Best viewed in Firefox and Flock browsers
Three Ways to Get FREE Technical Support here.
1. Search for existing articles ans solutions using the search box.
2. Email your questions to FreeHelp@cesabarre.com
3. Post your questions right here for everyone to see and help you.

[TechRepublic] Universal Wi-Fi hotspot roaming? Wi-Fi Alliance, Cisco, and telcoms are working on it

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

Sanity Check

TechRepublic Member | March 22, 2011

Editor's note: Read about a new initiative to set up seamless roaming and security across Wi-Fi hotspots to help unclog mobile broadband. Also, read about Amazon's Android app store, Mac "Freezegate," and all the news from CTIA Wireless 2011. -Jason

Cisco, Wi-Fi Alliance, and telecoms look to secure, simplify Wi-Fi hotspots

A new program called Wi-Fi CERTIFIED is aimed at simplifying global roaming across hotspots for mobile devices. Read more

Resource of the day

More from TechRepublic

 

Hot U.S. jobs in game development: Week of March 21, 2011

For many, working for a video game developer is a childhood fantasy. Here are some of the jobs openings we rounded up in some of the major players: Read more

Apple's App Store and a little trademark history

Apple is suing Amazon.com over use of the App Store trademark. Apple was granted the App Store trademark by the U.S. Patent and Trademark Office, but Microsoft is opposing the registration. This trademark fiesta started with Salesforce.com. Read more

News from ZDNet

 

Amazon launches Android Appstore: Trial balloon ahead of a tablet?

Amazon launched its Appstore for Android and the effort may hint at a bigger strategy for tablets. Read more

RIM's BlackBerry PlayBook prepped for April 19 launch

Research in Motion's BlackBerry PlayBook will be available at Best Buy starting April 19 as well as other retailers. Read more

Why Internet Explorer will survive and Firefox won't

Three major releases from the three leading browser developers in the same month? That's unheard of. A closer look reveals that the rules have changed in the browser space and why the core of... Read more

Did Microsoft use the "Firefox' keyword on Twitter to promote IE9?

This is interesting ... searches on Twitter for the term 'Firefox' were pointing to a 'Promoted Tweet' featuring IE9. Did Microsoft purchase the 'Firefox' keyword on Twitter to promote its own... Read more

Intel mobile chief quits amid disappointing push to smartphones, tablets

Anand Chandrasekher, who led Intel's recent efforts in the mobile chip and platform space, quit as the chipmaker has struggles against rivals Apple, Nvidia and Qualcomm, the company announced... Read more

Judge shoots down Google Book Settlement: Author opt-in needed

A Federal appeals judge shot down Google's settlement with authors and publishers and plans to put millions of books online. Authors should opt-in to Google's program not be forced to opt-out. Read more

Samsung gets competitive with Galaxy Tab 8.9, 10.1

Samsung has taken the desire to compete with the iPad seriously, as the two new Galaxy Tab tablets are priced less than the iPad, and are thinner. Read more

Apple patches Pwn2Own flaw in massive Mac OS X update

Apple has shipped another Mac OS X mega-update with fixes for 54 security vulnerabilities, including one that was used to hijack an iPhone 4 device at this year's CanSecWest Pwn2Own hacker challenge. Read more

Has Apple fixed the MacBook Pro 'Hard Freezegate'?

Over on Apple's support forum some owners of the new 2011 MacBook Pro have been complaining that their notebooks are locking up or 'hard freezing' under heavy load. Yesterday Apple released a Mac... Read more

AT&T and T-Mobile: A look at the handset fallout

AT&T's $39 billion acquisition of T-Mobile has a lot of moving parts, but one thing is for certain: Device makers are going to be squeezed as distribution channels are whittled down to two giants,... Read more

Android Linux FUD Debunked

Android may have legal problems with Microsoft and Oracle, but it has nothing to worry about from Linux. Read more

LinkedIn reaches 100 million profiles, but so what?

But a far-reaching network and 100 million profiles is a far cry from the default professional homepage and network that LinkedIn needs to become. Read more

Windows 8: More information from employee resumes, portfolios, and job ads

Here is the continuation of the story of Microsoft's next OS, Windows 8, as told by employees and job ads! Read more

Google experiments with plugless charging for electric vehicles

Yep, we all know that Google is pretty fanatical when it comes to green and clean technology research and development. So I wasn't surprised to hear last night that the giant Internet company is... Read more


Featured multimedia

 

CTIA Wireless: ShowStoppers highlights some of the latest cutting edge gadgets

CTIA Wireless 2011 has commenced in Orlando, Florida. Here's a look at some of the latest gadgets that were shown off at ShowStoppers on Monday. View on site

HP Compaq 6000 Pro All-in-one Business PC Teardown

Bill Detwiler cracks open the HP Compaq 6000 Pro All-in-one Business PC in this TR Dojo teardown. This PC has chips from Intel, Elpida, and NVIDIA. View on site

Top 10 technologies that could live another 20 years

A blast from the 1991 past: A look at 10 technologies - hardware and software - which have, and could last another 20 years. View on site

Nexus S 4G hands-on (photos)

CNET takes a hands-on look at the Nexus S 4G for Sprint at CTIA 2011. View on site



Today's recommended downloads

LiveAction All-In-One QoS Expert Software (ActionPacked!)

Learn How to Generate Significant Power Cost Savings while Improving Performance (Dell)

Simplifying Entry-Level Backup & Recovery (Quantum)

Need a Long-Term Archive Solution? Read On (Quantum)

Why Your Organization Needs LTO-5 Today (Quantum)


 

About this newsletter

The Tech Sanity Check newsletter is my daily update on the world of technology. You'll get my opinions, reviews, user polls, and hand-picked stories of the day.

Jason Hiner
TechRepublic Editor in Chief

My Twitter feed: @jasonhiner

10 ways to keep your messages out of spam filters

Legitimate messages that get snagged by spam filters can lead to big problems -- such as derailed job searches, hard feelings, and lost business. These tips will help ensure that your messages reach their intended targets.



TechRepublic newsletters

 

Get IT advice and techniques, mobile news, Mac tips, and product reviews in these TechRepublic newsletters. Automatically sign up today!

Five Tips

10 Things

Smartphones

Macs in Business

Product Spotlight


Camera phone challenges

Travel

Sunrise / sunset

Snow and ice

Pets

More camera phone challenges


Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is laoanganon@gmail.com
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2011 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

[TechRepublic] How to use Password Safe on Windows 7

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

IT Security

TechRepublic Member | March 22, 2011

How to use Password Safe on Microsoft Windows 7

Password Safe is an excellent choice of password manager on the MS Windows platform. Using it effectively can save time, effort, and privacy. Read more

Resource of the day

LiveAction All-In-One QoS Expert Software

Discover how Cisco QoS software can help you prioritize network resources to achieve the optimal end-user experience for the applications that are most important to your business. Download your 14-day free trial now.


Cybercrime tool: How write-prints can crack anonymous email senders

Cybercriminals often use anonymously-sent email to further their schemes, but new digital forensic methods may help identify senders so that they can be prosecuted in court. Read more

How to use WinSCP with public key authentication

Public key authentication with SSH is possible with WinSCP, but it requires some work to set up. Chad Perrin details the steps. Read more

Extreme cybercrime: Preparing for the worst

Deb Shinder explains how cyberterrorists seek to disrupt critical systems and spread panic. What does this threat mean to IT pros and how can you train to counter cyberterrorism? Read more

Additional TechRepublic resources

 

Review: Ashampoo Magical Security 2 for easy encryption

Ashampoo Magical Security 2 is a tool that enables you to encrypt/decrypt files and folders either from a simple to use window or from within Windows Explorer. Read more

Four potentially unsafe data destruction methods

Data protection needs require different levels of destruction. Scott Lowe covers four methods that might be considered ineffective for particularly high security needs. Read more

Featured multimedia

 

CTIA Wireless: ShowStoppers highlights some of the latest cutting edge gadgets

CTIA Wireless 2011 has commenced in Orlando, Florida. Here's a look at some of the latest gadgets that were shown off at ShowStoppers on Monday. View on site


Camera phone challenges

Travel

Sunrise / sunset

Snow and ice

Pets

More camera phone challenges


Today's recommended downloads

Lower Costs and Improve Productivity through Virtualization (Dell)

LiveAction All-In-One QoS Expert Software (ActionPacked!)

How the Right Infrastructure Delivers Real SQL Database Virtualization Benefits (Dell)

How-to Guide: Consolidating Multiple SQL Server Systems (Dell)

Drive Down TCO in Your Data Center (Dell)


10 ways to keep your messages out of spam filters

Legitimate messages that get snagged by spam filters can lead to big problems -- such as derailed job searches, hard feelings, and lost business. These tips will help ensure that your messages reach their intended targets.




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is laoanganon@gmail.com
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2011 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

[TechRepublic] Optimizing Hyper-V, cutting down on unpaid consulting work, managing your CUPS print server

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

Five Tips

TechRepublic Member | March 22, 2011

Five tips for optimizing Hyper-V

By following a few simple practices, you can get more value out of your server hardware while still delivering good VM performance. Brien Posey offers tips for tuning your Hyper-V environment. Read more

Resource of the day

LiveAction All-In-One QoS Expert Software

Discover how Cisco QoS software can help you prioritize network resources to achieve the optimal end-user experience for the applications that are most important to your business. Download your 14-day free trial now.


Hottest new tips

 

Five tips for cutting back on uncompensated consulting work

If your consultancy provides free support to callers, think of how many billable hours you lose each year. Here are tips on how to reduce free consulting in your firm. Read more

Five tips for managing your CUPS print server

Simplify your print management tasks with the help of the Common UNIX Print Server (CUPS). These pointers will help you avoid problems and get the most benefit from this powerful tool. Read more


Additional TechRepublic resources

 

Three new features make the iPad even more business friendly

Erik Eckel describes the features that make the iPad 2 even better for business use. Were features on your wish list left out? Read more

Signs you're about to be fired

Here are a few behaviors to look for in your boss that may indicate your job is in danger. Read more

Four potentially unsafe data destruction methods

Different data protection needs require different levels of destruction. Scott Lowe covers four methods that might be ineffective for particularly high security needs. Read more


Featured multimedia

 

Tablet timeline: A retrospective

A timeline of tablet computing, from early input devices to the handheld devices of today. View on site



Today's recommended downloads

LiveAction All-In-One QoS Expert Software (ActionPacked!)

Server Virtualitzation: Dell EqualLogic PS Series and Microsoft WS 2008 Hyper-V (Dell)

Best Practices for running Microsoft SQL Server and Hyper-V on Dell PowerEdge Servers and Storage (Dell)

Microsoft Dynamics CRM Performance and Scalability in a Virtual Environment With Hyper-V (Dell)

Comparing Server Configurations (Dell)


Tablet timeline: A retrospective

This gallery features a timeline of tablet computing, from early input devices to the handheld devices of today.



TechRepublic newsletters

 

Get Mac tips, product reviews, and smartphones news in the following TechRepublic newsletters. Automatically sign up today!

Macs in Business

Product Spotlight

Smartphones

10 Things



Camera phone challenges

Travel

Sunrise / sunset

Snow and ice

Pets

More camera phone challenges



Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is laoanganon@gmail.com
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2011 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.