[TechRepublic] New TR Dojo: Five Active Directory design best practices

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

TechRepublic TR Dojo

TechRepublic Member | October 26, 2010


Video: Five Active Directory design best practices

Bill Detwiler shares five Active Directory best practices that can help you maximize efficiency, simplify maintenance, and effectively manage AD. Read more

Cracking Open a Seagate 50 MB RLL drive

Resource of the day

Solve the Desktop Management Challenge

Discover desktop virtualization in this white paper. The latest virtualization technologies enable the virtual desktop or application environment to be maintained centrally and delivered to users across the network, leaving you with fewer IT hassles.


Additional TechRepublic resources

 

Video: Five tips for improving a new Windows PC

Bill Detwiler shares five tips for setting up a new computer that every PC owner should consider before going online. Read more

Video: Remove icons from the Windows Control Panel

Bill Detwiler explains how to lock down the Windows Control Panel by removing individual icons or picking the ones that are displayed. Read more

Five must-have Android apps for network administrators

If you're a net admin who is always on the go and you use an Android phone, check out these five free mobile applications that Jack Wallen considers must haves. Read more

Testifying as an expert witness in computer crimes cases

As an IT pro, it's possible that you may be called to testify as an expert witness in cybercrime cases if your training and expertise qualify you. Deb Shinder tells potential expert witnesses what to expect and how to prepare. Read more

The best tools and methods to track down suspect IP addresses and URLs

Jack Wallen provides some basic recon tools and methods for finding IP addresses and URLs that you may need to track down for purposes of blocking, contacting, or satisfying simple curiosity. Read more

Poll: Top 10 alternative names for 'crapware'

Maybe the word 'crapware' says it all. But Michael Kassner is searching for a better descriptor for that plague of unwanted software. Vote for your favorite new name. Read more

The top 10 geek sins

10 Sysinternals tools you shouldn't be without

Track down issues that cause slower boot times

Dell Aero Smartphone Teardown

 


Featured multimedia

 

Dell XPS (photos)

The new Dell XPS line has high-end style at relatively affordable prices. View on site

Fallout: New Vegas (photos)

The follow up to one of 2008's best games provides more of what we've come to love from the Fallout series. View on site

NASA images: Desktop wallpaper from outer space

Some of the best desktop wallpaper available comes from the final frontier, where no one has gone before. View on site

Nikon Small World winning photographs under the microscope for 2010

Nikon Small World announced the winners of its 2010 photomicrography contest. Here are the Top 20, Honorable Mentions, and Images of Distinction. View on site


Featured Webcast

A Strategy for Keeping Your Data Secure

Security is a concern as more data is compromised by either malicious attacks or employee carelessness. Join this TechRepublic Webcast to explore the most promising ways that IT leaders can ensure the security of their organization.



IT Help Desk Survival Guide, 3rd Ed.

 
Have extra budget to spend? Then order TechRepublic's IT Help Desk Survival Guide, Third Edition provides tools and tips to help you better manage help desk services, improve end-user support, troubleshoot hardware issues, identify quick fixes to Windows problems, and help users make the most of Microsoft Office. Order the download today! IT Help Desk Survival Guide, Third Edition

Today's recommended downloads

State of Virtualization (Dell)

Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles (Dell)

Solve the Desktop Management Challenge (Dell)

Boost Business Responsiveness to Match Today's Fast-Changing World (Progress Software)

Increase innovation with Google Apps (Google)


End-user bloopers and IT chaos

 
Computer bloopers and blunders from the technically clueless

Computer bloopers and blunders from the technically clueless

What not to do in a server room

What not to do in a server room

Convicted of endangering their computers?

Convicted of endangering their computers?

Dirty computers: Revenge of the dust bunnies

Dirty computers: Revenge of the dust bunnies

 

Camera photo challenge: Costumes and pumpkin carvings

Submit your camera phone photos of costumes and/or pumpkin carvings by Nov. 5th. If your entry is voted one of the winning photos, you'll receive TechRepublic swag. Get more details.



TechRepublic newsletters

 

Get IT advice and techniques, mobile news, Mac tips, and product reviews in these TechRepublic newsletters. Automatically sign up today!

Five Tips

10 Things

Smartphones

Macs in Business

Product Spotlight



Apple iPad galleries

20 apps that play to the iPad's strengths

20 iPad competitors to watch

Apple iPad: The biggest annoyances

Cracking open the Apple iPad 3G



Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is laoanganon@gmail.com
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

 

Copyright 2010 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment