background preloader

Tech Republic

Facebook Twitter

Raise your tech IQ: Listen to these five podcasts. Podcasts are enjoying a resurgence in the wake of the Serial phenomenon, but the tech world has been at the forefront of podcasting long before it went mainstream. If you work in tech, you have plenty of great content to choose from. Since the tech industry changes faster than any other, it puts tremendous pressure on tech professionals to stay current and keep an eye on what's next. Many techies listen to podcasts during their commutes, workouts, chores, or even while doing mindless tasks at work.

Podcasts are a great way to make yourself smarter and better prepared when people ask, "Hey, what do you think about...? " Whether it's your boss wondering about the potential of a new piece of tech she read about in the The Wall Street Journal, or your friends or coworkers asking personal advice about a new product, you've got a reputation as a tech expert to uphold. So enlist some help to stay informed. 1. 2. 3. 4. 5. Also see. How the 'PayPal Mafia' redefined success in Silicon Valley - Feature. The "PayPal Mafia" is no mafia at all. It's a diaspora. "Basically, we were kicked out of our homeland and they burned down our temple. So, we were scattered to the four corners of the globe, and we had to make new homes. " That's how David Sacks, former COO of PayPal and current CEO of Yammer, described it. The ominous "they" in this story is eBay, and eBay is partly responsible for both the success of PayPal and why the founders walked away from it.

It's a pretty rare occurrence that a startup will make it from inception to exit. Despite astronomical odds, this is what happened when PayPal sold to eBay in the summer of 2002 and the PayPal team members went on to found some of the most important startups — and make some of the most strategic investments — of all time. The PayPal Mafia — a term that's used with affection and awe in Silicon Valley — is defined as the Mountain View PayPal team either pre-IPO or pre-acquisition, depending on which founding member you ask. 1.

First steps 1. 1. Five free cataloging applications. Finding software that you can use as a cataloging tool isn't easy, but with a little creativity and a lot of searching, free apps can be found. We all have reasons to catalog various items. Whether you have a small business with an inventory you need to keep track of or if you have an overwhelmingly large collection of software or book - there is a need for cataloging. Here's the thing, finding free software suited for this task isn't easy. But with a little creativity and a lot of searching, you can dig up at least five such tools. This article is also available as a TechRepublic Screenshot Gallery. Take a look at these five different pieces of software - each of which should serve your cataloging needs well. Five Apps 1. Datacrow is often listed as one of the best in breeds for this category - and with good reason. 2.

SoftCAT Free is a very powerful cataloging tool with tons of features. 3. inFlow Free 4. Zotero is a cross-platform tool geared specifically for cataloging your research. A Resource for IT Professionals. Why desktop 3D printing still sucks Why desktop 3D printing still sucks 3D printing is an amazing technology, but the usefulness of desktop printers has been incredibly overhyped. Let's talk about why that is and how to improve it. Read more → Dell is back in bed with Linux Dell is back in bed with Linux Dell is at it again... selling Linux powered laptops. VMware may fall victim to virtualization cost cutting VMware may fall victim to virtualization cost cutting Keith Townsend explores whether VMware vSphere has gone from a product that reduces costs to a baseline expense that enterprises are looking to cut. Michael Kassner // June 19, 2015, 1:30 PM PST Matchlight finds breaches faster by scouring the dark web for stolen data Matchlight detects data breaches faster, more accurately, and in a way you might not expect.

Don't Miss Our Latest Updates Editor's Daily Picks Week in Review Nick Heath // June 19, 2015, 4:54 AM PST If you can't beat 'em, join 'em. Load More Editor's Picks. 10 dumb things users do that can mess up their computers. Users find plenty of ways to run into trouble, from gunking up their system with shareware to leaving it exposed to attackers to forgetting about using surge protectors. Share this list with your own users so they can sidestep preventable problems like these. We all do dumb things now and then, and computer users are no exception. Inadvertently pressing the wrong key combination or innocently clicking OK in the wrong dialog box can change important settings that alter a computer's behavior or even crash the system.

Nervous newbies are often fearful that one wrong move might break the computer forever. Luckily, short of taking a sledge hammer to the box, the consequences aren't usually quite that dire. Note: This article is also available as an article and as a PDF download. #1: Plug into the wall without surge protection Here's one that actually can physically destroy your computer equipment, as well as the data it holds. . #2: Surf the Internet without a firewall #6: Open all attachments. Understanding and selecting authentication methods.

If you are serious about computer/network security, then you must have a solid understanding of authentication methods. Debra Littlejohn Shinder takes a moment to lay out the role authentication plays in a security plan. Computer/network security hinges on two very simple goals:Keeping unauthorized persons from gaining access to resourcesEnsuring that authorized persons can access the resources they needThere are a number of components involved in accomplishing these objectives. One way is to assign access permissions to resources that specify which users can or cannot access those resources and under what circumstances. (For example, you may want a specific user or group of users to have access when logged on from a computer that is physically on-site but not from a remote dial-up connection.) Access permissions, however, work only if you are able to verify the identity of the user who is attempting to access the resources.

How does authentication work? Quick Tip: Change Microsoft live to a local account in Windows 8.1. Since the Windows 8.1 update, I have been asked many times how to change a Microsoft live account into a local account without losing data. Here is how you do it. When I wrote Quick Tip: Change to a local account in Windows 8.1, I was concentrating on the problem presented during the free upgrade process from Windows 8 to 8.1 where you seemingly had no choice but to choose the Microsoft account login option. In my scenario, I was starting Windows 8.1 from scratch and did not have any pre-existing apps or data to worry about.

After writing that Quick Tip, I received numerous emails asking for information on how to switch to a local account without losing all the previously installed apps and associated data. This is possible and relatively easy. Note: I would make sure your Windows 8 operating system is updated because you don't want anything running the background while you attempt to switch accounts. The first thing you have to do is get to the Your Account screen. Figure A Figure B. 10 things you have to know to be computer literate. Many of your users are coasting along without adequate computer knowledge. Help them close the gap by sharing this list of essential skills. It is tempting to think that because you have used a computer for a long time, you are "computer literate" or "computer savvy," but this is not the case.

Here are 10 skills you absolutely must know to be considered computer literate. If you already know these, you should be helping others learn them as well! 1: Search engines Using a search engine is more than typing in the address, putting a couple of keywords into the big text box, clicking Search, and choosing the first result. 2: Word processing Word processing is one of the oldest uses for a computer. 3: Spreadsheets Spreadsheets were the killer application that got a lot of people willing to pony up big bucks for a PC in the early 1980s. 4: Browser basics It is almost painful to watch some "computer savvy" people operate a Web browser. 5: Virus/malware scanning 6: Common keyboard commands What else?

Three methods for transferring files to and from your Android tablet. If your Android tablet doesn't have a USB port, you can still easily transfer your files to and from a PC. Jack Wallen explains three ways this can be done. Transferring files to and from your tablet can sometimes be difficult, especially if it doesn't include a standard USB port. Sure, emailing files back and forth works, but many users need to have a more consistent, reliable, and easier means to transfer files to and from their Android tablet. Let's dive in and examine a few methods for transferring files without a USB port. None of these methods are especially challenging, but they can require the installation of software and, in one case, necessitate that you share out folders on your PC (so you'll need the ability to do that). 1.

The microSD method If you're particular tablet has a microSD card, you're in luck. If your tablet doesn't have a microSD card slot, you may still be able to purchase a USB and card connection kit, such as this USB and SD(HC)/MS/MMC/M2/TF card reader. 2. 3. IT Innovation Report 2015: Top companies, key tech drivers, and biggest roadblocks. The industrial Internet of Things: Setting the context, seeing the value. 10 things that define a true professional. You may be a brilliant developer, a highly skilled net admin, or a crackerjack DBA -- but if you're unprofessional, your career is likely to fall short. Alan Norton offers some attributes to strive for. The term professional is thrown around quite a bit these days, perhaps too much. I do it myself. But what exactly does it mean to be a professional? Note: This article is also available as a PDF download. 1: Put customer satisfaction first Understanding and satisfying your customer's needs are the cornerstones of a successful business.

You may not view those you work with as your customers, but in many cases, they are. Professionals identify and satisfy their customer's needs. 2: Make expertise your specialty The very word professional implies that you are an expert. Become an expert in the skills and tools necessary to do your job. Professionals know their trade. 3: Do more than expected Professionals aren't bound by a time clock. Professionals are expected to produce results. The final word. TechRepublic - A Resource for IT Professionals.

Five trustworthy password recovery tools. In a bad situation, you may have to use a specialized tool to recover a password. Here are five reliable apps you can turn to. Many people take a dim view of password recovery tools for ethical reasons -- understandably so. You have a tool that can, in some cases, crack passwords on machines. But in certain situations, these tools wind up being the last ditch effort that can save you from having to go as far as reinstalling the operating system. Imagine losing your Windows Server administrator password and not having the means to retrieve it. Would you want to have to reinstall? Not on your life! Note: This list is also available as a photo gallery. LCP (Figure A) is a user-account password recovery tool for Windows NT/2000/XP/2003.

Figure A 2: Ophcrack Ophcrack (Figure B) is one of the most popular password recovery tools. Figure B Ophcrack Windows Key (Figure C) can reset your Windows password for you. Figure C Windows Key 4: Windows Password Unlocker Figure D Windows Password Unlocker Figure E.