Skip to content

TechRepublic

Trending Now

Laptop featuring MuleSoft Logo.
Image: Adobe Stock
Article

MuleSoft Connect 2022: Automation fuels digital transformation

Hacker in data security concept. Hacker using laptop. Hacking the Internet. Cyber attack.
Image: Adobe Stock
Article

The business of hackers-for-hire threat actors

Opensea NFT non-fungible token marketplace
Image: Proxima Studio/Adobe Stock
Article

Data breach of NFT marketplace OpenSea may expose customers to phishing attacks

Internet technology concept
Image: tippapatt/Adobe Stock
Article

Best IT management software for 2022

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of paulgarceau

paulgarceau

Send paulgarceau an email

Latest from paulgarceau

  • Integrating e-mail clients with Mercury/32 Mail Transport System
    Software

    Integrating e-mail clients with Mercury/32 Mail Transport System

    In the conclusion to his series on setting up and configuring the Mercury/32 Mail Transport System, Paul Garceau shows you how to configure your e-mail clients. After reading this series, you'll be able to run this free alternative to MS Exchange Server.

    paulgarceau
    Published:  April 17, 2001, 12:00 AM PDT Modified:  June 8, 2007, 9:44 AM PDT Read More See more Software
  • Configuring Mercury Mail Transport System to run a LAN-based e-mail server
    Networking

    Configuring Mercury Mail Transport System to run a LAN-based e-mail server

    If you've been following Paul Garceau's series, then you've learned how to install Mercury/32, a workstation-based e-mail server that's an alternative to Exchange. In this Daily Drill Down, Paul shows you how to configure Mercury/32 for your LAN.

    paulgarceau
    Published:  April 16, 2001, 12:00 AM PDT Modified:  June 8, 2007, 9:44 AM PDT Read More See more Networking
  • Configuring Windows NT 4.0 Workstation to run Mercury Mail Transport System
    Microsoft

    Configuring Windows NT 4.0 Workstation to run Mercury Mail Transport System

    Mercury/32 is an alternative to Exchange Server that you can install on a client. In this Daily Feature, Paul Garceau shows you how to configure Windows NT 4.0 Workstation to run Mercury/32.

    paulgarceau
    Published:  April 10, 2001, 12:00 AM PDT Modified:  June 8, 2007, 9:44 AM PDT Read More See more Microsoft
  • An Exchange alternative: Mercury Mail Transport System can be installed on your client
    Software

    An Exchange alternative: Mercury Mail Transport System can be installed on your client

    If you need an e-mail server for a small office, you might want to consider the Mercury Mail Transport System. In this Daily Drill Down, Paul Garceau explains the advantages and the setup of this e-mail server that can be set up on a client machine.

    paulgarceau
    Published:  March 1, 2001, 12:00 AM PST Modified:  June 8, 2007, 9:43 AM PDT Read More See more Software
  • POSIX lets you run UNIX commands in Windows NT 4.0
    Microsoft

    POSIX lets you run UNIX commands in Windows NT 4.0

    Many users of Windows NT 4.0 are unaware of its support for a POSIX subsystem. In this Daily Feature, Paul Garceau explains the workings of POSIX and what commands it will let you run.

    paulgarceau
    Published:  November 7, 2000, 12:00 AM PST Modified:  June 8, 2007, 9:44 AM PDT Read More See more Microsoft

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Provided By TechRepublic Premium Published:  May 2022 Modified:  May 2022 Read More
    Download Now
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Provided By TechRepublic Premium Published:  May 2022 Modified:  May 2022 Read More
    Download Now
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Provided By TechRepublic Premium Published:  May 2022 Modified:  May 2022 Read More
    Download Now
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Provided By TechRepublic Premium Published:  Apr 2022 Modified:  Apr 2022 Read More
    Download Now

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice