Foldables, 5G, new Android phone options – watch as Computerworld blogger (and Android expert) JR Raphael joins IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp to discuss what we can expect for Android phones in 2020.
Take stock of how people and devices access your network and block potential avenues of attack.
In this Linux tip, learn how to use the ssh-keygen command. It’s used to create a set of public/private keys that you can use in place of passwords to either log into a system or run commands remotely.
Learn how to turn code from Episode 41 into an interactive shiny Web app.
See how to search, filter, and sort tweets using R and the rtweet package. It’s a great way to follow conference hashtags. If you want to follow along with the optional code for creating clickable URL links, make sure to install the purrr package i...
Artificial intelligence and machine learning are being used even more these days. Watch as InfoWorld’s Serdar Yegulalp and IDG TECHtalk hosts Ken Mingis and Juliet Beauchamp discuss how AI and ML are being used and answer viewers’ questions.
Still running Windows 7 or Windows Server 2008? Take these steps to minimize your risk.
Robotics Business Review senior editor Keith Shaw joins Ken and Juliet once again to talk CES 2020 and the future of robotics. Keith debunks the myth that robots will replace humans in jobs, and explains they'll actually be quite helpful in assisting...
In this Linux tip, learn how you can move a running task into the background and what that means. Once you use the bg command, you have the ability to run other commands.
Start the new year off by eliminating common paths for attackers to breach your network.
Computerworld Windows expert Preston Gralla and Executive Editor Ken Mingis answer viewers' questions about the latest Windows 10 release. If you have a question, post it as a comment so it can be answered in a future episode.
In this Linux tip, learn how to use the lsof (list open files) command. To properly list all open files, you should use sudo. Otherwise you’re likely to run into a lot of Permission Denied warnings.
See how to send a text message directly from an R script with Twilio and the Twilio R package.
2019 was a big year for Apple, with the arrival of the Apple Card, the iPhone 11, the new Mac Pro and and a new MacBook Pro. What can we expect from the company in 2020? Macworld’s Michael Simon and Computerworld’s Ken Mingis offer their prognost...
Prevent Windows admin credentials from being exposed in cleartext with this tip.
In this Linux tip, learn about apparmor. It’s a security module that runs by default on certain Linux systems – like newer Ubuntu and Debian. Apparmor enforces restrictions using file system paths while SELinux applies security labels to objects.
Follow these steps to ensure your multi-factor authentication for Office 365 is effective.
In this Linux tip, learn the wget command. It makes downloading pages from web sites – even recursively – very easy. Keep in mind that this command downloads whatever html code defines the page.
The new Apple Card, the battle for cryptocurrency dominance, cybersecurity skills shortage – just a few of the stories that made headlines in 2019. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp discuss the top tech stories of the ye...
This new Microsoft 365 feature can help you stay in compliance with regulations like GDPR and better protect data.
In this Linux tip, we’re going to look at the du command that reports on disk usage – whether individual files or directories.
See how to do GIS calculations in R with this tutorial on finding the ZIP code for a US address.
Michael Salas, SVP, Chief Information & Digital Officer at SUEZ North America, joins Maryfran Johnson for this CIO Leadership Live interview. Watch as they discuss IT strategy, digital transformation and more.
Attackers often take advantage of the holidays to launch attacks. Use these Microsoft settings to deter them.
In this Linux tip, we’re going to look at the split command that breaks files into pieces --according to your instructions if you like -- and gives the pieces sequential names.
A lot has happened since we uploaded our most recent video about the Huawei ban last month. Another reprieve has been issued, licenses have been granted and the FCC has officially barred Huawei equipment from U.S. networks. Our viewers had some great...
Follow these steps to protect your websites at the server and workstation.
Computerworld contributor Preston Gralla answers viewers' questions about Windows 10 (and Windows 7) with Executive Editor Ken Mingis.
Don't let the rush to Legal Day 1 derail your IT integration. Watch this video to learn about several IT security pitfalls to avoid during the complexity of your M&A
In this Linux tip, learn how to use the date command. In its simplest form, it provides the date and time in a nice format, including the time zone.
The hype around artificial intelligence and machine learning is giving way to real use. Join us as InfoWorld’s Serdar Yegulalp and IDG TECHtalk host Ken Mingis discuss how AI and ML have become easier to put into production, how AI and ML are being...
See how to merge data in R three different ways: with base R’s merge function, dplyr’s family of join functions, and the data.table package.
Computerworld's Ken Mingis is joined by PCWorld's Michael Simon to discuss what they're wishing for this holiday season. From existing smart home gadgets and the Mac Pro to the yet-to-be-announced 5G iPhone, Ken and Michael hash out what they hope to...
If you have a Chromebook, you probably know there isn't a lot to figure out when you first start using it. You sign in with your Google account and you're pretty much good to go. But there's plenty of tips and shortcuts you might not know about. Chec...
If you're looking to maximize organization and collaboration, look no further. Check out Trello, a handy app that makes it super easy to organize pretty much anything. It's got some pretty powerful options for taking your organization to the next lev...
In honor of Thanksgiving, Ken and Juliet are joined by Macworld's Michael Simon to discuss the technology they appreciate the most. From iPhones to WiFi, there's plenty to be thankful for.
In this Linux tip, learn how to use the bmon command. It’s a graphical tool for looking at network bandwidth.
2020 is supposed to be the year of 5G. We can expect to see more infrastructure roll out, faster speeds and 5G-enabled phones will flood the market. PCWorld's Michael Simon joins Juliet to discuss who will get 5G when and how the T-Mobile/Sprint merg...
Make your own disaster checklist and recovery toolkit before trouble happens.
Macworld’s Michael Simon and Computerworld Executive Editor Ken Mingis answer viewers' questions about Apple iOS.
The dtplyr 1.0 package lets you write dplyr R code and access speedy data.table performance. Find out how
In this Linux tip, learn how to use the uniq command. It’s a command that’s very useful when you want to reduce or summarize information.
Healthcare organizations are one of the most targeted verticals when it comes to cyberattacks. While those organizations must work to secure patients' sensitive data, it can also be helpful to analyze that data to improve patient outcomes. Jason Jame...
Computerworld contributor Preston Gralla and Executive Editor Ken Mingis answered viewers' questions about Windows.
Use these techniques to limit attackers’ ability to compromise systems and websites.
Printers, often a forgotten target in the enterprise, are vulnerable to all the usual cyberattacks. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp and CSO Online’s J.M. Porup discuss the threats to these devices, plus how to secure t...
Aircraft manufacturer Boeing's insecure networks leave the company--and potentially its aircraft--at risk of exploitation. Security researcher Chris Kubecka uncovered these threats in April, and new reporting by CSO's J.M. Porup reveals little has be...
The U.S. Commerce Department announced it would begin approving licenses for some of the companies to resume business with Chinese tech giant Huawei. After a monthslong freeze on many transactions between U.S. tech companies and Huawei, these approva...
Most consumers don't consider security when purchasing IoT devices. Yet botnet attacks can be devastating, impacting large portions of the internet. Learn how to prevent botnets in this video.
In this Linux tip, learn how to use the screen command. It's a command that allows you to detach an SSH session and then reconnect to it.