Friday 23 September 2016

10 pieces of obsolete technology still in use today

Top tech stories now available. See what’s trending today.
Subscription | Read Online Twitter Facebook Google+

Gallery: 10 pieces of obsolete technology still in use today

New at TechRepublic

Video: A ride inside a fully-autonomous Ford Fusion

How to use advanced options in Windows 10 to access BIOS settings

Yahoo confirms 500M accounts leaked in massive data breach

IBM ups enterprise appeal of Swift with new Bluemix runtime

Report: The top 6 industries hit by ransomware

New Cisco and Salesforce alliance boosts IoT and collaboration efforts

Looking for a programming job in a big tech firm? Find one by playing games with Code Arcade

Why Oracle needs to follow Microsoft's lead in its cloud strategy

Three ways to make performance reviews less dreadful

National Software Reference Library: An important digital tool for forensic investigators

10 ways tech is improving cancer research

Take this AI/machine learning survey

Is there a use for artificial intelligence at your company? Tell us why or why not in this survey, and get a free copy of the research report.

Featured Webcast

Live Webcast: How to Protect Your Organization From Ransomware

Businesses of all sizes are hit by ransomware attacks every day. A recent ZDNet article shows that damages related to ransomware attacks will reach $1 billion this year. Don't miss "How to protect your organization from ransomware." Join CBS Interactive's Distinguished Lecturer David Gewirtz, one of America's leading cybersecurity experts, and security researcher and advocate Brook Chelmo, Sr. Product Marketing Manager at Dell SonicWALL, in a lively discussion about how to protect your IT ecosystem even if you're not a security expert.

Featured multimedia

Photos: Space Tango's autonomous lab at the International Space Station

Today's recommended downloads

Eco-mode: Benefits and Risks of Energy-saving Modes of UPS Operation

(APC by Schneider Electric)

On-Demand Webcast: Five ways the cloud can help you manage and secure enterprise mobility

(IBM)

Live Webcast: Office 365 business-driven provisioning deep dive

(OKTA)

The Total Economic Impact™ Of CA Technologies Workload Automation

(CA Technologies)

Beyond Advanced Threat Protection

(F5 Networks)

A special feature from ZDNet & TechRepublic

Cyberwar and the Future of Cybersecurity

Today's security threats have expanded in their scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly. And beyond that, cybersecurity will define many of the international conflicts of the future.


We want to hear from you. The TechRepublic product team wants your input on making our app better. Tell us your opinion, take our short survey.

Connect with TechRepublic

Visit the Subscription Center to get other free newsletters, manage your account settings or to be removed from TechRepublic communications.

The e-mail address for your subscription is habib2best@gmail.com.

Unsubscribe | Send Feedback | FAQ | Advertise | Privacy Policy

© 2016 CBS Interactive, Inc. All rights reserved.

TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic

235 Second Street

San Francisco, CA 94105

U.S.A.

No comments:

Post a Comment