Top Tech Conferences & Events to Add to Your Calendar in 2023
Looking for a list of the top tech conferences and events in 2023? Explore our guide to find out which events you should add to your calendar.
TechRepublic's Resource Library is the place to get free tech downloads in a variety of formats, including PDF versions of popular articles, "10 things" lists, sample chapters from technology books, "How do I..." problem-solving guides, cheat sheets for knocking out IT tasks, keyboard shortcuts, glossaries, career pointers and collections of tips and techniques that focus on critical topics.
Looking for a list of the top tech conferences and events in 2023? Explore our guide to find out which events you should add to your calendar.
In the information economy, sorting through internal discussions in an organization can be a laborious task, particularly when discussions are conducted through long chains of emails. The goal of the cloud-based team collaboration tool Slack is to simplify internal communication in order to increase efficiency. This guide to Slack is both an easily digestible introduction ...
Today, many businesses rely on outside companies, known as third-party organizations, to handle their data or services. Some examples might include vendors, marketing firms, recruiting organizations and other external entities. The purpose of this policy from TechRepublic Premium is to provide guidelines for establishing qualified third-party vendors with which to do business and what requirements ...
Welcoming a new employee to the office often requires the installation of a new computer workstation. This TechRepublic Premium guide, and the accompanying checklist, will help you successfully complete the task of creating a new workstation for your business enterprise. From the guide: SOFTWARE After assuring functioning hardware and network connections are installed, the next ...
The importance of quality technical documentation cannot be overstated. Whether using this documentation to educate and inform internal employees, external customers, seasoned technological professionals, technology-averse end users, millennials, the senior population or any kind of target audience, it can make or break your organization. The purpose of this policy from TechRepublic Premium is to provide ...
Maintaining electronic communications in business involves walking a fine line. Employees want relevant information to be kept available for future reference so that they can do their jobs, but keeping these items long-term can pose security and resource risks. The purpose of this policy from TechRepublic Premium is to establish requirements for the retention and ...
This policy from TechRepublic Premium sets forth guidelines for the use of the internet, as well as internet-powered communication services, including email, proprietary group messaging services (e.g., Slack) and social networking services in business contexts. It also covers Internet of Things use and bring-your-own-device practices. From the policy: SAFE BROWSING • Use a modern, supported ...
Developing software in a modern business enterprise requires cooperation, collaboration and coordination. Long gone are the days when a single mythical coder can single-handedly develop software applications sophisticated and flexible enough for modern business needs. This hiring kit from TechRepublic Premium provides a workable framework you can use to find the best candidate for your ...
Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company. The purpose of this policy ...
With the growing importance of big data for businesses, the need for database programs that are adaptable and scalable has become a priority. Enter MongoDB, an open-source database program that can accommodate a variety of programming languages. This hiring kit from TechRepublic Premium provides a framework you can use to successfully find the best candidate ...
Your computer network is under constant attack. The hard reality is that one of those cyberattacks will succeed, and you had better be prepared. This quick glossary from TechRepublic Premium explains the terminology used by security experts as they attempt to reduce the damage caused by a successful attack. From the glossary: EVIDENCE COLLECTION POLICY ...
Knowing and thoroughly understanding the terminology associated with the metaverse will be vital to business decision makers as they assess whether a metaverse strategy will best serve their business needs and, if it does, how and when they will deploy it. This quick glossary from TechRepublic Premium provides a practical foundation for employees, managers and ...
This checklist is designed to help you ensure that new employees have been trained on all the systems, software and devices they’ll be working with. You can tweak the entries in the various sections to match your needs. Where TechRepublic Premium offers a sample corporate policy, we’ve included a link to the download. Previously priced ...
This hiring kit from TechRepublic Premium contains a job description, sample interview questions and a basic want ad to help you find the best candidates for a virtual reality designer position. From the hiring kit: INTRODUCTION While the concept of virtual and augmented reality applications has been around for decades, the technological ability to render ...
Developing and implementing both preventive security protocols and effective response plans is complicated and requires a security architect with a clear vision. This hiring kit from TechRepublic Premium provides a workable framework you can use to find the best candidate for your organization. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY TRAITS AND SKILLSETS Depending ...
It’s essential that cybersecurity professionals understand the risks associated with brute force attacks. Read this guide from TechRepublic Premium to find out what you need to know about this classic form of cybersecurity attack, how safe you may (or may not) be and how to defend your systems against brute force attacks. From the guide: ...