In this episode, host Maryfran Johnson talks with Bask Iyer, CIO and EVP at VMware, and general manager of Edge Computing/IOT for Dell Technologies, about digital transformation, edge computing, talent engagement and more.
See how to create an interactive HTML table with one line of code. Plus, plenty of customizations
Shodan, a search engine for all ports within the internet, can help enterprises identify and lock down security vulnerabilities. Senior writer J.M. Porup and content producer Juliet Beauchamp talk through the security scenarios.
The Pixel 3 (and the larger Pixel 3 XL) arrive this week, and after a few days of hands-on time with the new device, Computerworld's Dan Rosenbaum has some thoughts. He joins Executive Editor Ken Mingis and IDGE video producer Chris Hebert to discuss...
In this episode, host Maryfran Johnson talks with Sreelakshmi Kolli, CIO of Align Technology, about how the orthodontics provider is attracting top IT talent and using emerging technologies such as blockchain and 3D printing to expand its market.
Host Martha Heller discusses the challenges and opportunities in organizing the enterprise for digital transformation with her guests Dave Castellani, SVP, Business Information Officer at New York Life Insurance, and Kim Snipes, CIO at USAA.
See how the new graphical user interface for ggplot2 works, thanks to the esquisse R package
Steve Ragan and J.M. Porup catch up post-DerbyCon conference to discuss psychological issues in the infosec community, supply chain security and whether it's time to make China the boogeyman again, as well as Google's recent data breach.
Security expert and author Bruce Schneier talks with senior writer J.M. Porup about that widespread use of connected chips -- allowing hackers to access cars, refrigerators, toys and soon, even more home consumer items.
With the midterm elections looming, electronic voting machines are getting increased scrutiny. J.M. Porup, senior writer at CSO, sits in the hosts chair this episode, breaking down the security risk with content producer Juliet Beauchamp.
Facebook and Google recently acknowledged data breaches affecting millions of users. This won't be the last time that happens. CSO's J.M. Porup and Computerworld's Ken Mingis examine what's really going.
Loren Jarrett, CMO of Progress, has assembled a team of “doers” to help create the “best-next” experience for customers. In a conversation with Rob O’Regan, global content director with IDG Communications, Loren details how her team is usin...
Given the changes in how work gets done these days – in remote offices, by workers on the go, at global companies with employees scattered around the world – collaboration is more important than ever. Here's a look at where things stand, and what...
See how the tidyr R package’s gather and spread functions work. Plus a bonus look at labeling in ggplot2
In this episode, host Maryfran Johnson talks with Dick Daniels, CIO of Kaiser Permanente, about the forces shaping the healthcare industry, and how the healthcare consortium is taking on the tasks of improving IT productivity and accelerating develop...
Learn how to run R scripts from the Mac command line. Then, see how to schedule R scripts with cron jobs and the cronR package.
The next big feature upgrade for Windows 10 arrives soon, so it's time to discuss what's new – and think about why the pace of OS innovation seems to be slowing.
SLA adherence is no guarantee of outsourcing success. Here’s how to avoid seeing red when all the lights on the service delivery dashboard are green.
In this episode of True Technologist, the inventors of the open source project Kubernetes, Craig McLuckie and Joe Beda, talk about the technology's benefits in the enterprise
The role of Chief Marketing Officer has grown increasingly complex. But to Jim Jackson, CMO of Hewlett Packard Enterprise, the key to success is remaining focused. In a conversation with Rob O’Regan, global content director with IDG Communications,...
In this episode of True Technologist, Stack Overflow CEO Joel Spolsky, who authors a software development blog and created the project management software Trello, talks with host Eric Knorr about the agile methodology, DevOps and the future of applic...
In this 10th episode of Do More with R, learn how to create HTML, Word docs, PowerPoint presentations, and more that combine text, graphics, and R code
In this episode, host Maryfran Johnson talks with Cathie Kozik, senior vice president and CIO at PSAV, an events space provider, about aligning tech projects to business goals, tapping into employees for innovative ideas and using artificial intellig...
The promise of unified endpoint management is that it allows companies to more easily handle mobile (and even desktop) hardware management. But it's going to take a while for it to become reality.
In this episode of True Technologist, host Eric Knorr talks with Matei Zaharia, chief technologist at Databricks and an assistant professor of computer science at Stanford, about the Apache Spark and Apache Mesos projects
The Industrial Internet of Things, or IIoT, is the application of instrumentation and connected sensors and other devices to machinery and vehicles. What that means in practice varies widely. Watch this 2-minute video to get up to speed fast.
More CIOS are turning to robotic process automation to eliminate tedious tasks, freeing corporate workers to focus on higher value work. But RPA requires proper design, planning and governance if it's to bolster the business, experts say.
In this episode, host Steve Ragan talks with Karl Hiramoto, technical solutions consultant for VirusTotal, maker of VirusTotal Intelligence, a searchable detection tool for malware.
In this ninth episode of Do More with R, learn how to easily access and modify nested list items with the purrr package’s modify_depth function
Gil Levonai did not follow the typical marketer’s path to his current role as CMO of Zerto. Gil has a degree in aeronautical engineering and spent his early career as a software project manager before pivoting to the marketing function. In a conver...
In today’s Linux tip, we’re going to look at the lsblk command, which provides useful information on block devices.
In today’s Linux tip, we look at the apropos command – a command that helps you locate and identify commands even when you can’t remember their names.
Learn how to help your career, your organization and the IT community by sharing your expert knowledge with others.
In this episode, host Steve Ragan talks with Charles Henderson, global managing partner at IBM's X-Force Red, about smart cities and the potential vulnerabilities in IoT, as well as Daniel Crowley, research director at X-Force Red.
This 3-minute video explains how to use continuous integration and continuous development to deliver apps faster and with higher quality
In today’s Linux tip, we’re going to look at the dstat command that provides important information on system resources — notably CPU usage, disk activity, network traffic, paging and system internals (interrupts and context switches).
In this eighth episode of Do More with R, learn how to animate data over time with R and the gganimate and ggplot2 packages.
In this episode, host Steve Ragan talks with Engin Akyol, CTO at Distil Networks at the Black Hat 2018 conference, about bot account takeovers and how they can be detected.
In this episode of True Technologist, Brendan Eich, creator of the JavaScript language and cofounder of Mozilla, describes the hectic and challenging early days of bringing JavaScript to market, as well as his new company, Brave Software
The newest version of Android is rolling out for Pixel devices already and – eventually – it'll arrive on other Android phones. Computerworld's JR Raphael details what users can look forward to, and why it matters.
Host Steve Ragan talks to Munin, a staffer at the DEF CON Blue Team Village about what's happening and what you can expect.
Host Steve Ragan is joined by Lookout’s Jeremy Richards, who manages the @PhishingAI account on Twitter, as well as a good friend and fellow reporter from Ars Technica.
In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.
What is a phishing kit? In this video, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.
Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.
Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.
The ability to charge hardware over distances of several meters has always seemed to be something of a pipe dream. But Wi-Charge says the technology works – and actual product shipments could begin early in 2019.
Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.
Choosing the right project management methodology for the job is essential. Our guide to evaluating project management methodologies will ensure you pick the perfect fit for your next project.
Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals -- and how to combat them.