See how the tidyr R package’s gather and spread functions work. Plus a bonus look at labeling in ggplot2
In this episode, host Maryfran Johnson talks with Dick Daniels, CIO of Kaiser Permanente, about the forces shaping the healthcare industry, and how the healthcare consortium is taking on the tasks of improving IT productivity and accelerating develop...
Learn how to run R scripts from the Mac command line. Then, see how to schedule R scripts with cron jobs and the cronR package.
The next big feature upgrade for Windows 10 arrives soon, so it's time to discuss what's new – and think about why the pace of OS innovation seems to be slowing.
SLA adherence is no guarantee of outsourcing success. Here’s how to avoid seeing red when all the lights on the service delivery dashboard are green.
In this episode of True Technologist, the inventors of the open source project Kubernetes, Craig McLuckie and Joe Beda, talk about the technology's benefits in the enterprise
The role of Chief Marketing Officer has grown increasingly complex. But to Jim Jackson, CMO of Hewlett Packard Enterprise, the key to success is remaining focused. In a conversation with Rob O’Regan, global content director with IDG Communications,...
In this episode of True Technologist, Stack Overflow CEO Joel Spolsky, who authors a software development blog and created the project management software Trello, talks with host Eric Knorr about the agile methodology, DevOps and the future of applic...
In this 10th episode of Do More with R, learn how to create HTML, Word docs, PowerPoint presentations, and more that combine text, graphics, and R code
In this episode, host Maryfran Johnson talks with Cathie Kozik, senior vice president and CIO at PSAV, an events space provider, about aligning tech projects to business goals, tapping into employees for innovative ideas and using artificial intellig...
The promise of unified endpoint management is that it allows companies to more easily handle mobile (and even desktop) hardware management. But it's going to take a while for it to become reality.
In this episode of True Technologist, host Eric Knorr talks with Matei Zaharia, chief technologist at Databricks and an assistant professor of computer science at Stanford, about the Apache Spark and Apache Mesos projects
The Industrial Internet of Things, or IIoT, is the application of instrumentation and connected sensors and other devices to machinery and vehicles. What that means in practice varies widely. Watch this 2-minute video to get up to speed fast.
More CIOS are turning to robotic process automation to eliminate tedious tasks, freeing corporate workers to focus on higher value work. But RPA requires proper design, planning and governance if it's to bolster the business, experts say.
In this episode, host Steve Ragan talks with Karl Hiramoto, technical solutions consultant for VirusTotal, maker of VirusTotal Intelligence, a searchable detection tool for malware.
In this ninth episode of Do More with R, learn how to easily access and modify nested list items with the purrr package’s modify_depth function
Gil Levonai did not follow the typical marketer’s path to his current role as CMO of Zerto. Gil has a degree in aeronautical engineering and spent his early career as a software project manager before pivoting to the marketing function. In a conver...
In today’s Linux tip, we’re going to look at the lsblk command, which provides useful information on block devices.
In today’s Linux tip, we look at the apropos command – a command that helps you locate and identify commands even when you can’t remember their names.
Learn how to help your career, your organization and the IT community by sharing your expert knowledge with others.
In this episode, host Steve Ragan talks with Charles Henderson, global managing partner at IBM's X-Force Red, about smart cities and the potential vulnerabilities in IoT, as well as Daniel Crowley, research director at X-Force Red.
This 3-minute video explains how to use continuous integration and continuous development to deliver apps faster and with higher quality
In today’s Linux tip, we’re going to look at the dstat command that provides important information on system resources — notably CPU usage, disk activity, network traffic, paging and system internals (interrupts and context switches).
In this eighth episode of Do More with R, learn how to animate data over time with R and the gganimate and ggplot2 packages.
In this episode, host Steve Ragan talks with Engin Akyol, CTO at Distil Networks at the Black Hat 2018 conference, about bot account takeovers and how they can be detected.
In this episode of True Technologist, Brendan Eich, creator of the JavaScript language and cofounder of Mozilla, describes the hectic and challenging early days of bringing JavaScript to market, as well as his new company, Brave Software
The newest version of Android is rolling out for Pixel devices already and – eventually – it'll arrive on other Android phones. Computerworld's JR Raphael details what users can look forward to, and why it matters.
Host Steve Ragan talks to Munin, a staffer at the DEF CON Blue Team Village about what's happening and what you can expect.
Host Steve Ragan is joined by Lookout’s Jeremy Richards, who manages the @PhishingAI account on Twitter, as well as a good friend and fellow reporter from Ars Technica.
In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.
What is a phishing kit? In this video, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.
Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.
Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.
The ability to charge hardware over distances of several meters has always seemed to be something of a pipe dream. But Wi-Charge says the technology works – and actual product shipments could begin early in 2019.
Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.
Choosing the right project management methodology for the job is essential. Our guide to evaluating project management methodologies will ensure you pick the perfect fit for your next project.
Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals -- and how to combat them.
From advanced authentication to new privacy controls, Windows 10 offers users solid security reasons to upgrade.
Believe it or not, a large number of businesses haven’t upgraded to Windows 10 yet. Here’s why they should.
Breaking through the hype around machine learning and artificial intelligence, our panel of Ken Mingis, Michael Simon and Serdar Yegulalp talk through the definitions and implications of the technology.
In this episode, Michael Feiertag, CEO and co-founder of tCell, joins host Steve Ragan to talk about why application security is more critical than ever and why it's just now getting more attention from security teams.
In this seventh episode of Do More with R, learn how to create maps in R—it’s easier than you think, thanks to new and updated packages like sf, tmap, and ggplot2
In today’s Linux tip, we’re going to look at pipes, which take the output of the command on the left side and pass it to the command on the right to use as input.
In today’s Linux tip, we’re going to look at the od command, which allows you to look at the content of files.
In the IT world, virtualization has revolutionized the way we think about data and where it lives, moving us closer to a completely on-demand data world.
Oracle joins other major tech vendors by rolling out its blockchain-as-a-service offering, and two smartphone makers plan to include the technology in new devices this year. Get the latest on the blockchain craze.
Business analyst help guide businesses in improving processes, products, services and software through data analysis. These agile workers straddle the line between IT and the business to help bridge the gap and improve efficiency.
Here are the top five languages for creating AI-enabled apps, according to InfoWorld contributor and deep learning architect Ian Pointer.
In this sixth episode of Do More with R, learn how to apply a function to a vector of values and return a data frame
In today’s Linux tip, we look at the find command – a tool that will prove very useful when you’re trying to locate a file or set of files based on almost any criteria.
Sponsored Links