Monday, August 6, 2007

[TechRepublic] Downloads Weekly Roundup --- August 6, 2007

TechRepublic Downloads Weekly Update
Home | Downloads | Discussions | Tech Q&A | White Papers | Blogs | Newsletters


The advantages of identity-based encryption

This Proofpoint white paper discusses the advantages of identity-based encryption (IBE) over traditional approaches to public key cryptography, and explains why e-mail encryption should be an integral component of your security architecture.


Windows expert Deb Shinder tweaks Windows Vista performance

Vista10 things you can do to increase performance in Vista
Windows Vista has some great new security and functionality features, as well as a host of graphical tricks. But all this comes with overhead that may lead to a performance hit on anything less than a top-of-the-line supercomputer. If you find Vista's performance lagging, take heart. Windows expert Deb Shinder has put together this list of steps you can take to make it run faster.

 Subscribe to TechRepublic's Downloads RSS Feed
 Click this link to sign up for a weekly list of new, free to download, book chapters.

This week in downloads

hdiHow do I... Populate an Access list control with the results of a dynamic search?
This tutorial and sample Access database will guide you through the process of setting up fixed queries to populate a list control with the query results. Using a list control provides events that subforms don't and they're easier to reference in code.

SharePoint Server 2007 content types enable enhanced document management
Microsoft Office SharePoint Server 2007 introduces content types, which allow you to create any type of document you want within the same document library. Here's a look at how you can use content types at both the site and document library level to gain granular control over how your documents are processed and managed.

hdiHow do I... Install, configure, and use Microsoft's iSCSI initiator?
No longer is shared storage a niche enjoyed by only large, wealthy corporations. Internet SCSI is leveling the playing field by making shared storage available at a reasonable cost to anyone. By leveraging the ubiquitous Ethernet networks prevalent in most organizations, IT staff training costs for iSCSI are very low and result in quick, seamless deployments. In this How do I... Scott Lowe shows you how to install and configure Microsoft's iSCSI initiator.

Apply the D.I.C.E. framework to determine your best anti-spam solution
There are countless products available promising to help you with the spam, but which of them is right for you? To help you make this important decision, TechRepublic suggests using what we have dubbed the D.I.C.E. (Difficulty, Investment, Capability, and Expandability) framework. We will walk through each of these points so you will be able to apply them to your situation, and then we will help you pick the solution that is right for you.

Must-see Photo Galleries

The sun is losing its spots
Plug in those surge protectors -- it's flaring!

A first look at the Ion iTTUSB turntable
Convert your old vinyl to digital format.

Albuquerque's PC roots
No wrong turns in the history of the PC.

1010 things you can do to increase performance in Vista
Windows Vista has some great new security and functionality features, as well as a host of graphical tricks. But all this comes with overhead that may lead to a performance hit on anything less than a top-of-the-line supercomputer. If you find Vista's performance lagging, take heart. Windows expert Deb Shinder has put together this list of steps you can take to make it run faster.

E-mail security has been around forever -- you just need to turn it on
Any individual or mail administrator who wants secure e-mail can make it happen. The technology is already baked in and it often costs little or nothing to set it up. As George Ou explains, you just have to be willing to turn it on.

The architecture of a flexible .NET file processing system -- Part 3
In the Part 1 of this series Zach Smith described the overall architecture of a dynamic and scalable file import system. In Part 2 of the series, he got into the details of designing a highly flexible and scalable file processing system using .NET framework technologies and showed you how the file listener components are implemented. In this download (Part 3) he continues to the next portion of the system and explains how files are routed through the system via the router component.

The 10 most dangerous species of IT manager
From the wilds of the IT jungles, TechRepublic columnist Jeff Dray takes an offbeat look at the 10 most dangerous species of IT manager. Find out if your manager (or you) fit into the species he describes.

hdiHow do I... Change access permissions for all folders and files in Vista?
In a previous How do I... download, TechRepublic published the steps one would take to change permissions on a single file in the Microsoft Windows Vista operating system. TechRepublic member rignatius@... asked in the ensuing discussion thread if we could enlighten him on how to apply the permission changes to all of the sub-folders and files in the hierarchy of particular folder. The basic procedure is the same but there are a few more check boxes to look at during the process. But once those checks are inserted or removed, depending on preferences, the permission changes will be propagated to all of the files and folders below the folder being acted upon.


Featured book chapter for the week

Why are your information systems not as smart as they should be?
To understand why after years of spending on information technology so many of our systems still aren't as smart as they should be, we need to take a tour through the evolution of business computing in practice. In this chapter download from Smart Enough Systems: How to Deliver Competitive Advantage by Automating Hidden Decisions, walk through a brief history of a typical IT infrastructure and gain key insights into how we ended up in this mess.

Click this link to sign up for a weekly list of new, free to download, book chapters.


Featured software for the week

iODBC Driver Manager
iODBC is the acronym for Independent Open DataBase Connectivity, an Open Source platform independent implementation of both the ODBC and X/Open specifications. It is rapidly emerging as the industry standard for developing solutions that are language, platform and database independent.


Perennial favorites


TechRepublic Today

TechRepublic's Servers NetNote
This newsletter provides valuable insight into deploying, planning, and purchasing hardware for your data centers and server room. Click the "Sign Me Up" button to automatically subscribe.

About this newsletter You are receiving this newsletter at ngductien1.ndma@blogger.com as part of your TechRepublic membership.

Please add newsletters@techrepublic.online.com to your address book to ensure delivery of this newsletter.
Manage my Account Unsubscribe | Change my e-mail address | View my newsletters   Check out our Newsletter RSS feeds
Send Feedback Customer Service

If this newsletter was forwarded to you and you want to receive your own copy, please visit TechRepublic to sign up for a complimentary membership.
How to Advertise | Submit a Paper | FAQ | Privacy Policy

Copyright © 2007 CNET Networks, Inc. All rights reserved. TechRepublic is a registered trademark of CNET Networks, Inc.
CNET Networks, Inc.
235 Second Street
San Francisco, CA 94105
U.S.A.