[TechRepublic] How to find out what you don't know

IT Leadership

TechRepublic Member | February 07, 2012

How to find out what you don't know

If you feel you know everything about your organization and its strengths and deficiencies, it's not the end of the world. In fact, it's the only way to fix things. Read more

Resource of the day

Cloud Storage for Efficiency and Capacity Management

Many businesses are turning to cloud storage because it's flexible and scalable. That means you won't have to worry about running out of space so much. Read this white paper to learn more.


Will tablets pave the way for enterprise tabletop computing?

Patrick Gray believes that tabletop computing shares many features of tablet computing, but he doesn't think tabletop technology will impact the enterprise for quite some time. Read more

The three types of online attackers

Patrick Lambert describes the three main groups of attackers that security specialists are guarding against. Read more

Nudge stakeholders into addressing project issues now

Ken Hardin shares tricks on how to get stakeholders to answer your questions about a project's business requirements. If you don't get answers now, it will cost more to figure out later. Read more

Run a list of rolling credits at the end of your PowerPoint presentation

Acknowledge important credentials using PowerPoint's credits effect at the end of your presentation. Read more


Featured multimedia

 

20 Windows Phone apps for business (gallery)

According to recent figures Apple has 10 times more apps than Microsoft but that doesn't mean Windows Phone users don't have a lot to choose from. View on site


Featured Webcast

Live Webcast: 3 Simple Steps to Better Patch Security

For better patch security, you'll need to take some precautions and know how to react when the time comes. For help with that, check out this live webcast from TechRepublic.


Today's recommended downloads

Open Data Center Alliance: Usage Model Requirements (Intel Corporation)

Prevent Your Next Server Room Mishap With Proper Monitoring (APC by Schneider Electric)

Securing Virtualized Web Apps (Intel Corporation)

Live Webcast: 3 Simple Steps to Better Patch Security (Sophos)

Consolidate Traffic & Boost Performance (Cisco Systems, Inc)


Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

The three types of online attackers

Patrick Lambert describes the three main groups of attackers that security specialists are guarding against.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise

App Builder

10 Things




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is ceasar@cesabarre.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment