Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of scorp space

scorp space

Send scorp space an email

Latest from scorp space

  • It’s time to rethink the HOSTS file
    Developer

    It’s time to rethink the HOSTS file

    With attacks on DNS servers increasing and the creation of "typomains" such as "googkle", it may be time to rethink that old relic, the HOSTS file. It can be used to ensure a connection failure to domains you wish to avoid.

    scorp space
    Published:  June 21, 2005, 12:00 AM PDT Modified:  June 8, 2007, 9:57 AM PDT Read More See more Developer
  • Outlandish outsourcing: What are its long-term effects?
    Tech & Work

    Outlandish outsourcing: What are its long-term effects?

    With business demands not always predictably even and regular, outsourcing is attractive to corporations--and the price of overseas outsourcing even more so. What can be done to curb what could become the Tech sector worker's nightmare?

    scorp space
    Published:  November 3, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:48 AM PDT Read More See more Tech & Work
  • Staying ethical when the candy store’s wide open
    CXO

    Staying ethical when the candy store’s wide open

    To some, downloading a pirated MP3 isn't stealing, because there is no physical thing that is stolen. The flip side is that there isn't much of a distinction between stealing a CD and profiting from a stolen CD. ScOrp weighs in on the controversy.

    scorp space
    Published:  October 27, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:47 AM PDT Read More See more CXO
  • Trusted computing pushes the limits of security and censorship
    Security

    Trusted computing pushes the limits of security and censorship

    Trusted computing (TC) has many implications, including some benefits for large corporations. But there are too many troubling aspects of TC to ignore, as our opinion columnist points out. Here's more about the promises and threats involved in TC.

    scorp space
    Published:  October 20, 2003, 10:35 AM PDT Modified:  June 8, 2007, 9:47 AM PDT Read More See more Security
  • Talking Shop: Can you trust trusted computing?
    Data Centers

    Talking Shop: Can you trust trusted computing?

    Skeptical analysis of Microsofts Trustworthy Computing initiative

    scorp space
    Published:  October 13, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:47 AM PDT Read More See more Data Centers
  • Until techs–not executives–make the technology choices, Windows will dominate
    Data Centers

    Until techs–not executives–make the technology choices, Windows will dominate

    IT workers and executives will likely not see eye to eye on technology

    scorp space
    Published:  September 29, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:47 AM PDT Read More See more Data Centers
  • Who ARE these virus writers?
    Security

    Who ARE these virus writers?

    There are a number of "script kiddies" out there creating viruses and worms. Just what do they get out of this exercise and why aren't they punished appropriately?

    scorp space
    Published:  September 22, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:46 AM PDT Read More See more Security
  • Windows 2003 Server: Is it really just Win2K Special Edition?
    Microsoft

    Windows 2003 Server: Is it really just Win2K Special Edition?

    When it comes to Windows 2003 Server, it's pretty clear that the brunt of the marketing impact is for the suits, not for the techies. It's also pretty clear that Microsoft is banking on the eternal disparity between authority and responsibility.

    scorp space
    Published:  September 15, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:46 AM PDT Read More See more Microsoft
  • Serious admins don’t ignore security patches
    Networking

    Serious admins don’t ignore security patches

    With a virus threat, there are two kinds of Admins: those who are alert and apply patches and those who think it better to do nothing and instead cast blame.

    scorp space
    Published:  August 28, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:46 AM PDT Read More See more Networking

TechRepublic Premium

  • TechRepublic Premium

    Media disposal policy

    PURPOSE This Media disposal policy from TechRepublic Premium provides specific instructions for ensuring organization data is properly protected when disposing of old storage media. From the policy: POLICY DETAILS When disposing of damaged, unusable, obsolete, off-lease, decommissioned, old, or end-of-service-life equipment and media, the organization requires that the guidelines outlined herein be followed: Hard drives, ...

    Published:  March 30, 2023, 12:00 PM EDT Modified:  March 31, 2023, 11:06 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    IT email templates: Upcoming software release

    PURPOSE To take some of the effort out of writing (and rewriting) emails to share with company staff and executives, TechRepublic Premium has assembled basic templates to handle the most common types of communications. Simply copy the text into your favorite word processor and customize it to fit your needs. Then, paste it into an ...

    Published:  March 30, 2023, 12:00 PM EDT Modified:  March 31, 2023, 11:29 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Mobile app development policy

    PURPOSE The purpose of this policy from TechRepublic Premium is to provide guidelines for developing mobile applications from a security, procedural and best practices standpoint. While it contains technical guidelines, it is not intended to serve as a programming guide but as a framework for operations. This policy can be customized as needed to fit ...

    Published:  March 29, 2023, 12:00 PM EDT Modified:  March 30, 2023, 4:43 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    New client audit checklist

    PURPOSE This checklist from TechRepublic Premium provides a method for auditing and documenting a client site and assembling an inventory of systems and software, as well as giving you a framework for developing recommendations, applying costs to them, and storing all that information in one file. Tracking client contact details, circuit information, network equipment, cloud ...

    Published:  March 29, 2023, 12:00 PM EDT Modified:  March 30, 2023, 4:54 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice