Skip to content

TechRepublic

Trending Now

Asian female leader using laptop and communicating with her business team during meeting in the office.
Image: Drazen/Adobe Stock
Article

Third-party technology partners accelerate integration, digitization and dexterity in B2B commerce

Telstra Quick Hits: SD-WAN & SASE
Resource

Telstra Quick Hits: SD-WAN & SASE

Laptop featuring MuleSoft Logo.
Image: Adobe Stock
Article

MuleSoft Connect 2022: Automation fuels digital transformation

Hacker in data security concept. Hacker using laptop. Hacking the Internet. Cyber attack.
Image: Adobe Stock
Article

The business of hackers-for-hire threat actors

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of maryod-bellsouth

maryod-bellsouth

Send maryod-bellsouth an email

Latest from maryod-bellsouth

  • The CIO’s code of ethics for managing electronic data
    Data Management

    The CIO’s code of ethics for managing electronic data

    As chief steward of your company's data, you need to enact strict controls over customer and employee data. You also have to educate employees about the responsibilities of ethical data management.

    maryod-bellsouth
    Published:  June 30, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:43 AM PDT Read More See more Data Management
  • Know your responsibilities when you discover pirated software
    Tech & Work

    Know your responsibilities when you discover pirated software

    Some will argue that consultants have an ethical responsibility to deal with the issue of pirated software on a client's machines, but there is no actual legal responsibility. Find out what actions the experts recommend.

    maryod-bellsouth
    Published:  March 18, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:26 AM PDT Read More See more Tech & Work
  • Don’t use scare tactics to drum up HIPAA contracts
    Enterprise Software

    Don’t use scare tactics to drum up HIPAA contracts

    If you're planning to use Y2K-style doomsday scenarios to try to convince potential clients that they need your help with HIPAA, you'll likely see the door before you realize a billable hour. Keep these points in mind when planning HIPAA-related work.

    maryod-bellsouth
    Published:  December 23, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:30 AM PDT Read More See more Enterprise Software
  • Consultants need these skills to make the most of HIPAA
    Enterprise Software

    Consultants need these skills to make the most of HIPAA

    As healthcare organizations scramble to comply with HIPAA guidelines, consultants have the opportunity to see their billings rise proportionately. Here are the skills you need to make your mark.

    maryod-bellsouth
    Published:  December 16, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:22 AM PDT Read More See more Enterprise Software
  • Five reasons IT consultancies fail
    Software

    Five reasons IT consultancies fail

    IT consulting firms continue to tread water in a challenging organization environment, and many are taking a "back to basics" approach when it comes to their business. Take advice from two consultants who have done just that.

    maryod-bellsouth
    Published:  October 24, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:17 AM PDT Read More See more Software

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice