| TechRepublic Out Loud | The 3D gimmick In this weekly recap post, you'll get a quick look at the top discussions and members on the TechRepublic forums. >> Read the blog | Wanted: Your Best Tips and Tricks If you have cool tips or tricks that you'd like to share with your TechRepublic peers -- from navigating your OS, keyboard shortcuts, or even uncovering hidden Easter eggs -- simply click here to send them in. If we feature your tips or tricks in the TechRepublic Out Loud blog, we'll send you some TechRepublic swag! | | | Member Photo Galleries | Quite a few TR members have pets at home, and this is the purrrfect place to show them off. This week's "pet of the week" is Rocky , submitted by TR member OLIRC. >> View the gallery | Swag Central | Each week, we randomly select three TechRepublic members -- listed below (in Orange) -- to receive some TechRepublic swag. | If your name appears above (again - in Orange), simply send us an email with your mailing address, and you'll soon be sporting your very own TechRepublic swag. Just remember, you only have until 11:59pm ET, Friday, May 6th, 2011 to let us know you spotted your name! (Please send all correspondence from your registered email with TechRepublic.) | | |  |  | Connect with TechRepublic | | | Community Happenings | Registration for TechRepublic Live 2011 is now open TechRepublic is hosting a free tech event in Louisville, KY, on Sept. 28-30, 2011. Seating is limited, so we encourage members to reserve a spot via the TechRepublic Live 2011 Registration page. >> Read the blog | ............................................................................................. | Download TechRepublic's iPhone, Android Mobile app The TechRepublic app brings you the best insight from IT pros and peer-to-peer advice from the largest IT community on the Web. Get real world IT solutions right in your pocket - with TechRepublic's Free Mobile app! >> iPhone/iPad Download >> Android Download | | TechRepublic Blogs | Are you at risk for being accused of a cybercrime? Deb Shinder: IT pros have access to sensitive information and systems that can make them the target in cybercrime investigations. >> Read the blog | ............................................................................................. | Forged memory fools antimalware: A new development in rootkits Malware developers are deploying a new stealth technology. Michael Kassner interviews an expert who explains how some rootkits forge memory to outwit antimalware programs. >> Read the blog | ............................................................................................. | 10 cool add-ins for Office 2007 and 2010 Add-ins let you enhance your Office apps so they can do more things -- and do things better. Susan Harkins combed through the vast sea of Office add-ins to produce this list of winners. >> Read the blog | ............................................................................................. | Poll: Has Microsoft lost its evil corporation status to Google and Apple? Mark Kaelin: In the past, Microsoft has often been dubbed an evil corporation, but has Microsoft lost its evil corporation status to Google and Apple? >> Read the blog | ............................................................................................. | Facebook and Twitter: Treat them like your kids Jason Hiner: Just as parents need to treat their various kids differently, but fairly, so do professionals need to deal with Twitter and Facebook using a separate but equal approach. Here are some suggestions. >> Read the blog | | | |
No comments:
Post a Comment