Best viewed in Firefox and Flock browsers
Three Ways to Get FREE Technical Support here.
1. Search for existing articles ans solutions using the search box.
2. Email your questions to FreeHelp@cesabarre.com
3. Post your questions right here for everyone to see and help you.

Your TechRepublic newsletter selections

Dear TechRepublic member,

You have been unsubscribed from the following newsletters:

--- App Builder

If you would like to make any other changes to your TechRepublic newsletter
selections, please visit:
http://www.techrepublic.com/newsletters

For answers to frequently asked questions or to contact our member support staff, please visit this page:
http://www.techrepublic.com/faq/general

Best Regards,

Jason Hiner
Editor in Chief, TechRepublic

[TechRepublic] Toshiba Thrive is best business-grade tablet

Cracking Open

TechRepublic Member | February 07, 2012

Editor's note
I cracked open and reviewed the Toshiba Thrive last year. This week, Joshua Burke adds his thoughts on why the Thrive is the best enterprise tablet.

Toshiba Thrive: The best business-grade tablet on the market

Find out why Joshua Burke believes that the 10.1-inch Toshiba Thrive is the best best business-grade tablet on the market today. Read more

Cracking Open the Toshiba Thrive

Resource of the day

Intelligent Power Management Improves Rack Density

Consider your data center, its power requirements can be steep, and sometimes it can even prevent you from keeping your data center organized. Read this white paper to learn how new innovations in power supplies can change that.


Additional TechRepublic resources

 

Cracking Open an ultrabook from 1999, the Compaq Armada M300

Ultrabook may be a new term, but thin, light laptops aren't a new. Bill Detwiler cracks open an ancestor of the ultrabook--the Compaq Armada M300. Read more

New Asus Transformer Prime comes complete with previous owner's personal info

Always wipe gadgets before returning them. Bill Detwiler shares a cautionary tale and steps for wiping iOS, Android, and Windows Phone 7 devices. Read more

VeriSign repeatedly hacked in 2010

Verisign was repeatedly attacked in 2010 but the extent of what was stolen is unknown, and the company didn't even own up to it until late 2011. Read more

10 things you have to know to be computer literate

Many of your users are coasting along without adequate computer knowledge. Help them close the gap by sharing this list of essential skills. Read more

The phabulous phablet: A new form factor arrives with the Galaxy Note

Deb Shinder spent some time with the Samsung Galaxy Note at CES 2012. Find out what thinks about this phablet. Read more

Will tablets pave the way for enterprise tabletop computing?

Patrick Gray believes that tabletop computing shares many features of tablet computing, but he doesn't think tabletop technology will impact the enterprise for quite some time. Read more


Featured multimedia

 

Cracking Open an ultrabook ancestor the Compaq Armada M300

TechRepublic members photos vie for CanvasPop gift cards

10 flawed products that are really bad

Cracking Open the Nokia Lumia 800

Cracking Open the Motorola Xyboard 10.1


Featured multimedia

 

NASA's big ideas for the future of flight (photos)

NASA looks to advanced design concepts to reduce noise and increase the fuel efficiency of future aircraft. View on site

Electric autos--from Edison to robots (images)

Take a tour of the past, present, and future of electric vehicles to see the multiple waves of electric cars in years past and a hint at future directions. View on site

Science and engineering visualization contest winners (images)

The National Science Foundation and the journal Science announce the 2011 winners of a contest to create the best visualizations in the fields of science and engineering. View on site


Featured Webcast

Live Webcast: 3 Simple Steps to Better Patch Security

For better patch security, you'll need to take some precautions and know how to react when the time comes. For help with that, check out this live webcast from TechRepublic.


Today's recommended downloads

Accelerating Innovation and Savings with R&D Cloud (Intel Corporation)

Inside Intel IT on Technology for Tomorrow's Cloud (Intel Corporation)

Securing Virtualized Web Apps (Intel Corporation)

Power and Cooling Capacity Management for Data Centers (APC by Schneider Electric)

The Future of Cloud Computing Planning Guide (Intel Corporation)


 

About this newsletter

I dissect the latest business tech products and analyze the internal components in order to help IT leaders make smart hardware purchasing and deployment decisions.

Bill Detwiler
Head Technology Editor

My Twitter feed: @billdetwiler

Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

Gallery: 10 flawed products that are really bad

Certain well-known software and hardware products simply aren't very good -- in fact some are barely usable, says Jack Wallen.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise

App Builder

10 Things





Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is ceasar@cesabarre.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

Live Rebuttal: An iPad for every child: Inevitable or impossible? | ZDNet's Great Debate Series

Trouble viewing this mail? Read it online | Manage my newsletters | Previous Edition
 
The Great Debate Series
ceasar | February 7, 2012
Home | News & Blogs | Videos | White Papers | Downloads | Reviews | Photo Galleries | Podcasts | RSS Feeds

Happening Now

 

Live Rebuttal
Great Debate: An iPad for every child: Inevitable or impossible?

Live On Air

Join us "Live on Air" from:
11am PT /2pm ET - 12pm PT /3pm ET

Debate Moderator: Jason Hiner

Matthew Miller   Christopher Dawson

An iPad for every child: Inevitable or impossible?

As we enter the rebuttal phase of this week's Great Debate, Moderator Jason Hiner challenges Matthew Miller and Christopher Dawson to support their respective arguments. Join live debate, cast your vote.
JOIN LIVE DEBATE | SHARE ON FACEBOOK


See also:

  The Opening Statements

 

Comments from the floor:

I'm for Inevitable
"Let parents decide what type of device (and let them buy through the school at whatever discount is agreed upon), and you may have something." -- andy.hefty@...

I'm for iPhone No
"Unless Apple (or Amazon) are going to provide iPad's or Kindle Fires at their own cost, this is stupid." -- neil.postlethwaite@...

 

(PLEASE NOTE: This newsletter is delivered three times weekly during the event - Monday, Tuesday and Thursday. We'll let you know once the opening statements and rebuttals begin, and then we'll follow up when the winner is announced. If you are no longer interested in receiving this newsletter, please click here to unsubscribe.)

Next Scheduled Debates

 

Cloud storage and backup: Too risky for your business?

February 13, 2012
10am ET / 7 am PT

Big data: Revolution or evolution?

February 27, 2012
10am ET / 7 am PT

Does Flash have a future?

March 13, 2012
10am ET / 7 am PT



Connect with ZDNet

 

Become a fan on Facebook

 

Follow us on Twitter

 

Watch us on YouTube

 

Send us your feedback here.

Sign up for more free newsletters from ZDNet! | To manage your account settings or to remove yourself from all ZDNet communications, please visit our Subscription Center.

The e-mail address for your subscription is ceasar@cesabarre.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Copyright CBS Interactive, Inc. All rights reserved.
ZDNet is a registered service mark of CBS Interactive, Inc.

ZDNet
235 Second Street
San Francisco, CA 94105
U.S.A.

[TechRepublic] Cyber-delinquency: Laws that turn kids into criminals

IT Security

TechRepublic Member | February 07, 2012

Juvenile cyber-delinquency: Laws that are turning kids into criminals

Deb Shinder considers the problem of juvenile delinquency when it concerns kids and computers. Do we need a better strategy for dealing with juvenile cybercrime? Take the opinion poll. Read more

Resource of the day

Boost Web Application Performance for a Better User Experience

Join this webcast with American Modern Insurance Group to discover the best strategies for improving the Web-user experience and learn how creating a Performance Center of Excellence can ensure optimal Web application performance.


Why are websites getting your mobile-phone number?

Are mobile-service providers leaking data into traffic destined for web servers? That's what a research analyst set out to prove. Read more

The three types of online attackers

Patrick Lambert describes the three main groups of attackers that security specialists are guarding against. Read more

Infographic: Kim Dotcom and the Megaupload story

While Megaupload's attorney tries to negotiate a deal with the government to preserve users' legitimate hosted files, check out this snapshot of Kim Dotcom fun facts and figures. Read more

VeriSign repeatedly hacked in 2010

Verisign was repeatedly attacked in 2010 but the extent of what was stolen is unknown, and the company didn't even own up to it until late 2011. Read more

Additional TechRepublic resources

 

Five pieces of scamware to watch out for

From fake antivirus apps to uninvited toolbars, scamware can bog down your users' PCs -- and sometimes do a whole lot worse. Read more

Use BrowserID for email address validation

If handling email address verification sounds like too much hard work, then BrowserID could be the registration solution that you are after. Read more

Featured multimedia

 

10 flawed products that are really bad

Certain well-known software and hardware products simply aren't very good — in fact some are barely usable, says Jack Wallen. View on site


Featured Webcast

Live Webcast: Fast and Efficient Business Security Strategies

Check out this webcast to learn more about fast and efficient business security strategies. You're in the midst of an arms race, make sure you win it.


Today's recommended downloads

Intel Cloud Technologies: Powering Tomorrow's Cloud (Intel Corporation)

Remote Monitoring and Management Made Simple, Scalable and Affordable (LabTech Software)

Meeting Intense Performance Demands in Cloud Environments (Intel Corporation)

Seven Steps for Building Security in the Cloud from the Ground Up (Intel Corporation)

Live Webcast: 3 Simple Steps to Better Patch Security (Sophos)


Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

10 things you have to know to be computer literate

Many of your users are coasting along without adequate computer knowledge. Help them close the gap by sharing this list of essential skills.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise

App Builder

10 Things




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is laoanganon@gmail.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

[TechRepublic] Cyber-delinquency: Laws that turn kids into criminals

IT Security

TechRepublic Member | February 07, 2012

Juvenile cyber-delinquency: Laws that are turning kids into criminals

Deb Shinder considers the problem of juvenile delinquency when it concerns kids and computers. Do we need a better strategy for dealing with juvenile cybercrime? Take the opinion poll. Read more

Resource of the day

Seven Steps for Building Security in the Cloud from the Ground Up

The cloud is awesome, but it isn't always secure. There's something you can do about it though. Take the seven steps for building security in the cloud. Which seven steps? The ones in this white paper.


Why are websites getting your mobile-phone number?

Are mobile-service providers leaking data into traffic destined for web servers? That's what a research analyst set out to prove. Read more

The three types of online attackers

Patrick Lambert describes the three main groups of attackers that security specialists are guarding against. Read more

Infographic: Kim Dotcom and the Megaupload story

While Megaupload's attorney tries to negotiate a deal with the government to preserve users' legitimate hosted files, check out this snapshot of Kim Dotcom fun facts and figures. Read more

VeriSign repeatedly hacked in 2010

Verisign was repeatedly attacked in 2010 but the extent of what was stolen is unknown, and the company didn't even own up to it until late 2011. Read more

Additional TechRepublic resources

 

Five pieces of scamware to watch out for

From fake antivirus apps to uninvited toolbars, scamware can bog down your users' PCs -- and sometimes do a whole lot worse. Read more

Use BrowserID for email address validation

If handling email address verification sounds like too much hard work, then BrowserID could be the registration solution that you are after. Read more

Featured multimedia

 

10 flawed products that are really bad

Certain well-known software and hardware products simply aren't very good — in fact some are barely usable, says Jack Wallen. View on site


Featured Webcast

Live Webcast: Fast and Efficient Business Security Strategies

Check out this webcast to learn more about fast and efficient business security strategies. You're in the midst of an arms race, make sure you win it.


Today's recommended downloads

Improved Cooling Strategies for IT Wiring Closets (APC by Schneider Electric)

Implementing and Expanding a Virtualized Environment (Intel Corporation)

The Benefits of Remote Monitoring and Management (LabTech Software)

Accelerating Innovation and Savings with R&D Cloud (Intel Corporation)

Securing the Cloud with Intel Trusted Execution Technology Usage Models (Intel Corporation)


Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

10 things you have to know to be computer literate

Many of your users are coasting along without adequate computer knowledge. Help them close the gap by sharing this list of essential skills.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise

App Builder

10 Things




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is techsubscriptionss@cesabarre.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.