Skip to content

TechRepublic

Trending Now

Laptop featuring MuleSoft Logo.
Image: Adobe Stock
Article

MuleSoft Connect 2022: Automation fuels digital transformation

Hacker in data security concept. Hacker using laptop. Hacking the Internet. Cyber attack.
Image: Adobe Stock
Article

The business of hackers-for-hire threat actors

Opensea NFT non-fungible token marketplace
Image: Proxima Studio/Adobe Stock
Article

Data breach of NFT marketplace OpenSea may expose customers to phishing attacks

Internet technology concept
Image: tippapatt/Adobe Stock
Article

Best IT management software for 2022

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of suzannethornberry

suzannethornberry

Send suzannethornberry an email

Latest from suzannethornberry

  • metamorworksistock-952679588.jpg
    Image: metamorworks, Getty Images/iStockphoto
    Networking

    10 signs you may not be cut out for a systems analyst position

    The need for systems analysts is increasing, but not everyone is suited for the job. Check out this list of possible indications that you'd be happier pursuing a different career path.

    suzannethornberry
    Published:  November 8, 2018, 12:32 PM PST Modified:  November 8, 2018, 9:27 AM PST Read More See more Networking
  • Safety First Warning concect Protect Attention Careful Security Risk
    juststock, Getty Images/iStockphoto
    Tech & Work

    10 IT health risks and how to combat them

    IT might not appear to be a high-risk field, but a surprising number of ailments can plague IT pros in all job roles. Here are some of the most prevalent health concerns.

    suzannethornberry
    Published:  June 25, 2008, 7:26 AM PDT Modified:  April 27, 2022, 11:41 AM PDT Read More See more Tech & Work
  • 10 things you should do if you get laid off
    Tech & Work

    10 things you should do if you get laid off

    When faced with a layoff, you have two kinds of needs. The first is to live within your means until you get a new job. The second is to get that new job. Here are some ways you can pursue both goals.

    suzannethornberry
    Published:  October 24, 2007, 2:23 AM PDT Modified:  October 24, 2007, 2:23 AM PDT Read More See more Tech & Work
  • Steer clear of these 10 illegal job interview questions
    Tech & Work

    Steer clear of these 10 illegal job interview questions

    Although HR departments should be aware of questions that are illegal to ask prospective employees, some hiring managers aren’t so savvy.  Many illegal questions are easy for just about anyone with elementary social graces to avoid, but others might surprise you. In general, you should not ask interviewees about their age, race, national origin, marital ...

    suzannethornberry
    Published:  September 17, 2007, 5:05 AM PDT Modified:  September 17, 2007, 5:05 AM PDT Read More See more Tech & Work
  • 10 questions you shouldn’t ask when you’re being interviewed for a job
    Tech & Work

    10 questions you shouldn’t ask when you’re being interviewed for a job

    This information is also available as a PDF download. At the end of an interview, most interviewers like to throw out the question, “Do you have any questions for me?” Almost all interviewers will ask if you have any questions, so be prepared to ask something. If you’ve done your research, you should be able ...

    suzannethornberry
    Published:  August 13, 2007, 5:50 AM PDT Modified:  August 13, 2007, 5:50 AM PDT Read More See more Tech & Work
  • HIPAA resources help tech leaders comply with privacy regulations
    Enterprise Software

    HIPAA resources help tech leaders comply with privacy regulations

    Meeting the data exchange and privacy regulations required by HIPAA is clearly a challenge for IT leaders at healthcare enterprises. This list of online resources can help you find the information you need to comply.

    suzannethornberry
    Published:  December 14, 2004, 12:00 AM PST Modified:  June 8, 2007, 9:18 AM PDT Read More See more Enterprise Software
  • Strong PDA policies help secure data and prevent equipment loss
    Hardware

    Strong PDA policies help secure data and prevent equipment loss

    Make sure company PDAs stay secure with a strong policy.

    suzannethornberry
    Published:  October 1, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:19 AM PDT Read More See more Hardware
  • IT managers face ethical issues from piracy to privacy
    Security

    IT managers face ethical issues from piracy to privacy

    In recent polls, many TechRepublic members reported that they've been asked to do something unethical in their jobs. Join our discussion on the everyday ethical dilemmas IT professionals face.

    suzannethornberry
    Published:  September 25, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:19 AM PDT Read More See more Security
  • Vaulting is best practice for data backup plans
    Data Centers

    Vaulting is best practice for data backup plans

    Safe storage data requires investment

    suzannethornberry
    Published:  September 24, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:24 AM PDT Read More See more Data Centers
  • Air Force base CIO finds an alternative to PCs and thin clients
    Data Centers

    Air Force base CIO finds an alternative to PCs and thin clients

    Based on a pilot implementation, an Air Force CIO estimates that his IT department could save as much as $400,000 a year by gradually replacing conventional PCs with rack-based CPUs.

    suzannethornberry
    Published:  September 17, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:24 AM PDT Read More See more Data Centers
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
50 results

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice