Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of mikemullins

mikemullins

Send mikemullins an email

Latest from mikemullins

  • Take steps to safeguard sensitive data
    CXO

    Take steps to safeguard sensitive data

    Is your organization responsible for complying with one or more of the many privacy-related pieces of legislation that the U.S. government has enacted over the past decade? It’s a good bet that it is. Whether it’s the Health Insurance Portability and Accountability Act (HIPAA), which addresses healthcare information, the Gramm-Leach-Bliley Act (GLBA), which addresses financial ...

    mikemullins
    Published:  July 5, 2007, 4:43 AM PDT Modified:  July 5, 2007, 4:43 AM PDT Read More See more CXO
  • Phishing and pharming 101: Protect your identity
    Security

    Phishing and pharming 101: Protect your identity

    Using a variety of nefarious methods, phishing and pharming are a consistent problem that threatens everyone with identity theft. If you recognize what these methods are and how malicious users employ them, you can keep yourself and your users from becoming a victim. A quick review Phishing involves sending an e-mail that claims to be ...

    mikemullins
    Published:  June 28, 2007, 4:54 AM PDT Modified:  June 28, 2007, 4:54 AM PDT Read More See more Security
  • Mitigate the effects of a DDoS attack
    Data Centers

    Mitigate the effects of a DDoS attack

    There’s a great variety of attacks and hacks that black hats can perpetrate on your network. Fortunately, you can prevent most of them using an assortment of security measures. However, a distributed denial-of-service attack (DDoS) is an entirely different story. You can’t thwart a DDoS attack — they attack an IP address or service that’s ...

    mikemullins
    Published:  June 6, 2007, 3:07 AM PDT Modified:  June 6, 2007, 3:07 AM PDT Read More See more Data Centers
  • Prev
  • 1
  • 2
  • 3
  • 4
33 results

TechRepublic Premium

  • TechRepublic Premium

    How to recruit and hire a Scrum Master

    Recruiting a Scrum Master with the right combination of technical expertise and experience will require a comprehensive screening process. This hiring kit provides a customizable framework your business can use to find, recruit and ultimately hire the right person for the job. This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  August 5, 2022, 5:00 PM PDT Modified:  August 7, 2022, 4:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Web 3.0 quick glossary

    Knowing the terminology associated with Web 3.0 is going to be vital to every IT administrator, developer, network engineer, manager and decision maker in business. This quick glossary will introduce and explain concepts and terms vital to understanding Web 3.0 and the technology that drives and supports it.

    Downloads
    Published:  August 4, 2022, 5:00 PM PDT Modified:  August 7, 2022, 1:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire a User Experience Designer

    While the perfect color palette or the most sublime button shading or myriad of other design features play an important role in any product’s success, user interface design is not enough. Customer engagement and retention requires a strategic plan that attempts to measure, quantify and ultimately create a complete satisfying user experience on both an ...

    Published:  August 4, 2022, 5:00 PM PDT Modified:  August 7, 2022, 3:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice