Over the weekend I was writing an article for TechRepublic about two alternative Linux word processors (Abiword and KWord.) As I was writing this article I discovered something that might lend a hand to not only the developers of those tools but to...
A few weeks ago, before she was to leave for college, we discovered that our older daughter, Elise, needed a medical insurance card. I logged onto the Web site for Independence Blue Cross (IBC), and it prompted me to enter information about my...
Adobe announces the availability of a new version of Flash for cell phones. Flash Lite 3 now supports Adobe Flash Player compatible video and enables the delivery of dynamic Web content. Adobe, whose Flash technology made possible the rise of...
You might have a problem prosecuting someone who hacks into your system or uses it without authorization unless you warn the intruder explicitly that access to the computer is restricted. To cover your legal bases, you can configure Windows 2000...
According to a closed-circuit television (CCTV) expert, up to 95 percent of the CCTV systems operating in the United Kingdom are doing so illegally. Apparently, companies operating CCTV systems in the United Kingdom are required to alert the...
CNET News.com reports that Adobe Systems is officially joining the Web Office fray. It is expected to announce the acquisition of the start-up that has built the free Web word processor Buzzword. Financial terms for the acquisition were not...
As an Administrator of Windows Vista, are you completely irritated by the constant pop-ups asking for your authorization? Here is a quick tip on how to shut off UAC for administrators but keep it activated for standard users. Click the Start...
As a Microsoft SQL Server administrator, you must know how to recover a corrupt master database. The master database stores your logins and, most importantly, the pointers to all of your databases. Without the master database, you can't successfully...
Last time I showed how to send an html-formatted email from an Oracle PL/SQL application using utl_smtp. And I promised I would extend the package a little with a second method that would allow sending blob attachments in the emails. The most...
It appears that Jason Langridge - the de facto spokesman for anything that has to do with Microsoft's Windows Mobile, has inadvertently leaked the presence of an Office Mobile upgrade. Jason, who works in Microsoft's Windows Mobile group in the...
Network World has a report on how some of the world's top network engineers in the Internet Research Task Force (IRTF) are engaged in research efforts to redesign the Internet's underlying routing architecture. At stake is the explosive growth of...
Google has bought mobile social networking start-up Zingku, reports the Google Operating System Blog. The move has raised more speculation about Google's entry into the mobile space. A quote from the article at Wired Zingku released a statement...
Estonia's ruling Reform Party is preparing an amendment to allow people to vote by mobile telephone. According to The Baltic Times, the party presented its m-voting proposals on the 27th of September this month in order to prepare a bill along...
Over the years I've written a great deal about the difference between activity and work. However, I don't know if I've ever actually explained what the heck I'm muttering about or why it's important. We'll start with the last question first, since...
Microsoft SQL Server 2008 is coming next year and the good news is that the database's price will not change. This is according to corporate vice president for the data and storage platform, Ted Kummert. He announced this to the 2,000 delegates...
Executive Editor Jason Hiner applies a sanity check to new technologies, new products, and new developments in the IT industry in order to help IT pros sort through the latest hype and buzz.
Senior Editor Toni Bowers discusses various aspects of working in the corporate world, including the best techniques for finding a great job and how to cope once you get there.
Get pointers to the latest and most important IT news from around the Web, as spotted by news bloggers in five different time zones. And then discuss what it means for IT in the TechRepublic forums.
TechRepublic salutes geek culture and entertainment in the Geekend blog, which allows users to take a few moments to stray from the daily grind of business technology.
While lots of sites talk about high tech living, very few talk about how to actually live with technology. TechRepublic provides a real world look at lifestyle technologies and how to optimize them for a higher level of digital living.
Learn how to lead an IT organization with these real world tips, including best practices for developing strategies, managing personnel, enhancing performance, and instituting new processes.
When things go wrong, desktop support professionals get the call. Here are the resources to help them improve their troubleshooting skills, their people skills, and their technical knowledge.
Web developers, software engineers, and programmers of various stripes will find a variety of tutorials and tips to help them improve their methods, deepen their coding skills, and build better applications.
TechRepublic's IT consultant bloggers appreciate that consultants have unique issues and they provide advice on project management, technical challenges, and running a consultancy.
These bloggers tackle the Microsoft OS from all angles, including ramping up to Windows Vista and tips and tricks on how to solve today's problems on Windows XP.
Get the most out of Microsoft Office with these and tips and tutorials for making Word, Excel, PowerPoint, Access, and other Office apps work for you and your organization.
If you're a Linux administrator or you are integrating Linux into your IT department then you won't want to miss the latest tutorials, news, and updates on various Linux distributions and open source applications.
Security bloggers help keep you up to date on how to protect your network through news, updates, advice, and opinions on how you can stay ahead of hackers.
These bloggers have the server room covered from Windows and Linux/UNIX server issues, server appliances, blades, racks, storage options and strategies, and other challenges faced by systems administrators.
How many man-made objects do we think reside on the far side of the moon, where even hypersensitive future Earthbound telescopes will never find them? [Read More] Posted By: Jay Garmon on 09/25/2007 @ 10:52:54 AM in Geekend
This information is also available as a PDF download. Hacker attacks that bring down the network get a lot of attention, so companies concern themselves with protecting against those threats. But if your organization is focusing on this type of security only, it's a little like putting all your efforts into preventing a bomber from blowing up the building but neglecting to worry about the burglar who sneaks in through a back door and makes off with all your valuables. Unfortunately, the same security precautions that prevent DoS attacks, viruses and worms, and other high profile attacks may not be addressing a much more insidious problem: theft of company data for corporate espionage or other purposes. Yet the disclosure of... [Read More] Posted By: Debra Littlejohn Shinder on 08/07/2007 @ 01:30:43 PM in 10 Things
Intel today has announced availability of the newest Intel 10.0 compilers for C++ and Fortran developers which boasts huge optimizations across a wide range of applications along with some basic auditing of code security. I spoke with Intel's James Reinders to get a better understanding of the product line and how the new compiler optimizations improve performance. The performance gains not only make the compiler a more compelling product, it also has ramifications in the heated CPU benchmark wars where single digit percentage points can make a difference. Intel has the luxury of optimizing their compilers for Intel processors while AMD has to rely more on their partners to deliver optimum performance. Among the gains made are single-core, multi-core, parallelization,... [Read More] Posted By: George Ou on 06/05/2007 @ 09:11:39 AM in Real World IT
The subject of Net Neutrality has become so politicized that it's almost impossible to have a rational debate on the subject. Even the term "Net Neutrality" has become a political slogan that is often deliberately vague to hide its true meaning. Is it even possible to have a rational debate on Net Neutrality? That's what I'm going to try and do here and this won't be your typical Net Neutrality article that takes one side or the other because it will slap down the villains on both sides of the debate. I'm going to try and step back and share with you my thousand foot view of the whole war on Net Neutrality. How the Internet really works: The Internet... [Read More] Posted By: George Ou on 06/04/2007 @ 05:40:55 AM in Real World IT
Normally I don't get too worked up when someone makes a complete fool out of himself on networking issues but when a well known pundit like Robert Cringely of PBS writes an article that's filled with errors from beginning to finish about IPv6, I have to call it like I see it. Here are some of the more blatant errors. Robert Cringely: As things stand right now, something over 30 percent of Internet packet traffic is illicit, either spam email or attacks of various sorts. As such, a passive unprotected Windows system on the net can be infected with some kind of pathological code in a median time of minutes. Converting to IPv6 addressing would be a chance to at... [Read More] Posted By: George Ou on 11/06/2006 @ 01:49:50 AM in Real World IT
Working efficiently with Microsoft Outlook is a real challenge for users who are traveling or working off-site. This guide describes a dozen ways that mobile users can maximize productivity when using Microsoft Outlook outside the office.
This presentation is based on Microsoft Vista Beta 2 offering a visual tour of some of the most significant enhancements. It is not intended to teach ...