains how to port SQL data to a WAP phone emulator using little more than a PC and Internet Application.

    mahmoodahmed
    Published:  July 13, 2000, 12:00 AM PDT Modified:  June 8, 2007, 9:36 AM PDT Read More See more Networking
  • The basics of WAP technology
    Networking

    The basics of WAP technology

    How WAP works

    mahmoodahmed
    Published:  July 12, 2000, 12:00 AM PDT Modified:  June 8, 2007, 9:06 AM PDT Read More See more Networking
  • Tracking SQL Server crises: Configuring automatic alerts
    Data Management

    Tracking SQL Server crises: Configuring automatic alerts

    Use these steps to configure alerts based on events or performance conditions and to configure your server to send e-mail or pager alerts.

    mahmoodahmed
    Published:  February 4, 2000, 12:00 AM PST Modified:  June 8, 2007, 9:06 AM PDT Read More See more Data Management
  • Tracking SQL Server crises: Designating operators for automatic alerts
    Software

    Tracking SQL Server crises: Designating operators for automatic alerts

    Learn how to complete the three steps of the process to designate an operator to create an automatic alert.

    mahmoodahmed
    Published:  February 3, 2000, 12:00 AM PST Modified:  June 8, 2007, 9:06 AM PDT Read More See more Software

TechRepublic Premium

  • TechRepublic Premium

    Employee privacy policy

    PURPOSE This policy describes the organization’s employee privacy guidelines and outlines employee privacy expectations. From the policy: POLICY DETAILS The organization’s IT equipment, services and systems are intended for business use only. However, the organization acknowledges that staff, consultants and volunteers occasionally require opportunities to make or receive personal phone calls, access personal email, utilize ...

    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Security response policy

    PURPOSE The purpose of this Security Response Policy from TechRepublic Premium is to outline the security incident response processes which must be followed. This policy will assist to identify and resolve information security incidents quickly and effectively, thus minimizing their business impact and reducing the risk of similar incidents recurring. It includes requirements for both ...

    Downloads
    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    End user data backup policy

    PURPOSE This policy from TechRepublic Premium provides guidelines for reliable and secure backups of end user data. It outlines the responsibilities of IT departments and employees to identify tasks and action items for each group. The policy can be customized to fit the needs of your organization. From the policy: IT STAFF RESPONSIBILITIES IT staff ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 5:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Electronic communication policy

    This policy from TechRepublic Premium provides guidelines for the appropriate use of electronic communications. It covers topics such as privacy, confidentiality and security; ensures electronic communications resources are used for appropriate purposes; informs employees regarding the applicability of laws and company policies to electronic communications; and prevents disruptions to and misuse of company electronic communications ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 3:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice