Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of pierredumoulin

pierredumoulin

Send pierredumoulin an email

Latest from pierredumoulin

  • Determining a good naming convention for your network
    Networking

    Determining a good naming convention for your network

    Although it might be tempting to name servers on your network after Star Trek characters and workstations after Smurfs, it doesn't mean it's a good idea. A proper naming convention can help troubleshooting as well as inventory. Here are some tips about how to create a good naming convention for your network.

    pierredumoulin
    Published:  November 7, 2006, 12:00 AM PST Modified:  June 8, 2007, 10:07 AM PDT Read More See more Networking
  • SolutionBase: Improve your VBScript programming skills with these tips
    Networking

    SolutionBase: Improve your VBScript programming skills with these tips

    If you don't do much programming as a part of your administration duties, you may not know the best way to organize and execute scripts for your servers. Here are some tips to help make VBScript applications better.

    pierredumoulin
    Published:  February 3, 2005, 12:00 AM PST Modified:  July 26, 2007, 8:02 AM PDT Read More See more Networking
  • SolutionBase: Reverse the firewall concept to protect your LAN
    Security

    SolutionBase: Reverse the firewall concept to protect your LAN

    Temporary employees can present special security challenges for network administrators. Here's how you can control where guest employees go by using reverse firewalls.

    pierredumoulin
    Published:  November 4, 2004, 12:00 AM PST Modified:  July 26, 2007, 8:02 AM PDT Read More See more Security
  • Workstation lifecycle and database help build a manageable inventory process
    Data Management

    Workstation lifecycle and database help build a manageable inventory process

    Creating an accurate equipment inventory can be a difficult undertaking for IT pros. Use this sample workstation lifecycle and relational database as a model to set up a better inventory process for your shop.

    pierredumoulin
    Published:  June 23, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:44 AM PDT Read More See more Data Management
  • VB script download offers alternative to SMS for application scanning
    Mobility

    VB script download offers alternative to SMS for application scanning

    When queries against Microsoft Systems Management Server yielded a load of useless information, a TechRepublic contributor turned to scripting to perform a software inventory. Find out how he pulled it off.

    pierredumoulin
    Published:  April 22, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:41 AM PDT Read More See more Mobility

TechRepublic Premium

  • TechRepublic Premium

    Employee privacy policy

    PURPOSE This policy describes the organization’s employee privacy guidelines and outlines employee privacy expectations. From the policy: POLICY DETAILS The organization’s IT equipment, services and systems are intended for business use only. However, the organization acknowledges that staff, consultants and volunteers occasionally require opportunities to make or receive personal phone calls, access personal email, utilize ...

    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Security response policy

    PURPOSE The purpose of this Security Response Policy from TechRepublic Premium is to outline the security incident response processes which must be followed. This policy will assist to identify and resolve information security incidents quickly and effectively, thus minimizing their business impact and reducing the risk of similar incidents recurring. It includes requirements for both ...

    Downloads
    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    End user data backup policy

    PURPOSE This policy from TechRepublic Premium provides guidelines for reliable and secure backups of end user data. It outlines the responsibilities of IT departments and employees to identify tasks and action items for each group. The policy can be customized to fit the needs of your organization. From the policy: IT STAFF RESPONSIBILITIES IT staff ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 5:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Electronic communication policy

    This policy from TechRepublic Premium provides guidelines for the appropriate use of electronic communications. It covers topics such as privacy, confidentiality and security; ensures electronic communications resources are used for appropriate purposes; informs employees regarding the applicability of laws and company policies to electronic communications; and prevents disruptions to and misuse of company electronic communications ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 3:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice