Additional TechRepublic resources | | Unix vs. Microsoft Windows: How system designs reflect security philosophy There are distinct differences between Unix and MS Windows security philosophies. Two design policies serve as apt examples of those differences. Read more | 10 steps to creating an Outlook appointment (without using your mouse) If you're a diehard keyboard fan, you'll appreciate this mouse-free technique for setting up your Outlook appointments. Read more | Five Exchange 2010 gotchas and how to handle them Before upgrading to Exchange 2010, there are five points of caution that administrators should understand. Scott Lowe discusses these Exchange 2010 gotchas and explains how to mitigate each one. Read more | Gartner's top 10 technologies for 2011 Gartner has identified its top technologies for 2011. Larry Dignan explains the rationale behind those choices and shares his thoughts on their viability and impact. Read more | Five more snarky remarks Steve Jobs could have made, if asked Steve Jobs issued a verbal smackdown of Apple competitors on Monday. Since he was being so candid, here are five questions I would have liked to asked Steve, and a stab at how he might have answered. Read more | A remembrance of Benoit Mandelbrot, the father of fractal geometry Benoit Mandelbrot, who is considered the father of fractal geometry, died last week. Edmond Woychowsky offers this remembrance of the great mathematician, author, Yale professor, and IBM Fellow. Read more | Featured multimedia
| | The top 10 geek sins TechRepublic has previously talked about some of the things you can do to increase your geek cred. Naturally, there are also some things that can hurt your reputation as a geek. In fact, we've put together a list of 10 of the worst transgressions for any geek. Doing any one of these will put your geek credentials at risk. Do two of them and your geek card immediately gets revoked. View on site |  | |  |  | Connect with TechRepublic | | | |
No comments:
Post a Comment