Hundreds of IT policy templates, job hiring kits and glossaries, right at your fingertips. Find out more View full calendar
Premium

FeaturedPremium

  • Custom AI Data Centers: Benefits and Best Practices

    TechRepublic Premium

    Custom AI Data Centers: Benefits and Best Practices

    Artificial intelligence is changing the data center game. If data centers are to host AI engines that demand massively dense racks and hundreds of GPUs, things will have to change. Existing data centers and traditional designs won’t be able to cope with AI requirements. The solution emerging is to customize the data center to address ...

  • GDPR Security Pack

    TechRepublic Premium

    GDPR Security Pack

    Save $85 with this GDPR Security Pack. Read on to find out how. One of the key requirements of the General Data Protection Regulation is a demonstrated effort to enforce security measures that safeguard customer data. This bundle from TechRepublic Premium comprises six policies you can customize and implement to help your organization show good ...

  • Cloud Security Policy

    TechRepublic Premium

    Cloud Security Policy

    The purpose of this Cloud Security Policy, written by Ray Fernandez for TechRepublic Premium, is to provide guidelines for secure and effective cloud computing operations that ensure the integrity and privacy of company-owned digital resources. This policy covers a wide range of topics, including the responsibilities of employees, IT, security staff and managers, data protection ...

  • The Creation and Evolution of a Startup Business Plan

    TechRepublic Premium

    The Creation and Evolution of a Startup Business Plan

    Entrepreneurs tend to follow the “don’t think, just do” model of starting a business. This attitude can serve founders well in the early days, but it often causes them to overlook some essential aspects of building a business. Writing a business plan is a valuable experience for any company founder, and TechRepublic Premium presents a ...

Editorial Calendar

  • Oct9
    How to Safeguard Enterprises from Exploitation of AI Applications $9
  • Oct9
    Workplace Violence Policy $9
  • Oct9
    Hiring Kit: Blockchain Integration Specialist $9
  • Oct10
    Wearable Device Policy $9
  • Oct10
    Vendor Relationship Management Checklist $9
  • Oct10
    Hiring Kit: 5G Wireless System Engineer $9
  • Oct14
    Web Hosting Services Comparison Tool $9
  • Oct14
    Hiring Kit: Compliance Officer $9
  • Oct14
    Vendor Access Policy $9
  • Oct15
    Hiring Kit: Wireless Network Engineer $9
  • Oct15
    How to Solve Memory Bottlenecks Impeding AI Apps $9
  • Oct15
    10 Reasons Why Your Boss Tunes You Out FREE
  • Oct16
    Vendor Comparison: Small Business Financial Accounting Software $9
  • Oct16
    Hiring Kit: Database Engineer $9
  • Oct16
    What Kind of Business Should I Start? 5 Factors to Consider $9
  • Oct17
    Vendor Reference Worksheet: Business Software Purchases $9
  • Oct17
    Hiring Kit: Computer Research Scientist $9
  • Oct17
    Understanding Bash: A Guide for Linux Administrators $9
  • Oct18
    Vendor Comparison: DIY Home Security Systems $9
  • Oct21
    Hiring Kit: Digital Campaign Manager $9
  • Oct21
    Interview Questions Form to Track and Rate Candidates $9
  • Oct22
    10 Ways to Make Sure You and Your Clients See Eye to Eye FREE
  • Oct22
    What Is Secure Access Service Edge? $9
  • Oct22
    Vendor Comparison: Cloud-Based Integrated Management Services $9
  • Oct23
    Hiring Kit: CRM Developer $9
  • Oct23
    How Enterprise IT Can Achieve Water Sustainability Despite the Demands of AI $9
  • Oct24
    Vendor Contract Renewal Planner $9
  • Oct24
    Telephone Interview Cheat Sheet: Voice Engineer $9
  • Oct24
    Troubleshooting Linux: An Admin’s Guide $9
  • Oct25
    Hiring Kit: Game Engine Programmer $9