In this Linux tip, learn how to use the screen command. It's a command that allows you to detach an SSH session and then reconnect to it.
Get a quick look at the R data.table package in this 5-minute tutorial that gives a sample of the package’s speed and power.
Robotics and AI play increasingly important roles in a variety of industries and no, they're not here to take over mankind. Keith Shaw, editor-in-chief of Robotics Business Review, joins Ken Mingis and Juliet Beauchamp to discuss the state of robotic...
Drones, self-driving vehicles and intrusive tech devices have our otherwise fearless hosts on edge. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp, plus Macworld’s Michael Simon discuss why that tech scares them and share your worst ...
Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019.
In this Linux tip, learn how to use the tee command. It’s a very simple command that allows you to run some other command and send its output both to the screen and to a file at the same time.
Amid concern from regulators and Libra Association members alike, Facebook CEO Mark Zuckerberg testified to Congress about plans for his company's planned digital currency, Libra. He revealed Libra will not roll out until U.S. regulators are on board...
It pays to make sure all permissions in your Windows environment are correct after migrating from Windows 7 or Server 2008 R2. Here’s how to check.
Seven huge companies have bowed out of the association in charge of overseeing Facebook’s new cryptocurrency, Libra. While it doesn’t bode well for the cryptocurrency’s rollout, it doesn’t mean all hope is lost. Juliet discusses if, amongst r...
In this Linux tip, learn how to use the who command. It will show you details regarding who is logged in and about the system.
Your Android phone can help you stay productive on the go — if you have the right apps to get the job done.
Microsoft has issued guidance and offered resources to help election officials and candidate campaigns to better protect their Windows and Office 365 systems.
Gmail, Google Calendar, Google Drive — we all know the main titles. But if you're only using the obvious ones, you're missing out. Google's got some great stuff out there that's under the radar and all too easy to miss.
UK group editor, Scott Carey sits down with online editor Hannah Williams to discuss the rivalry between cloud storage giants Dropbox and Box, what the two platforms offer and how they are differentiating in the future.
Computerworld Windows expert Preston Gralla and Executive Editor Ken Mingis are back to answer your questions about Windows 10.
The Huawei Mate 30 launched without full Android support due to the Commerce Department’s ban on business with the Chinese tech company. However, a website allowed users to download beloved Google apps such as Gmail and the Google Play Store. It wa...
Don’t assume VPNs are always safe. These popular enterprise VPNs all have known remote code execution vulnerabilities.
Bitlocker and self-encrypting hard drives can make it easier to erase data so that it cannot be recovered. This is how the “crypto-erase” method works.
See how to save a data frame from R to Excel – with styling or multiple tabs.
Computerworld’s Ken Mingis, Android expert JR Raphael, and Apple expert Michael Simon are talking about Smartphone innovation – How iOS and Android “borrow” from each other.
Android 10 delivers new gestures for quick navigating around your phone. But not all gestures are created equally, and some can be downright confusing at first.
Wells Fargo is the latest financial institution with plans to launch its own stablecoin cryptocurrency. As the fourth largest bank in the world, Wells Fargo is looking to use blockchain to ease cross-border payments and cut back on costs and fees. Ju...
Learn the expr command. It allows you to do mathematical calculations on the command line.
5G has been getting more and more buzz over the past few months, but very few people have actually experienced its promised high speeds. Customers in the U.S. are still months--if not years--away from widespread 5G coverage. PCWorld's Michael Simon i...
Microsoft is turning off basic authentication, so it’s wise to move mobile users to the Outlook app to better protect them from attackers.
As the global push toward 5G continues to pick up speed, government officials in the U.S. continue to have concerns about China's growing dominance in the 5G market. One U.S. senator, Sen. Mark Warner, has concerns about Chinese telecom companies pav...
Computerworld's Preston Gralla and Executive Editor Ken Mingis are back answering questions about Windows 10. If you have questions, post them in the comments to be featured in our next TECH(talk) about Windows 10.
Learn how to use the ac command. It reports on user login times, so if you’re interested in knowing how much time various users are spending on a Linux server, this command is a good choice.
Facebook plans to launch its cryptocurrency, Libra, next year despite intense scrutiny and regulatory hurdles. France and Germany are two of the latest countries to oppose Libra, saying they plan to block the use of Libra in their countries once Face...
Attackers are now enabling WDigest credential caching to allow them to harvest credentials. Here’s how to spot it.
While blockchain has been on a hype roll the last couple of years, it's become increasingly fragmented as more and more companies try out different flavors of the distributed ledger technology. What's that mean for future adoption? Computerworld's Lu...
Four large tech companies -- Apple, Amazon, Google and Facebook are under investigation in the U.S. for allegedly anticompetitive behavior. These antitrust investigations on both the federal and state levels are aimed at uncovering the practices thes...
Wireless charging technology has been around for over 100 years, but it has only recently found mainstream practical use for powering electronic devices like smartphones. Learn how this technology works and what advancements we may see in the future.
Learn how to use the sudo command. It’s a very important command for Linux security because it provides a way for individual users to run specific commands with the authority of root.
These are the security and compliance decisions you need to make when deploying Microsoft Teams.
As cryptocurrency becomes more mainstream and generates more buzz, it’s no surprise that the world’s most powerful tech companies are expressing interest in digital currency. Smartphones companies are set to offer cryptocurrency integration in di...
The California Consumer Privacy Act (CCPA) is, in some ways, similar to Europe's GDPR. This rule, which goes into effect in 2020, gives individual users more ownership over their own data. Users can even refuse to allow companies to sell their online...
Learn how to use the env command. The most useful thing it does is to provide information on your shell environment when you’re working on the Linux command line.
The FTC hit yet another tech company with a seemingly massive fine for mishandling user data. This time, YouTube, owned by Google, is forced to pay $170 million for collecting data about children under 13 without parental consent. The Federal Trade C...
Microsoft recommends setting up multi-factor authentication in Windows 10 for better security, but you have to disable basic or legacy authentication first.
No R package for an API you’d like to use? No problem! See how to write your own R code to pull data from an API using API key authentication.
In this Linux tip, learn how to use the touch command. It allows you to create an empty file or update a file’s last updated date/time settings.
Huawei’s soon-to-be released Mate 30 and Mate 30 Pro will not have access to Google’s Android operating system as we all know it. Google is prohibited from doing business with Huawei under the current ban, which means it can't offer support or up...
Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this increasingly sophisticated form of cyberattack.
With the new iPhone unveiling just weeks away, the rumor mill is in overdrive. What can you expect? We get the latest news and leaks from Macworld's Michael Simon, Computerworld's Ken Mingis and TECH(feed) host Juliet Beauchamp.
Rumors have begun swirling about what may be unveiled at Apple’s September event. We’ll probably see some updates on those services Apple rolled out earlier this year, as well as an update to the Apple Watch. And of course, Apple will announce it...
Nearly two dozen cities in Texas have been hit by a ransomware attack executed by a single threat actor. These attacks beg the question: Is it ever worth it to pay a cyber attacker’s ransom? In this episode of TECH(feed), Juliet discusses the patte...
Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it. Here’s how.
In May, the Commerce Department issued a reprieve on the Huawei ban that was set to expire this week. Just as President Trump expressed interest in cutting all ties with the Chinese company, the Commerce Department issued yet another 90-day delay on ...