Best viewed in Firefox and Flock browsers
Three Ways to Get FREE Technical Support here.
1. Search for existing articles ans solutions using the search box.
2. Email your questions to FreeHelp@cesabarre.com
3. Post your questions right here for everyone to see and help you.

Apple passes HP as top global PC maker (if you count the iPad)

Tech Sanity Check

TechRepublic Member | January 31, 2012

Canalys: Apple topples HP in global client PC market

Apple is on a roll already in 2012 after nabbing the top spot of another major tech list. Read more

Resource of the day

Live Webcast: Is 2012 the Year of the Cloud? Then It's Also the Year of Google Apps

Check out this live webcast from Google. You'll learn all about Google Apps, how it works within the cloud, and what it can do for your business. Tune to learn more.


More from TechRepublic

 

Windows 7 will not be the new XP because Windows 8 is not Vista

Infographic: Kim Dotcom and the Megaupload story

10 Internet access tips for travelers

News from ZDNet

 

Google to Congress: Let's correct some privacy policy 'misconceptions'

Foxconn 'working conditions' row fails to deter prospective workers

Mark Zuckerberg was planning to sell Facebook in July 2004

Comcast issues six-month progress report for cheaper broadband program

Planetary-scale computing

Amazon Web Services hosts more than 762 billion objects in S3

Andreessen Horowitz raises more dough for enterprise disruption

AT&T's Samsung Galaxy Note hit stores Feb. 19; $300 with contract

SeaMicro teams with Intel, Samsung on fabric-based Xeon micro server

Last Facebook valuation before IPO filing: $83.5 billion

Windows 8 and the death of 'rich' apps

Microsoft's Office 15: To Metro or not to Metro?

Nokia's continued feature phone focus may be one of their smartest moves

IBM acquires Worklight, eyes mobile device management

How Facebook protects users from malicious URLs

Facebook scam: I've lost 10 pounds in just one week all thanks to HCG! Check it out

News from CNET

 

Apple takes PC crown from HP

MegaUpload ripped off YouTube, tried smearing rivals, U.S. says

Three reasons Facebook has to go public

Google responds to Congress over privacy policy inquiries

FCC reforms phone subsidy program for the poor

Andreessen Horowitz raises $1.5 billion VC fund

Andreessen on $1.5B fund: 'The opportunities seem very large'

AT&T gives heavy data users a not-so-subtle hint to ditch the unlimited plan

Twitter CEO Dick Costolo talks censorship

Startup Secret No. 28: Woo your mentor-to-be

Obama's staffers to use Square mobile in fundraising

Smart paint could make bridges, mines safer

Woman claims Facebook comments world record


Featured galleries

 

Top iPhone 4 and 4S extended battery cases

Starship Enterprise coffee table puts your feet in orbit (photos)


Featured Webcast

Live Webcast: Security and Google Apps

If you're considering switching from on-site to cloud-based technologies, but you're concerned about security allow this webcast to comfort you. You'll see why the cloud is more secure than you think.


Today's recommended downloads

Live Webcast: Is 2012 the Year of the Cloud? Then It's Also the Year of Google Apps (TechRepublic)

Live Webcast: IT Consumerization and Google Apps (TechRepublic)

Live Webcast: Security and Google Apps (TechRepublic)

Live Webcast: Higher Ambition - How Great Leaders Create Economic and Social Value (Citrix Online)

Emerging BI Technologies for Companies of All Sizes (IBM)


 

About this newsletter

The Tech Sanity Check newsletter gives you my picks for the top tech stories of the day on the products, people, and ideas that are revolutionizing the planet.

Jason Hiner
TechRepublic Editor in Chief

For real-time updates on the latest tech stories, follow:

My Twitter feed: @jasonhiner

My Google+ feed: +Jason Hiner

Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

Insidious insiders: Psychology provides clues in handling invisible threats

Dominic Vogel considers the insider threat risk in organizations and suggests that cross-departmental collaboration could help shore up data loss prevention methods.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

Tablets in the Enterprise

Five Apps

Software Engineer

Smartphones



Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is laoanganon@gmail.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

Apple passes HP as top global PC maker (if you count the iPad)

Tech Sanity Check

TechRepublic Member | January 31, 2012

Canalys: Apple topples HP in global client PC market

Apple is on a roll already in 2012 after nabbing the top spot of another major tech list. Read more

Resource of the day

Live Webcast: Is 2012 the Year of the Cloud? Then It's Also the Year of Google Apps

Check out this live webcast from Google. You'll learn all about Google Apps, how it works within the cloud, and what it can do for your business. Tune to learn more.


More from TechRepublic

 

Windows 7 will not be the new XP because Windows 8 is not Vista

Infographic: Kim Dotcom and the Megaupload story

10 Internet access tips for travelers

News from ZDNet

 

Google to Congress: Let's correct some privacy policy 'misconceptions'

Foxconn 'working conditions' row fails to deter prospective workers

Mark Zuckerberg was planning to sell Facebook in July 2004

Comcast issues six-month progress report for cheaper broadband program

Planetary-scale computing

Amazon Web Services hosts more than 762 billion objects in S3

Andreessen Horowitz raises more dough for enterprise disruption

AT&T's Samsung Galaxy Note hit stores Feb. 19; $300 with contract

SeaMicro teams with Intel, Samsung on fabric-based Xeon micro server

Last Facebook valuation before IPO filing: $83.5 billion

Windows 8 and the death of 'rich' apps

Microsoft's Office 15: To Metro or not to Metro?

Nokia's continued feature phone focus may be one of their smartest moves

IBM acquires Worklight, eyes mobile device management

How Facebook protects users from malicious URLs

Facebook scam: I've lost 10 pounds in just one week all thanks to HCG! Check it out

News from CNET

 

Apple takes PC crown from HP

MegaUpload ripped off YouTube, tried smearing rivals, U.S. says

Three reasons Facebook has to go public

Google responds to Congress over privacy policy inquiries

FCC reforms phone subsidy program for the poor

Andreessen Horowitz raises $1.5 billion VC fund

Andreessen on $1.5B fund: 'The opportunities seem very large'

AT&T gives heavy data users a not-so-subtle hint to ditch the unlimited plan

Twitter CEO Dick Costolo talks censorship

Startup Secret No. 28: Woo your mentor-to-be

Obama's staffers to use Square mobile in fundraising

Smart paint could make bridges, mines safer

Woman claims Facebook comments world record


Featured galleries

 

Top iPhone 4 and 4S extended battery cases

Starship Enterprise coffee table puts your feet in orbit (photos)


Featured Webcast

Live Webcast: Higher Ambition - How Great Leaders Create Economic and Social Value

Is it possible to please everyone? Michael Beer, Professor of business at Harvard Business School thinks so. Check out this webcast to hear his take on how to keep everyone happy with proper leadership.


Today's recommended downloads

Live Webcast: Is 2012 the Year of the Cloud? Then It's Also the Year of Google Apps (TechRepublic)

Power and Cooling Capacity Management for Data Centers (American Power Conversion (APC))

Stop Taking the Heat - Six Steps to Avoid the e-Discovery Inferno (Quest Software)

Live Webcast: Higher Ambition - How Great Leaders Create Economic and Social Value (Citrix Online)

Cables and Connectors: Planning your Data Center (American Power Conversion (APC))


 

About this newsletter

The Tech Sanity Check newsletter gives you my picks for the top tech stories of the day on the products, people, and ideas that are revolutionizing the planet.

Jason Hiner
TechRepublic Editor in Chief

For real-time updates on the latest tech stories, follow:

My Twitter feed: @jasonhiner

My Google+ feed: +Jason Hiner

Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

Insidious insiders: Psychology provides clues in handling invisible threats

Dominic Vogel considers the insider threat risk in organizations and suggests that cross-departmental collaboration could help shore up data loss prevention methods.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

Tablets in the Enterprise

Five Apps

Software Engineer

Smartphones



Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is ceasar@cesabarre.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

The Featured Five

The Five Most Popular IT Resources Right Now


IT Whitepapers 

IT Whitepapers

The 5 W's Small Businesses Consider When Seeking Voice Solutions
In this whitepaper, answer all the critical questions related to successfully choosing a voice solution: Who in the company should be in charge of finding a communications solution? What features are most desired in today's market? When and how quickly do businesses typically decide to change telephony services? Where is the best place to search for options? And ultimately, why does one choose to go with a particular provider in the end?

SIP Trunks: Keeping Your UC System Secure

Since SIP trunks use IP-based protocols that require a system to be opened up to a wide area network (WAN) that should be assumed insecure, organizations must educate themselves about the salient security aspects pertaining to SIP trunks and how to ensure the appropriate level of security. This white paper examines security considerations for SIP trunks, and provides valuable information and insight into the security options available today.

IT Pros Guide to Data Protection: Top 5 tips for Securing Data in the Modern Workforce

While many organizations have spent a lot of time and effort moving toward the very worthwhile goal of implementing content-filtering-based technology such as data leak prevention (DLP), the truth is that a lot of fundamental groundwork needs to be laid before an organization should even think of DLP. The following five steps are some very effective ways to improve data security in a cost-effective manner and are the first steps toward readying an organization for more robust data protection measures such as DLP.

Databases and ERP Selection: Oracle vs. SQL Server
An enterprise application like enterprise resources planning (ERP) or enterprise asset management (EAM) is comprised of multiple technologies layers, but during a software selection process it is the database layer that can be the subject of some of the most heated discussions, at least among technologists. This white paper outlines the advantages and disadvantages of the Oracle and Microsoft SQL Server database platforms.

Five things you didn't know about Subversion
Subversion has become the version control standard for developers around the world. Whether you are in a regulated industry or just demand better controls in configuration management, Subversion provides the robust, centralized version control functionality chosen to replace legacy systems. After ten years of community social development and now a successful Apache Foundation project, Subversion is secure and mature for the complexity of modern application development at any scale.

For daily updates follow ITwhitepapers on Twitter

SUBSCRIPTION SERVICES
You are currently subscribed as ceasar@cesabarre.com. If you do not wish to receive future mailings from IT Whitepapers Online Resources, need to change your email or other preference, please visit:
visit us here.

View IT Whitepapers's online
privacy policy.

Copyright 2012 | IT Whitepapers | 492 Old Connecticut Path | Framingham MA 01701 |
www.itwhitepapers.com
 
 

[TechRepublic] What can be done about apps gone rogue?

IT Security

TechRepublic Member | January 31, 2012

Repurposed software: Apps gone rogue

You come up with a dynamite app. Companies are thrilled with it. Next thing you know, your app is used to deny visitors access to a website. Michael Kassner considers repurposed software. Read more

Resource of the day

Live Webcast: Is 2012 the Year of the Cloud? Then It's Also the Year of Google Apps

Check out this live webcast from Google. You'll learn all about Google Apps, how it works within the cloud, and what it can do for your business. Tune to learn more.


World IPv6 launch day set: Security pitfalls to look out for

Patrick Lambert warns that when the IPv6 launch date officially arrives this June 6, it will be prudent to watch out for some security gaps in the initial days. Here are some issues to think about. Read more

Insidious insiders: Psychology provides clues in handling invisible threats

Dominic Vogel considers the insider threat risk in organizations and suggests that cross-departmental collaboration could help shore up data loss prevention methods. Read more

Symantec says to disable pcAnywhere after source code exposure by Anonymous

Symantec acknowledges a breach that exposed the source code for pcAnywhere. Users are advised to disable it immediately until software updates are available to resolve vulnerabilities. Read more

Additional TechRepublic resources

 

One policy, one Google experience, even more declarations of evil

As soon as you connect a device to the Internet, you are tracked, cataloged, and targeted with "appropriate" advertising. Is that really evil? Read more

Stop deceptive phishing emails with DMARC.org standards

Dealing with the aftereffects of a phishing attack can be more than a little frustrating. One group is trying to fix that with a set of standards. Read more

New Asus Transformer Prime comes complete with previous owner's personal info

Always wipe gadgets before returning them. Bill Detwiler shares a cautionary tale and steps for wiping iOS, Android, and Windows Phone 7 devices. Read more

An argument against the new secure boot feature in Windows 8

Donovan Colbert argues that settling for mandatory, walled gardens is giving away the liberty to use your hardware as you see fit. Read more

Featured multimedia

 

How to passcode lock Wi-Fi on Kindle Fire (photos)

Learn how to disable the Wi-Fi connection on an Amazon Kindle Fire tablet, preventing the possibility of having your credit card charged or exposing children to objectionable content. View on site


Featured Webcast

Live Webcast: Fast and Efficient Business Security Strategies

Check out this webcast to learn more about fast and efficient business security strategies. You're in the midst of an arms race, make sure you win it.


Today's recommended downloads

Oracle's Sun Fire X4800 M2 Server Architecture (Oracle)

The IT Modernization Challenge: Maintain or Innovate? (Oracle)

Live Webcast: Is 2012 the Year of the Cloud? Then It's Also the Year of Google Apps (TechRepublic)

Oracle Business Process Management Suite (Oracle)

Datacenter Transformation with Oracle's Blade and x86 Servers (Oracle)


Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

30 knock-out photography websites

Web designer Ryan Boudreaux makes 30 picks for some of the most inspirational photography-oriented websites.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise

App Builder

10 Things




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is laoanganon@gmail.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.