Not getting any bites on your resume? You might be making one or more of these eight common resume mistakes.
From multi-cloud strategies to cost containment and container orchestration, CIOs are getting more pragmatic and prudent when taking advantage of the cloud’s economies of scale.
The all-screen design of Apple's iPhone X necessitated a 'notch' at the top of the display for various cameras and sensors. Now, Android phone makers are going with the same design. But why?
In this Q&A, host Maryfran Johnson talks one-on-one with Sanjay Shringarpure, CIO at E.& J. Gallo Winery, about the changing landscape of IT and innovation technologies in the agriculture industry, the challenges of recruiting talent, and more.
What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, director of Security Solutions and security evangelist a...
Firewalls have become ubiquitous across the enterprise IT landscape because of their proven ability to stop bad traffic from entering corporate networks and protect a company’s most valuable assets. So how have firewalls evolved over the years and ...
Google's Android Oreo release is full of fresh flavor for your phone. But some of its most useful touches are all too easy to overlook. Whether you've had Oreo for months or are just now getting a taste, it's time to learn something new about what yo...
With the right set of apps, you can turn your Android phone into a collaboration hub — and then stay connected and productive -- wherever you might be.
Android's practically overflowing with options, and it's easy to lose track of some useful features along the way. Here are a few handy but hidden capabilities you probably forget to use.
In today’s Linux tip, we’re going to look at the mtr command and see what it can tell us about network connections. Mtr stands for “my traceroute” and displays the route that a connection to a particular system takes by providing a continuous...
In today’s tip, I’m going to show you how to terminate processes on Linux systems using kill, pkill and killall and show you why it makes a difference which command you choose.
In today’s Linux tip, we’re going to look at the adduser and deluser commands. As the names suggest, they are used to add and delete user accounts on Linux systems.
Google's Android OS sometimes gets unfairly maligned as being weak on security. Computerworld blogger JR Raphael explains why that's a misconception and how users can keep their devices safe.
Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.
In this 60-second video, learn how the cloud-native approach is changing the way enterprises structure their technologies, from Craig McLuckie, founder and CEO of Heptio, and one of the inventors of open-source system Kubernetes
In today’s 2-minute tip, we’re going to look at the alias command – a tool that can save you a lot of time and trouble and maybe even a few brain cells.
Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Adrian Sanabria, director of research at Savage Security, about de-emphasizing network penetration tests to put more focus on attack simulations and helping companies improv...
In this explainer video, learn several techniques that can improve your Node development experience.
Now considered essential to driving profits, digital transformations are shifting from platform-first strategies to initiatives that leverage emerging technologies in service of clear customer and operational goals.
Maryfran Johnson talks with Klara Jelinkova, Rice University’s CIO, on a range of topics, including the responsibility of senior women in IT to mentor the next generation and how the university's GDPR project was an opportunity to talk with busines...
In today's 2-minute Linux Tip, we look at the bash history command – a tool that shows you commands you've recently used and allows you to use them again without having to retype them.
In today’s 2-minute Linux Tip, we’re going to look at a command that you might never have heard of. It’s called logsave, and it allows you to selectively add command output to a file.
In today’s 2-minute tip, we’re going to look at the ping command – a favorite tool for some very easy troubleshooting.
Today’s 2-minute tip covers crontab – the tool used to schedule tasks that will run automatically on the day and time that you specify.
In this 90-second video, learn about Kubernetes, the open-source system for automating containerized applications, from one of the technology's inventors, Joe Beda, founder and CTO at Heptio.
From artificial intelligence to augmented reality, these dozen disruptive technologies and trends will begin driving how business gets done at forward-thinking organizations this year.
Landing a job interview feels great, but how much do you know about your potential employer? Job listings often illicit more questions than provide answers. Knowing where to find inside information can mean the difference between getting a job from a...
With Apple embracing the Qi standard in the iPhone X and 8/8+, wireless charging is finally becoming more mainstream. But there's an ongoing debate about what it does to smartphone battery life.
Project managers must look beyond requirements, budgets and timelines to ensure they are executing high-impact, high-visibility projects with a direct line to the organization's overall strategic goals. Here's how to be recognized by executives and s...
BI success requires more than just a strong technology platform. It takes laser focus on processes and personnel — and a business-first approach to gaining insights from data.
Lack of CEO sponsorship, talent deficiency, resistance to change — if you’ve encountered any of the following issues, you may want to rethink your digital transformation before it grinds to a standstill.
Word is the workhorse of the Microsoft Office 2016 suite, but lots of people don’t know some of its more useful features. Here are three of the best tips.
The next update to Windows 10 is expected to arrive soon, so it's a good time to look at what's coming. Windows expert Preston Gralla has the details.
Microsoft Excel can be tough to use. But you don’t need to be a spreadsheet jockey to get the most out of Excel 2016. Just follow these three tips, which work in Excel 2019 as well.
Whether you think your company uses the information or not, self-evaluations are a necessary device for professional development. Here’s how to make the most of the dreaded self-evaluation process.
Oreo hasn't even rolled out for many users, and yet Android P – Oreo's still unnamed successor – is already on the horizon. Android expert JR Raphael offers insights on what's coming, and why Android upgrades always seem to run late.
Everyone seems to be talking about agile software development, but many organizations don't have a firm grasp on how the process works. Watch this 5-minute video to get up to speed fast.
Host Maryfran Johnson talks with Mojgan Lefebvre, CIO for Liberty Mutual's Global Specialty business, about how the insurance firm is leveraging the cloud, creating business-specific data strategy and getting the best from its acquisitions.
When it comes to expensive Macs, you can't get much pricier than the iMac Pro, the all-in-one workstation that starts at $4,999. Does anyone really need that kind of horsepower? (Yes.)
For developers, are these the best of times or the worst of times? Given how fast technology (and needed skills) change, it's an open question. Our tech trio weighs in – and talks about what we learned from this year's Mobile World Congress.
As phishing attacks evolve, hackers are using customization and targeted scams to ensnare users. Asaf Cidon, vice president, email security services at Barracuda, talks with host Steve Ragan about the ever-changing cat-and-mouse game of phishing.
Geofencing is a service that triggers an action when a device enters a set location. From coupons and notifications, to engagement features and security alerts — businesses are finding creative ways to use these virtual boundaries.
With the General Data Protection Regulation (GDPR) deadline fast approaching, host Steve Ragan explores the implications of noncompliance for companies -- and possible penalties -- with Greg Reber, founder/CEO of AsTech Consulting.
When iOS 11.3 arrives, it will allow a limited number of users to more easily access and share healthcare data – part of Apple's ongoing push to connect patients and doctors. Here's what that means and why Apple might actually succeed.
Robert Gibbons, CTO at Datto, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks.
This year's big show in Barcelona begins Feb. 26, and while hardware announcements are always part of the event, attendees are more likely to hear a lot about 5G networking.
Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the world.
It's about the sound, not the smart. Apple's new home speaker, HomePod, integrates its Apple Music subscription by voice. It carries a hefty price tag of $349.99. The panelists call the move late and half-baked.
Demand for tech talent will continue to outpace supply in the year ahead, while the mix of skills necessary to remain relevant in IT will undergo a significant shift.
What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws.