Sometimes, it can feel like there’s a Zoom meeting for everything now: team check-ins, town halls, happy hours with friends, worship services and exercise classes. And while all of these meetings may seem good in theory, in practice, they can be re...
Apple’s newly launched Magic Keyboard brings even more enterprise capabilities to the iPad Pro. But is it worth $349? If a MacBook Air is cheaper than a souped-up iPad Pro and keyboard, which is the better buy? Computerworld Executive Editor Ken Mi...
Computerworld contributor Preston Gralla and Executive Editor Ken Mingis answer viewers' questions about the latest Windows 10 release.
The economic impact of COVID-19 has forced many businesses to readjust their budgets and cut costs where possible. That could mean halting PC and smartphone upgrades or pausing software rollouts. One IT sector that may experience growth during a rece...
Staff writer Charlotte Trueman runs through the findings from her definitive comparison of the leading enterprise videoconferencing software during the pandemic, from WebEx, GoToMeeting and Teams, to Google Meet and Zoom.
An accurate way to trace potential contacts of newly diagnosed coronavirus patients is widely seen as an important step in limiting the spread of the virus and eventually reopening businesses. There are two main approaches: self-reporting to a group ...
More and more tech companies are stepping up to the plate to assist frontline workers and healthcare organizations as the coronavirus continues to take its toll around the world. Computerworld’s Ken Mingis joins Juliet to discuss how tech companies...
With most of (if not everyone in) your household now working from home, you’re perhaps asking more of your home network than ever before. Multiple devices may now be hosting a video conference, streaming and using chat tools all at the same time. O...
Amid concerns about the coronavirus, Apple released its latest iPad Pro and MacBook Air without an official event in mid-March. But one piece of hardware was noticeably absent… the iPhone 9 or iPhone SE 2. Early rumors suggested a March 31st announ...
Millions of people across a diverse array of industries are working from home for the foreseeable future. For some, it’s their first time doing so for more than a few days at a time. While we’ve all been adjusting to remote work, we’ve become i...
If you’re working from home due to coronavirus concerns/social distancing, you’re probably relying on video conferencing tools like Skype, Teams, Zoom or Webex. Learn how to make the most of your work from home setup, get better video and audio q...
Apple settled a class-action lawsuit as a result of alleged battery throttling issues in its iPhone 6, 6 Plus, 6s, 6s Plus, 7, 7 Plus and SE models. The settlement calls for Apple to pay consumers $25 per iPhone. Macworld’s Michael Simon joins Juli...
Enterprises have taken steps to limit the spread of the novel coronavirus, COVID-19, from mandatory quarantines to factory closures. Big tech companies have canceled events and shows, sometimes opting to hold online-only streamed events. And amid sup...
Apple is the latest firm to join the FIDO Alliance, an industry standards group developing more secure ways to log in to online accounts and apps using multi-factor authentication (MFA), biometric authentication and physical security keys. Computerwo...
Apple is rumored to announce its new, lower-end iPhone at the end of March. Modeled after the iPhone 8, the iPhone 9 (or maybe it'll be called the iPhone SE 2) will offer consumers a cheaper alternative to the higher-end iPhone 11 or iPhone 11 Pro. R...
Most phishing campaigns use links to malicious scripts that infect users’ devices. Here’s how to spot and prevent them from doing damage.
Computerworld Windows expert Preston Gralla and Executive Editor Ken Mingis answer viewers' questions about the latest Windows 10 release and other Windows-related topics. If you have a question, post it as a comment.
The U.S. Department of Defense had two final choices to award its Joint Enterprise Defense Infrastructure (JEDI) cloud computing contract: Microsoft and Amazon. Despite perception of Amazon’s frontrunner status, the D.O.D. awarded the $10 billion c...
See how to style your headlines, axis text, and more in your ggplot graphs with the R ggtext package. Download the data from Sharon's associated article: https://www.infoworld.com/article/3527449/add-color-to-your-ggplot2-text-in-r.html
Use these tools and techniques to protect important data from being exfiltrated from your Windows network.
Enforcement of the California Consumer Privacy Act begins this summer, but lawsuits are already being filed. To help you comply and avoid being sued, CSO contributor Maria Korolov joins IDG TECH(talk) host Juliet Beauchamp to discuss critical compone...
In this Linux tip, learn how to use the ls command. The ls command is one of the most basic commands. It’s used to list files and it has some very useful options.
One of the largest tech trade shows, Mobile World Congress, canceled its convention just a few weeks before it was scheduled to begin. GSMA, the organization that puts on MWC, decided to cancel after a number of high profile vendors pulled out due to...
In honor of Valentine’s Day, we’re talking about technology we love. AI, 5G, edge computing, collaboration tools – all have people’s hearts racing. Watch as Michael Simon, writer for Macworld and PCWorld, and IDG TECH(talk) hosts Ken Mingis a...
Knowing where to look for malware lurking on your network gives you a better chance to prevent damage from it.
We hear the terms "deep web" and "dark web" thrown around a lot... but what do they actually mean? And what's the difference between the two? CSO Online writer J.M. Porup joins Juliet to dispel rumors and discuss what sets the deep web and dark web a...
Use these techniques to see if attackers have harvested authentication credentials from your Windows network.
It's the day after the 2020 Iowa caucuses, and the Iowa Democratic Party has yet to announce the winner. The app that precinct leaders were supposed to use to report final tallies recorded inconsistent results. Party leaders blamed a "coding issue" w...
Is 5G real? When should you upgrade? How will enterprises benefit and what are the costs and ROI? Analyst Jack Gold joins IDG TECH(talk) hosts Juliet Beauchamp and Computerworld's Ken Mingis to answer those questions and more to help you create your ...
IDC analyst and networking expert Brandon Butler joins Ken and Juliet to discuss networking trends, Wi-Fi versus 5G and how artificial intelligence and machine learning can simplify network management. They also discuss how enterprises are beginning ...
Foldables, 5G, new Android phone options – watch as Computerworld blogger (and Android expert) JR Raphael joins IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp to discuss what we can expect for Android phones in 2020.
Take stock of how people and devices access your network and block potential avenues of attack.
In this Linux tip, learn how to use the ssh-keygen command. It’s used to create a set of public/private keys that you can use in place of passwords to either log into a system or run commands remotely.
Learn how to turn code from Episode 41 into an interactive shiny Web app.
See how to search, filter, and sort tweets using R and the rtweet package. It’s a great way to follow conference hashtags. If you want to follow along with the optional code for creating clickable URL links, make sure to install the purrr package i...
Artificial intelligence and machine learning are being used even more these days. Watch as InfoWorld’s Serdar Yegulalp and IDG TECHtalk hosts Ken Mingis and Juliet Beauchamp discuss how AI and ML are being used and answer viewers’ questions.
Still running Windows 7 or Windows Server 2008? Take these steps to minimize your risk.
Robotics Business Review senior editor Keith Shaw joins Ken and Juliet once again to talk CES 2020 and the future of robotics. Keith debunks the myth that robots will replace humans in jobs, and explains they'll actually be quite helpful in assisting...
In this Linux tip, learn how you can move a running task into the background and what that means. Once you use the bg command, you have the ability to run other commands.
Start the new year off by eliminating common paths for attackers to breach your network.
Computerworld Windows expert Preston Gralla and Executive Editor Ken Mingis answer viewers' questions about the latest Windows 10 release. If you have a question, post it as a comment so it can be answered in a future episode.
In this Linux tip, learn how to use the lsof (list open files) command. To properly list all open files, you should use sudo. Otherwise you’re likely to run into a lot of Permission Denied warnings.
See how to send a text message directly from an R script with Twilio and the Twilio R package.
2019 was a big year for Apple, with the arrival of the Apple Card, the iPhone 11, the new Mac Pro and and a new MacBook Pro. What can we expect from the company in 2020? Macworld’s Michael Simon and Computerworld’s Ken Mingis offer their prognost...
Prevent Windows admin credentials from being exposed in cleartext with this tip.
In this Linux tip, learn about apparmor. It’s a security module that runs by default on certain Linux systems – like newer Ubuntu and Debian. Apparmor enforces restrictions using file system paths while SELinux applies security labels to objects.
Follow these steps to ensure your multi-factor authentication for Office 365 is effective.
In this Linux tip, learn the wget command. It makes downloading pages from web sites – even recursively – very easy. Keep in mind that this command downloads whatever html code defines the page.
The new Apple Card, the battle for cryptocurrency dominance, cybersecurity skills shortage – just a few of the stories that made headlines in 2019. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp discuss the top tech stories of the ye...
This new Microsoft 365 feature can help you stay in compliance with regulations like GDPR and better protect data.
Sponsored Links