From advanced authentication to new privacy controls, Windows 10 offers users solid security reasons to upgrade.
Believe it or not, a large number of businesses haven’t upgraded to Windows 10 yet. Here’s why they should.
Breaking through the hype around machine learning and artificial intelligence, our panel of Ken Mingis, Michael Simon and Serdar Yegulalp talk through the definitions and implications of the technology.
In this episode, Michael Feiertag, CEO and co-founder of tCell, joins host Steve Ragan to talk about why application security is more critical than ever and why it's just now getting more attention from security teams.
In this seventh episode of Do More with R, learn how to create maps in R—it’s easier than you think, thanks to new and updated packages like sf, tmap, and ggplot2
In today’s Linux tip, we’re going to look at pipes, which take the output of the command on the left side and pass it to the command on the right to use as input.
In today’s Linux tip, we’re going to look at the od command, which allows you to look at the content of files.
In the IT world, virtualization has revolutionized the way we think about data and where it lives, moving us closer to a completely on-demand data world.
Oracle joins other major tech vendors by rolling out its blockchain-as-a-service offering, and two smartphone makers plan to include the technology in new devices this year. Get the latest on the blockchain craze.
Business analyst help guide businesses in improving processes, products, services and software through data analysis. These agile workers straddle the line between IT and the business to help bridge the gap and improve efficiency.
Here are the top five languages for creating AI-enabled apps, according to InfoWorld contributor and deep learning architect Ian Pointer.
In this sixth episode of Do More with R, learn how to apply a function to a vector of values and return a data frame
In today’s Linux tip, we look at the find command – a tool that will prove very useful when you’re trying to locate a file or set of files based on almost any criteria.
In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.
BlackBerry's latest smartphone has a full-featured physical keyboard – no surprise there – and is aimed at users who want to really want to get work done, says reviewer Dan Rosenbaum.
Improved customer relations, increased employee productivity, new revenue streams — big benefits await those who breathe new life into their business intelligence strategies.
In this episode, host Maryfran Johnson talks with Douglas Blackwell, senior vice president and CIO at Horizon Blue Cross Blue Shield of New Jersey, about digital transformation in the healthcare industry, including voice enablement and cutting-edge d...
Geared toward continuous improvement, the agile methodology can greatly increase your project’s prospects for success. Here is everything you need to know about agile project management, from certification to training to software and more.
In today’s Linux tip, we’re going to look at top – a favorite tool for examining performance on a Linux system. Want to pinpoint why your Linux system is running slowly? Top can shed a lot of light on that.
The organizations that make Computerworld's annual list go far beyond competitive salaries and healthcare benefits to woo, and then retain, employees. Here's what they're doing right.
The offerings run deep at Computerworld's 2018 Best Places to Work in IT. Comprehensive health insurance is just table stakes.
Host Steve Ragan is joined on the RSA 2018 show floor by Bryson Bort, CEO and founder of SCYTHE, to talk about the ICS Village, where attendees can learn how to better defend industrial equipment through hands-on access to the equipment.
Frank Gens, IDC’s senior vice president and chief analyst, presents the analyst firm's annual outlook for the next several years in IT, including the top 10 worldwide IT industry predictions and how they will impact every enterprise’s ability to ...
In this fifth episode of Do More with R, Sharon Machlis, director of Editorial Data & Analytics at IDG Communications, shows how code snippets work in RStudio—and how you can make your own
Six Sigma streamlines quality control in an effort to improve current processes, products or services. Here are the methodologies, roles and certifications central to this quality management methodology.
Host Steve Ragan reports from the RSA 2018 conference, talking with Liv Rowley, an intelligence analyst at Flashpoint, about Spanish cybercrime, an underground community that poses persistent security risks.
In this fourth episode of Do More with R, Sharon Machlis, director of Editorial Data & Analytics at IDG Communications, shows how to create dashboards in the R language with the flexdashboard package.
In this episode, host Maryfran Johnson talks with James Rinaldi, CIO at NASA's Jet Propulsion Lab, about opening up data silos and driving data transformation; having a seat at the table to lead change; and using technology to explore the universe.
Apple on Monday unveiled a variety of software updates, tweaks and features for the upcoming iOS 12, macOS 'Mojave,' watchOS 5 and tvOS. Here's a look at what's coming, what we liked and what we didn't.
From data scientists to data security pros, the battle for the best in IT talent will wage on next year. Here’s what to look for when you’re hiring for the 7 most in-demand jobs for 2018 — and how much you should offer based on experience.
Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build a zero trust model, including consistently authenticating users.
In this episode of Do More with R, learn how to automate testing your R functions with Hadley Wickham’s testthat package.
With blockchain technology showing up in everything from global shipping to cloud storage and real estate transactions, it's no surprise that it's now seen as a way to help companies trade and sell carbon credits.
TSB customers in the U.K. were already frustrated by the bank's technical problems, but now the situation has gotten worse as criminals take advantage of the chaos. Host Steve Ragan looks at recent TSB phishing attacks and the kit that powers them.
The data scientist role varies depending on industry, but there are common skills, experience, education and training that will give you a leg up in starting your data science career.
Network virtualization pioneer Martin Casado explains the concept behind network virtualization, how the technology works and why it was created.
In this episode, host Maryfran Johnson talks with Cynthia Stoddard, SVP and CIO at Adobe. Their hour-long conversation covers a range of topics, including IT innovation and ROI, data strategy, automation, machine learning and AI, and the new IT ro...
Cutting back on your Android data use can make your phone bill plummet, and it's easy to do with a few key tweaks. Ready to start saving?
In this second episode of Do More with R, Sharon Machlis, director of Editorial Data & Analytics at IDG Communications, shows how dplyr's case_when() function helps avoid a lot of nested ifelse statements
Host Steve Ragan reports from the show floor at RSA 2018, where talks with Chris Roberts, chief security architect at Acalvio Technologies, about the benefits and misconceptions of deception technologies.
Brendan Eich, creator of the JavaScript programming language, explains how the language is used, and why it's still a favorite among programmers for its ease of use.
CSO's Michael Nadeau and Steve Ragan join Computerworld's Ken Mingis and IDG Communications' Mark Lewis to look at what the new EU privacy rules mean. They offer insights on how companies can prepare – and what happens if they don't.
Cryptocurrency such as Bitcoin has garnered most of the media coverage and hype to date, but keep your eye on blockchain – this new technology is poised to change IT in much the same way open-source software did a quarter century ago.
How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.
Reporting from RSA 2018, host Steve Ragan helps dispel the hype and confusion surrounding the dark web, as he talks with Alon Arvatz, co-founder at IntSights.
Host Steve Ragan reports from the show floor at RSA 2018, taking with Oliver Tavakoli, CTO at Vectra Networks, and author of the Thinking Security blog on CSOonline.com, about the types of IT security work that can be off-loaded to artificial intelli...
In this first episode of Do More with R, Sharon Machlis, director of Editorial Data & Analytics at IDG Communications, demonstrates how easy it is to use the R language to create an interactive scatter plot with multiple trendline choices
In this episode of CIO Leadership Live, host Maryfran Johnson talks with Jack Clare, CIO and chief strategy officer at Dunkin' Brands, about the company's mobile payment, ordering and loyalty apps, and how it's striving to improve customers' drive-th...
This year's RSA security conference focused on a variety of cybersecurity topics – everything from blockchain to the looming GDPR rules. CSO's Steve Ragan was there and offers insights on what he learned.
Host Steve Ragan reports from the RSA 2018 show floor, talking with Greg Reber, founder and CEO at AsTech Consulting, about the looming GDPR deadline and what IT security professionals should be getting done now.