Skip to content

TechRepublic

Trending Now

Asian female leader using laptop and communicating with her business team during meeting in the office.
Image: Drazen/Adobe Stock
Article

Third-party technology partners accelerate integration, digitization and dexterity in B2B commerce

Telstra Quick Hits: SD-WAN & SASE
Resource

Telstra Quick Hits: SD-WAN & SASE

Laptop featuring MuleSoft Logo.
Image: Adobe Stock
Article

MuleSoft Connect 2022: Automation fuels digital transformation

Hacker in data security concept. Hacker using laptop. Hacking the Internet. Cyber attack.
Image: Adobe Stock
Article

The business of hackers-for-hire threat actors

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of twatkins-mail

twatkins-mail

Send twatkins-mail an email

Latest from twatkins-mail

  • Small businesses beware the dangers of government prime contracts
    CXO

    Small businesses beware the dangers of government prime contracts

    Prime contracting with the federal and state government can be a dangerous game for the small consulting business or the weak of heart. Read on before you take on the responsibilities inherent in a government prime contract.

    twatkins-mail
    Published:  May 13, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:42 AM PDT Read More See more CXO
  • Contract vehicles: Money transportation in government contracting
    Social enterprise

    Contract vehicles: Money transportation in government contracting

    Due to the "full and open competition law," any government buyer of a service or product is required to write an RFP and release it to the general public. Here's how to get around the delays this can cause.

    twatkins-mail
    Published:  April 21, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:41 AM PDT Read More See more Social enterprise
  • Try this proven strategy to make your bid decision in government contracting
    CXO

    Try this proven strategy to make your bid decision in government contracting

    Government contracts are a stable source of company revenue, but the process of breaking into the government marketplace is complex. Here are some factors to consider when deciding whether to bid on government contracts.

    twatkins-mail
    Published:  April 8, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:30 AM PDT Read More See more CXO
  • Price intellectual property in relation to client’s budget and resale opportunities
    CXO

    Price intellectual property in relation to client’s budget and resale opportunities

    To calculate how much to charge your client for your intellectual property, take into account the client's attitude toward risk and how that affects the budget. Also plan how you'll maximize profit by reselling your product to other clients.

    twatkins-mail
    Published:  October 29, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:25 AM PDT Read More See more CXO
  • Consider ‘fudge factors’ when valuing intellectual property
    CXO

    Consider ‘fudge factors’ when valuing intellectual property

    Placing a value on intellectual property can be a slippery slope. Use these tips from a TechRepublic member to evaluate your position and bump up your profits for unique solutions.

    twatkins-mail
    Published:  October 24, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:17 AM PDT Read More See more CXO

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice