
The IT road is filled with pitfalls and unexpected curves. And for 20 years, ZDNet and TechRepublic have helped IT pros successfully navigate that roadway with 24/7 news coverage, analysis on tech trends, dialog among IT peers, and practical how-to advice. Today, we're expanding our industry-leading IT content by launching a new site, Tech Pro Research.
IT decision support for business leaders
Built on the foundation of TechRepublic Pro, Tech Pro Research has the high-quality content IT decision makers need to do their jobs better and more efficiently. As a member, you'll get full access to our extensive library of research, analysis, pre-made templates, and more.
- Original, in-depth research reports on global IT trends: We survey IT business decision makers around the world to learn what matters most. Download our Windows 8 Business Intentions report for an example of this type of insightful resource.
- Exclusive content from leading IT columnists: Get industry analysis, actionable advice, and expert opinion from seasoned tech journalists like Ed Bott, Mary Jo Foley, Larry Dignan, and Jason Hiner. You won't find this content anywhere else.
- Analyst briefings from industry experts: Who knows more about the problems facing IT than the real-world industry leaders? Find out what problems they’ve dealt with at top companies around the world and how they’ve fixed them.
- Time-saving policies, templates, and tools: Don’t waste time creating new forms. Use ours. Download our ready-made IT policies, templates, and tools and customize them to fit your needs of your business.
- Comprehensive ebooks: Get the best of TechRepublic and ZDNet compiled in one convenient package. Our comprehensive ebooks are full of info on the most relevant topics. Even better, they’re absolutely free with a Tech Pro Research membership.
No third-party advertising on the site
We don’t want anything to distract you from finding the content you need as quickly as possible. So Tech Pro Research has no display ads. Just simple, clean features that make it easy to access the resources you need.To further simplify your search, our content is organized by topic and by what we call the IT buying cycle – those stages you work through when you're looking for game-changing technologies, tweaking old solutions, or preparing to replace obsolete equipment.We've broken down the buying cycle into five stages:
- Discover
- Investigate
- Compare
- Justify
- Optimize
Tech Pro Research is just getting started
Tech Pro Research gives you indispensable tools to solve today’s toughest IT problems and make informed decisions. We distill complex tech topics into concise, yet comprehensive packages. Our ready-made policies, templates, and tools will save you valuable time and effort. And we're just getting started. In the coming months we'll be launching even more exciting features, such as members-only forums.
I encourage you to explore the site. Once you see all we have to offer, you'll be hooked. And if you have feedback about the site, don't hesitate to contact me directly.
Bill Detwiler
Managing Editor, Tech Pro Research
More From Tech Pro Research
-
Tools & Templates
Disaster recovery and business continuity plan
Natural and man-made disasters can jeopardize the operations and future of any company, so it’s critical to develop a plan to help ensure ongoing business processes in a crisis. This download explains...
-
Tools & Templates
Software automation policy guidelines
Software automation is used for many business and IT processes, depending on industry vertical and individual company business and IT needs. Because this automation is far-reaching, policy considerati...
-
eBooks
IT leader’s guide to the rise of smart cities, volume 3
Powerful trends are pushing the global community to develop more smart cities and invest in connected technologies, as the world population increases and more people move to urban environments. This e...
-
Tools & Templates
Comparison chart: VPN service providers
Selecting the right VPN provider for your needs requires a fair bit of legwork because the choices are many and the offerings vary greatly. This quick-glance chart rounds up 15 of the top contenders a...
-
Research
Cybersecurity strategy research: Common tactics, issues with implementation, and effectiveness
It’s one thing for a company to create a cybersecurity strategy, but it’s another thing entirely to put strategy into practice. In February 2018, Tech Pro Research surveyed 236 professionals, aiming t...
-
Tools & Templates
Password management policy
Password-driven security may not be the perfect solution, but the alternatives haven’t gained much traction. This policy defines best practices that will make password protection as strong and managea...
-
Tools & Templates
Information security policy
To protect your information assets, you need to define acceptable and unacceptable use of systems and identify responsibilities for employees, IT staff, and supervisors/managers. This policy offers a ...
-
eBooks
Microsoft SharePoint: A guide for business professionals
Employee collaboration is increasingly critical for business success, and SharePoint is one of the tools that makes it possible. This ebook offers an overview of SharePoint's features, common use case...
-
Tools & Templates
IT physical security policy
This policy will help your organization safeguard its hardware, software, and data from exposure to persons (internal or external) who could intentionally or inadvertently harm your business and/or da...
-
eBooks
IT leader’s guide to cyberattack recovery
Cybersecurity prevention efforts shouldn’t overshadow your ability to respond and recover in the event of an attack. This ebook offers advice from security experts on how to recover from a cyberattack...
-
eBooks
Securing Home Networks
When you set up your own home network, you don't have the benefit of an IT staff that's dedicated to safeguarding your data and systems--it's up to you to protect against internal and external threats...
-
eBooks
Quick Guide: Securing Windows Server 2003
Although the default installation of Windows Server 2003 is more secure than with previous versions, IT pros still need to take a careful look at additional measures they should take to protect their ...
-
eBooks
Outlook Tips for Road Warriors
Working efficiently with Microsoft Outlook is a real challenge for users who are traveling or working off-site. This guide describes a dozen ways that mobile users can maximize productivity when using...
-
eBooks
Battling Spyware in the Enterprise
Letting spyware go unchecked on a computer not only negatively affects performance, it can also compromise your sensitive data. Learn how spyware looks and acts, which anti-spyware tools are effective...
-
Tools & Templates
TechRepublic's Change Order Form
You can use this document template as a standard form for requesting and tracking IT changes in your organization. With this form, you can keep IT staff informed of needed changes and ensure that a st...
-
Tools & Templates
Automated Trouble Ticket Tool
Manage help desk calls easily with this VBA-driven Excel workbook. It offers forms for opening and updating tickets, printable statements for record keeping, and a report feature. This version fixes a...
-
Tools & Templates
Vendor reference questionnaire: Supply chain management
If you are researching a Supply Chain Management (SCM) solution, you need to keep careful notes and do a thorough comparison of vendors. Use this Excel tool to help you ask the right questions and com...
-
Tools & Templates
Vendor selection checklist: Supply chain management
Use this tool to assist you in your search for the best Supply Chain Management solution. Weighting selection criteria to best fit your organization will quickly identify the vendor most likely to mee...
-
Tools & Templates
Vendor Selection Checklist: E-commerce
Trying to decide which e-commerce solution works best foryou? Try TechRepublic's Vendor Selection Checklist:E-commerce--put down which features matter most to you, and our tool can help you identify t...
-
eBooks
Administrator's Guide to Windows Server 2003 - Security Chapter
Download the entire Security chapter from Administrator's Guide to Windows Server 2003 and gain valuable insights on best practices for securing Windows Server 2003. The chapter provides proven tips f...
-
eBooks
Securing Home Networks
When you set up your own home network, you don't have the benefit of an IT staff that's dedicated to safeguarding your data and systems--it's up to you to protect against internal and external threats...
-
eBooks
Quick Guide: Securing Windows Server 2003
Although the default installation of Windows Server 2003 is more secure than with previous versions, IT pros still need to take a careful look at additional measures they should take to protect their ...
-
eBooks
Outlook Tips for Road Warriors
Working efficiently with Microsoft Outlook is a real challenge for users who are traveling or working off-site. This guide describes a dozen ways that mobile users can maximize productivity when using...
-
eBooks
Battling Spyware in the Enterprise
Letting spyware go unchecked on a computer not only negatively affects performance, it can also compromise your sensitive data. Learn how spyware looks and acts, which anti-spyware tools are effective...
-
Tools & Templates
TechRepublic's Change Order Form
You can use this document template as a standard form for requesting and tracking IT changes in your organization. With this form, you can keep IT staff informed of needed changes and ensure that a st...
-
Tools & Templates
Automated Trouble Ticket Tool
Manage help desk calls easily with this VBA-driven Excel workbook. It offers forms for opening and updating tickets, printable statements for record keeping, and a report feature. This version fixes a...
-
Tools & Templates
Vendor reference questionnaire: Supply chain management
If you are researching a Supply Chain Management (SCM) solution, you need to keep careful notes and do a thorough comparison of vendors. Use this Excel tool to help you ask the right questions and com...
-
Tools & Templates
Vendor selection checklist: Supply chain management
Use this tool to assist you in your search for the best Supply Chain Management solution. Weighting selection criteria to best fit your organization will quickly identify the vendor most likely to mee...
-
Tools & Templates
Vendor Selection Checklist: E-commerce
Trying to decide which e-commerce solution works best foryou? Try TechRepublic's Vendor Selection Checklist:E-commerce--put down which features matter most to you, and our tool can help you identify t...
-
eBooks
Administrator's Guide to Windows Server 2003 - Security Chapter
Download the entire Security chapter from Administrator's Guide to Windows Server 2003 and gain valuable insights on best practices for securing Windows Server 2003. The chapter provides proven tips f...