Skip to content

TechRepublic

Trending Now

Secure your place at Telstra Vantage 2022
Resource

Secure your place at Telstra Vantage 2022

Image: StackCommerce
Article

Get two drones for the price of one

Microsoft excel icon
Image: PixieMe/Adobe Stock
Article

How to return a column of n consecutive values in Microsoft Excel

Close up Indian woman planning budget, using calculator and laptop
Image: fizkes/Adobe Stock
Article

4 ways to multiply in Microsoft Excel

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of pr.arun-gmail

pr.arun-gmail

Send pr.arun-gmail an email

Latest from pr.arun-gmail

  • Comcast and Bit Torrent collaborate on network traffic management
    Collaboration

    Comcast and Bit Torrent collaborate on network traffic management

    In an astounding turn to events, foes turned friends as Comcast and BitTorrent announced their agreement to collaborate on bringing better traffic management to Internet connections. This includes treating BitTorrent applications the same way as other applications and targeting high bandwidth users in a protocol agnostic manner.

    pr.arun-gmail
    Published:  March 27, 2008, 9:00 PM PDT Modified:  March 27, 2008, 9:00 PM PDT Read More See more Collaboration
  • Does open sourcing security framework lead to more secure software?
    Open source

    Does open sourcing security framework lead to more secure software?

    Red Hat recently open sourced the Red Hat certificate system - software for managing user identities and privacy on a network. However, does open sourcing security software make it more secure, or does opening the code lead to vulnerabilities?

    pr.arun-gmail
    Published:  March 25, 2008, 8:00 PM PDT Modified:  March 25, 2008, 8:00 PM PDT Read More See more Open source
  • IBM upgrades OmniFind Enterprise search
    Software

    IBM upgrades OmniFind Enterprise search

    IBM announced an upgrade to its enterprise search product, OmniFind, which includes a new user interface and integration with other IBM collaboration products.

    pr.arun-gmail
    Published:  March 12, 2008, 9:49 PM PDT Modified:  March 12, 2008, 9:49 PM PDT Read More See more Software
  • Legal applications of BitTorrent
    Networking

    Legal applications of BitTorrent

    BitTorrent, the peer-to-peer file sharing protocol, and its implementation software have received much ire from the content creation industries. However, there are certain fundamental aspects underlying this technology that could solve many issues relating to computing on a wide scale.

    pr.arun-gmail
    Published:  March 11, 2008, 3:08 AM PDT Modified:  March 11, 2008, 3:08 AM PDT Read More See more Networking
  • MBR rootkit Mebroot: A tough threat to security
    Security

    MBR rootkit Mebroot: A tough threat to security

    Security firm Finjan has raised a warning on rootkit "Mebroot," which it believes has entered the Release to Manufacturing (RTM) phase.

    pr.arun-gmail
    Published:  March 6, 2008, 8:02 PM PST Modified:  March 6, 2008, 8:02 PM PST Read More See more Security
  • Microsoft touts green initiatives in data center strategy
    Data Centers

    Microsoft touts green initiatives in data center strategy

    At CeBIT, Microsoft shined a light on its data center strategies that can bring advantages of energy efficiency and cost savings to companies. Steve Ballmer was seen quoting several statistics on the energy consumption pattern of the IT industry.

    pr.arun-gmail
    Published:  March 4, 2008, 8:25 PM PST Modified:  March 4, 2008, 8:25 PM PST Read More See more Data Centers
  • Service level agreements of paramount importance to software-as-a-service adoption
    Project Management

    Service level agreements of paramount importance to software-as-a-service adoption

    Software-as-a-service has been the buzzword that promises to provide prompt services while keeping companies shielded from the problems of implementation and maintenance of software. However, with enterprises offloading the physical control of software, service level agreements need to define very precisely how customers are compensated for downtimes.

    pr.arun-gmail
    Published:  February 28, 2008, 11:29 PM PST Modified:  February 28, 2008, 11:29 PM PST Read More See more Project Management
  • Goolag security tool uses Google to scan sites for vulnerabilities
    Banking

    Goolag security tool uses Google to scan sites for vulnerabilities

    Goolag Scanner is a Web auditing tool released by the hacker group Cult of Dead Cows. The tool uses the prowess of the search engine to surface vulnerabilities on Web sites.

    pr.arun-gmail
    Published:  February 26, 2008, 8:00 PM PST Modified:  February 26, 2008, 8:00 PM PST Read More See more Banking
  • Microsoft announces small and midsize Windows Server offerings
    Microsoft

    Microsoft announces small and midsize Windows Server offerings

    As part of its Essential Server Solutions Server products, Microsoft will offer Windows Small Business Server 2008 for small businesses and the Windows Essential Business Server 2008 for midsize organizations.

    pr.arun-gmail
    Published:  February 21, 2008, 8:35 PM PST Modified:  February 21, 2008, 8:35 PM PST Read More See more Microsoft
  • Siemens announces professional and managed services portfolio
    CXO

    Siemens announces professional and managed services portfolio

    Siemens Communications Inc. announced its end-to-end integrated multi-vendor global communication service called OpenScale.

    pr.arun-gmail
    Published:  February 19, 2008, 8:00 PM PST Modified:  February 19, 2008, 8:00 PM PST Read More See more CXO
  • 1
  • 2
  • 3
  • 4
  • 5
  • 10
  • 20
  • 30
  • Next
525 results

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice