Monday, 28 May 2012

[TechRepublic] Verify AWS files by using keys and signatures

The Enterprise Cloud

TechRepublic Member | May 28, 2012

How to perform security checks on AWS files using keys and signatures

Nick Hardiman walks you through the process of verifying AWS files by working with public keys provided by Amazon and using digital signatures. Read more

Resource of the day

The Impact of Disk Fragmentation on Servers

Discover the surprising difference defragmentation makes in key areas of server operation such as time to copy a file, open a document, backup and AV scan. Absolutely vital data for all IT staff.

Google Apps v. Office 365: Calendar features

Ian Hardenburgh continues his comparison charts of Google Apps and Office 365 apps and features with this detailed look at the Calendar offerings. Read more

Additional TechRepublic resources


Review: Wuala cloud storage

Wuala's mesh network and security model for file encryption definitely make it worth serious consideration. Read more

Three tools for better searching in Google Apps

There are at least three third-party add-on tools that provide better and faster searching for Google App users. Read more

Modernize group brainstorming with Google Apps

Use a shared Google spreadsheet to facilitate the success of your next brainstorming session. Read more

IT service skills: Why this gap needs urgent plugging

The jobs of IT service managers now extend well beyond their old fiefdoms of helpdesks and maintenance. But that shift has created an urgent need for relevant skills. Read more

On the road? My seven tips for keeping hackers at bay

Hackers aren't always miles away. They can be sitting next to you waiting for the chance to get into your device and onto your network. Read more

Featured multimedia


Five tools to tame your photo management chaos

If you're being buried in an avalanche of images, one of these tools may help you regain control. View on site

Today's recommended downloads

Optimizing Your Virtual Platform Without Messing it Up (Condusiv Technologies)

Optimizing Offsite Disaster Recovery with Virtual WAN Op, a Case Study (Silver Peak Systems, Inc.)

Five Calls To Make When Developing a Mobile Learning Strategy (SkillSoft)

Keeping Your SQL Server Databases Defragmented with Diskeeper (Condusiv Technologies)

Social Media Analytics: Making Customer Insights Actionable (IBM)

Connect with TechRepublic

TechRepublic  Facebook Fan Page

Follow  TechRepublic on Twitter

Wanted: A BBC Micro for the 21st century

Steve Ranger discusses why we need a modern-day successor to the classic eight-bit BBC Micro to inspire the next generation of programmers.

TechRepublic newsletters


Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

Tech Sanity Check

Google in the Enterprise

Cracking Open

10 Things

Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

235 Second Street
San Francisco, CA 94105

No comments:

Post a Comment