Best viewed in Firefox and Flock browsers
Three Ways to Get FREE Technical Support here.
1. Search for existing articles ans solutions using the search box.
2. Email your questions to FreeHelp@cesabarre.com
3. Post your questions right here for everyone to see and help you.

Your TechRepublic newsletter selections

Dear TechRepublic member,

You have been unsubscribed from the following newsletters:

---Five Apps

If you would like to make any other changes to your TechRepublic newsletter
selections, please visit:
http://www.techrepublic.com/newsletters

For answers to frequently asked questions or to contact our member support staff, please visit this page:
http://www.techrepublic.com/faq/general

Best Regards,

Jason Hiner
Editor in Chief, TechRepublic

Apple sets date for iPad event - iPad 3?

Trouble viewing this mail? Read it online | Manage my newsletters | Previous Edition
 
ZDNet Must-Read News Alert
ZDNet Member | February 28, 2012
Home | News & Blogs | Videos | White Papers | Downloads | Reviews | Photo Galleries | Podcasts | RSS Feeds

Breaking News

 

Apple announces iPad event, March 7

Apple has said it will hold an event on March 7th -- a little over a week from now -- to announce the next-generation iPad tablet.

READ FULL STORY | SHARE ON FACEBOOK

More coverage:

Has Apple just confirmed the iPad 3 'retina display' screen?

Must-Read Stories

 

Microsoft: We're not involved in an antitrust complaint over Google+

Facebook claims you're playing games you aren't playing

Google bets million bucks its Chrome Web browser can't be busted

Dell picks up server share as IBM is No. 1, says Gartner

University .xxx domains: The aftermath


Recommended

High Availability for Small IT Operations

Check out this white paper to learn how small and midsized companies can use virtualization to help give larger companies a run for their money. With high availability, consolidation, and better backups, this tech is worth checking out.

Connect with ZDNet

 

Become a fan on Facebook

Follow us on Twitter

Watch us on YouTube


 

Send us your feedback here.

Sign up for more free newsletters from ZDNet! | To manage your account settings or to remove yourself from all ZDNet communications, please visit our Subscription Center.

The e-mail address for your subscription is troublemakershooter@gmail.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Copyright CBS Interactive, Inc. All rights reserved.
ZDNet is a registered service mark of CBS Interactive, Inc.

ZDNet
235 Second Street
San Francisco, CA 94105
U.S.A.

The Featured Five

The Five Most Popular IT Resources Right Now


IT Whitepapers 

IT Whitepapers

Virtualization: Benefits, Challenges, and Solutions
The majority of IT organizations have already implemented some server virtualization, and most intend to implement more over the next year. But moving to a virtual environment can raise significant challenges, including achieving an acceptable user experience for client-to-server connections over the WAN. Optimizing application delivery, on the other hand, can smooth the virtualization transition.

What You Need to Know About Social Media as the Ultimate Communication Channel
There's no question. Social media is a valued communication channel for business. Yet many businesses still have questions about how to implement social media initiatives and where the contact center fits in. This paper offers some proven guidelines for managing a social media strategy, and making social media the ultimate communication channel for your business.

Orchestrating your Disaster Recovery
Chances are that you are dissatisfied with your current backup solution, as half of those surveyed by NetApp have stated. You probably have a pile of tapes or disks that you faithfully copied your files onto using a traditional backup software utility. But when disaster strikes and an entire server goes south, getting a working server online quickly and without a lot of running around isn't going to happen.

Enterprise Strategy Group: The Next Wave of Data Deduplication
Leveraging deduplication in backup environments yields significant advantages.  The cost savings in reducing disk capacity requirements change the economics of disk-based backup. For some organizations, it allows disk-based backup - and recovery - to be extended to additional workloads in the environment. For others, deduplication makes it possible to introduce disk-based backup where it may not have been feasible before.

5 Ways Secure Managed File Transfer Can Improve Your Business

Companies running SAP get the importance of middleware in connecting applications - but many don't realize that the data in those applications is often insecure. Managed File Transfer provides complete management of file transfers. It ensures that data exchanges within your company and with trading partners are secure from transmission to delivery. Read the white paper to learn five key ways MFT makes a difference for your business.


Forward this to a Friend >>
IT Whitepapers  
For daily updates follow ITwhitepapers on Twitter

SUBSCRIPTION SERVICES
You are currently subscribed as ceasar@cesabarre.com. If you do not wish to receive future mailings from IT Whitepapers Online Resources, need to change your email or other preference, please visit:
visit us here.

View IT Whitepapers's online
privacy policy.

Copyright 2012 | IT Whitepapers | 492 Old Connecticut Path | Framingham MA 01701 |
 
 

[TechRepublic] Online dating services: Risking more than a broken heart

IT Security

TechRepublic Member | February 28, 2012

Online dating services: Risking more than a broken heart

People looking for companionship are trusting online services more than ever. Is that trust misplaced? Michael Kassner looks for the privacy and security gaps in online dating. Read more

Resource of the day

Rethink Your Storage With IBM

Data storage is an interesting thing. While it's easy to add more storage with band-aid solutions, before long, you'll need to seriously rethink how you store. For some advice, turn to this white paper.


What to do when your security is breached by someone with a badge

Patrick Lambert looks at some high-profile cases of defendants being forced to give up passwords and encryption keys. What are your options when it happens to you outside of a court of law? Read more

Infographic: Social media privacy

This infographic illustrates the general feelings that users have about their online privacy expectations in regards to participating in social media. Read more

How much has cyber-spying changed since 1989? Not as much as you'd think

Bob Eisenhardt looks back at Clifford Stoll's classic cyber-spying true story from 1989 and poses the question, how much has really changed in the world of cyber-espionage? Not that much, as it... Read more

Additional TechRepublic resources

 

Personal data encryption, IT and the Fifth Amendment

Last week, a federal court for the first time ruled that the Fifth Amendment of the U.S. Constitution -- the right to not self-incriminate -- protects against "forced decryption." Read more

Five apps to wipe data from your Android phone

If your phone gets lost or stolen -- or if you decide to return or recycle it -- you need to wipe it clean of your private data. Read more

Featured multimedia

 

What's puffing the sails in Avast 2012?

Avast's security update for 2012 includes a refreshed look, hybrid update tech, a new file reputation service, and a new Web management console. Take a slideshow tour of its new features, matey. View on site


Featured Webcast

Live Webcast: Build a Winning Business Case for a New Web Content Management Technology

If your system for managing your web content is looking stale, now is the time to update it. Check out this webcast to learn more about updating your web content management system and what it can do for you.


Today's recommended downloads

Have You Supersized Your Data Center? Avoid the Pitfalls of Oversizing (APC by Schneider Electric)

Rethink Your Storage With IBM (IBM)

Preventing Data Corruption in the Event of an Extended Power Outage (APC by Schneider Electric)

Live Webcast: Fast and Efficient Business Security Strategies (GFI Software)

Implementing energy-efficient data centers (APC by Schneider Electric)


Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

Gallery: The beautiful 3D behind America's great engineering feats

The Historic American Engineering Record contains gorgeous 3D documentation of big projects like the Space Shuttle Discovery, some of the country's great bridges, and more.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic UK

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is techsubscriptionss@cesabarre.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

[TechRepublic] Online dating services: Risking more than a broken heart

IT Security

TechRepublic Member | February 28, 2012

Online dating services: Risking more than a broken heart

People looking for companionship are trusting online services more than ever. Is that trust misplaced? Michael Kassner looks for the privacy and security gaps in online dating. Read more

Resource of the day

Enterprise Resource Planning Made Easy

Take a look at this white paper to learn more about an ERP solution from IBM and Microsoft that can take the hassle out of ERP and make you more competitive.


What to do when your security is breached by someone with a badge

Patrick Lambert looks at some high-profile cases of defendants being forced to give up passwords and encryption keys. What are your options when it happens to you outside of a court of law? Read more

Infographic: Social media privacy

This infographic illustrates the general feelings that users have about their online privacy expectations in regards to participating in social media. Read more

How much has cyber-spying changed since 1989? Not as much as you'd think

Bob Eisenhardt looks back at Clifford Stoll's classic cyber-spying true story from 1989 and poses the question, how much has really changed in the world of cyber-espionage? Not that much, as it... Read more

Additional TechRepublic resources

 

Personal data encryption, IT and the Fifth Amendment

Last week, a federal court for the first time ruled that the Fifth Amendment of the U.S. Constitution -- the right to not self-incriminate -- protects against "forced decryption." Read more

Five apps to wipe data from your Android phone

If your phone gets lost or stolen -- or if you decide to return or recycle it -- you need to wipe it clean of your private data. Read more

Featured multimedia

 

What's puffing the sails in Avast 2012?

Avast's security update for 2012 includes a refreshed look, hybrid update tech, a new file reputation service, and a new Web management console. Take a slideshow tour of its new features, matey. View on site


Featured Webcast

Live Webcast: IT Consumerization and Google Apps

You wish your employees would stick to the desktops and devices they were given, but they prefer their own hardware. If you're looking for some middle ground, you may be able to find it in Google Apps.


Today's recommended downloads

Live Webcast: Top Considerations for Effective Managed Security for 2012 and Beyond (AT&T)

Taking a Proactive Approach to Patch Management (VMware)

Enterprise Resource Planning Made Easy (IBM)

Implementing energy-efficient data centers (APC by Schneider Electric)

Determining TCO for data center infrastructure (APC by Schneider Electric)


Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

Gallery: The beautiful 3D behind America's great engineering feats

The Historic American Engineering Record contains gorgeous 3D documentation of big projects like the Space Shuttle Discovery, some of the country's great bridges, and more.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic UK

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is ceasar@cesabarre.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

[TechRepublic] Cracking Open the iPad 3 processor mystery: Dual-core A5X or quad-core A6

Cracking Open

TechRepublic Member | February 28, 2012

Cracking Open the iPad 3 processor mystery: Dual-core A5X or quad-core A6

Does an online photo show the Apple iPad 3 with a dual-core A5X processor, instead of a quad-core A6 chip? Bill Detwiler considers the evidence. Read more

Resource of the day

Rethink Your Storage With IBM

Data storage is an interesting thing. While it's easy to add more storage with band-aid solutions, before long, you'll need to seriously rethink how you store. For some advice, turn to this white paper.


Additional TechRepublic resources

 

Droid Razr Maxx Teardown: Impressive battery life in a sleek package

Offering 20 hours of talk time, Motorola's Droid Razr Maxx may be the answer for those who fear smartphones with non-removable batteries. Read more

Zenbook teardown: Blatant copy of MacBook Air

The Zenbook is a solid, Windows alternative to the MacBook Air. But, it's also a near mirror image of Apple's ultra-thin laptop, both inside and out. Read more

10 signs that you aren't cut out for IT

IT pros often complain about the downsides of their jobs. But what if you really AREN'T meant for an IT career? Read more

Get a Siri-like interface on Android with Vlingo Virtual Assistant

Vlingo Virtual Assistant is Android's answer to Siri envy. Jack Wallen explains how to get the most out of Vlingo. Read more

Determine the need for mobility and portable computing

How important is portable computing for the majority of office workers? Patrick Gray explains why this is an important question for organizations to answer when considering tablets. Read more


Featured multimedia

 

Fantastic folding laptop designs

Wicked Faire 2012 steampunk fashion show

Cracking Open the Motorola Droid Razr Maxx

Five apps for securely wiping your Android phone

Five Windows Server backup tools you can count on


Featured multimedia

 

Barcelona prepares for Mobile World Congress (photos)

CNET is back in Barcelona for another Mobile World Congress. The show doesn't open until Monday, but preparations are in full swing at the exhibition center and across town. View on site

Creating art with old CDs (photos)

CDs might not be worth much to you anymore, but for Australian artist Sean Avery, they are a treasure. Find out why here. View on site

Hands-on with the Dell XPS 13

A detailed look at Dell's first ultrabook. View on site


Featured Webcast

Live Webcast: IT Consumerization and Google Apps

You wish your employees would stick to the desktops and devices they were given, but they prefer their own hardware. If you're looking for some middle ground, you may be able to find it in Google Apps.


Today's recommended downloads

Build a Business Case for Open Source Drupal (Acquia)

Taking a Proactive Approach to Patch Management (VMware)

Live Webcast: Top Considerations for Effective Managed Security for 2012 and Beyond (AT&T)

Determining TCO for data center infrastructure (APC by Schneider Electric)

eBook "Real-World Virtualization for Your Business" (VMware)


 

About this newsletter

I dissect the latest business tech products and analyze the internal components in order to help IT leaders make smart hardware purchasing and deployment decisions.

Bill Detwiler
Head Technology Editor

My Twitter feed: @billdetwiler

Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

Gallery: The beautiful 3D behind America's great engineering feats

The Historic American Engineering Record contains gorgeous 3D documentation of big projects like the Space Shuttle Discovery, some of the country's great bridges, and more.



TechRepublic newsletters

 

Get technical tips and tutorials, IT industry analysis, geeky discussions, and more in the following TechRepublic newsletters. Automatically sign up today!

Smartphones

Tablets in the Enterprise

Geekend

TechRepublic UK





Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is ceasar@cesabarre.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.