Skip to content

TechRepublic

Trending Now

Laptop featuring MuleSoft Logo.
Image: Adobe Stock
Article

MuleSoft Connect 2022: Automation fuels digital transformation

Hacker in data security concept. Hacker using laptop. Hacking the Internet. Cyber attack.
Image: Adobe Stock
Article

The business of hackers-for-hire threat actors

Opensea NFT non-fungible token marketplace
Image: Proxima Studio/Adobe Stock
Article

Data breach of NFT marketplace OpenSea may expose customers to phishing attacks

Internet technology concept
Image: tippapatt/Adobe Stock
Article

Best IT management software for 2022

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of williamjones

williamjones

Send williamjones an email

Latest from williamjones

  • Five tips to help your users handle home backups
    Data Centers

    Five tips to help your users handle home backups

    These days, home machines are being used for more tasks -- including the management of work-related data. Here are some home backup tips you can share with your users to safeguard those assets.

    williamjones
    Published:  June 21, 2010, 6:06 AM PDT Modified:  June 21, 2010, 6:06 AM PDT Read More See more Data Centers
  • Is your service bench static safe?
    SMBs

    Is your service bench static safe?

    Lax precautions against electrostatic discharge can reduce the effectiveness of your support team. Here's a checklist to help you set up an ESD-safe workshop.

    williamjones
    Published:  October 29, 2009, 11:52 PM PDT Modified:  October 29, 2009, 11:52 PM PDT Read More See more SMBs
  • Road warriors need mobile backups
    Data Centers

    Road warriors need mobile backups

    Frequent travel is no excuse for risking data loss. Here is how your users can keep their files safe when they are away from the office.

    williamjones
    Published:  October 22, 2009, 4:20 PM PDT Modified:  October 22, 2009, 4:20 PM PDT Read More See more Data Centers
  • Microsoft’s new antivirus is fair game for home businesses
    Security

    Microsoft’s new antivirus is fair game for home businesses

    Many free security utilities are restricted to personal or non-commercial use. Microsoft bucks that trend by giving license to home-based enterprises.

    williamjones
    Published:  October 15, 2009, 3:47 PM PDT Modified:  October 15, 2009, 3:47 PM PDT Read More See more Security
  • Be stingy with Administrator privileges in Windows 7
    Microsoft

    Be stingy with Administrator privileges in Windows 7

    If you've been too liberal in giving admin rights to XP users, the improved User Access Controls in Windows 7 should help break the habit.

    williamjones
    Published:  October 8, 2009, 2:33 PM PDT Modified:  October 8, 2009, 2:33 PM PDT Read More See more Microsoft
  • Can you rely on the tech support your OEM provides?
    SMBs

    Can you rely on the tech support your OEM provides?

    LAPTOP Magazine has rated computer manufacturers based on the support resources they offer after the sale. How does the maker of your machines measure up?

    williamjones
    Published:  September 28, 2009, 4:44 PM PDT Modified:  September 28, 2009, 4:44 PM PDT Read More See more SMBs
  • How to own up to mistakes and follow through with users
    SMBs

    How to own up to mistakes and follow through with users

    Support pros are celebrated when we solve the customer's problem, but sometimes it takes more than one try. If you don't get it right the first time, you can still be the hero.

    williamjones
    Published:  September 24, 2009, 3:34 PM PDT Modified:  September 24, 2009, 3:34 PM PDT Read More See more SMBs
  • Are you in favor of password management software? Take the poll.
    SMBs

    Are you in favor of password management software? Take the poll.

    No one is supposed to use passwords in more than one place, but even techs that should know better sometimes break this rule. Is password management software a good solution?

    williamjones
    Published:  September 21, 2009, 3:39 PM PDT Modified:  September 21, 2009, 3:39 PM PDT Read More See more SMBs
  • Microsoft offers consumers tips for safe computing
    Security

    Microsoft offers consumers tips for safe computing

    It is only right that Microsoft offers guidance about how to run Windows safely. But how effective is the company's advice?

    williamjones
    Published:  September 17, 2009, 4:08 PM PDT Modified:  September 17, 2009, 4:08 PM PDT Read More See more Security
  • Provide better support by using skills assessments
    SMBs

    Provide better support by using skills assessments

    Technical people are often accused of being either condescending or incomprehensible. Make sure your message hits home by knowing your audience.

    williamjones
    Published:  September 14, 2009, 4:37 PM PDT Modified:  September 14, 2009, 4:37 PM PDT Read More See more SMBs
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
119 results

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice