A lot has happened since we uploaded our most recent video about the Huawei ban last month. Another reprieve has been issued, licenses have been granted and the FCC has officially barred Huawei equipment from U.S. networks. Our viewers had some great...
Follow these steps to protect your websites at the server and workstation.
Computerworld contributor Preston Gralla answers viewers' questions about Windows 10 (and Windows 7) with Executive Editor Ken Mingis.
In this Linux tip, learn how to use the date command. In its simplest form, it provides the date and time in a nice format, including the time zone.
The hype around artificial intelligence and machine learning is giving way to real use. Join us as InfoWorld’s Serdar Yegulalp and IDG TECHtalk host Ken Mingis discuss how AI and ML have become easier to put into production, how AI and ML are being...
See how to merge data in R three different ways: with base R’s merge function, dplyr’s family of join functions, and the data.table package.
Computerworld's Ken Mingis is joined by PCWorld's Michael Simon to discuss what they're wishing for this holiday season. From existing smart home gadgets and the Mac Pro to the yet-to-be-announced 5G iPhone, Ken and Michael hash out what they hope to...
If you have a Chromebook, you probably know there isn't a lot to figure out when you first start using it. You sign in with your Google account and you're pretty much good to go. But there's plenty of tips and shortcuts you might not know about. Chec...
If you're looking to maximize organization and collaboration, look no further. Check out Trello, a handy app that makes it super easy to organize pretty much anything. It's got some pretty powerful options for taking your organization to the next lev...
In honor of Thanksgiving, Ken and Juliet are joined by Macworld's Michael Simon to discuss the technology they appreciate the most. From iPhones to WiFi, there's plenty to be thankful for.
In this Linux tip, learn how to use the bmon command. It’s a graphical tool for looking at network bandwidth.
2020 is supposed to be the year of 5G. We can expect to see more infrastructure roll out, faster speeds and 5G-enabled phones will flood the market. PCWorld's Michael Simon joins Juliet to discuss who will get 5G when and how the T-Mobile/Sprint merg...
Make your own disaster checklist and recovery toolkit before trouble happens.
Macworld’s Michael Simon and Computerworld Executive Editor Ken Mingis answer viewers' questions about Apple iOS.
The dtplyr 1.0 package lets you write dplyr R code and access speedy data.table performance. Find out how
In this Linux tip, learn how to use the uniq command. It’s a command that’s very useful when you want to reduce or summarize information.
Healthcare organizations are one of the most targeted verticals when it comes to cyberattacks. While those organizations must work to secure patients' sensitive data, it can also be helpful to analyze that data to improve patient outcomes. Jason Jame...
Computerworld contributor Preston Gralla and Executive Editor Ken Mingis answered viewers' questions about Windows.
Use these techniques to limit attackers’ ability to compromise systems and websites.
Printers, often a forgotten target in the enterprise, are vulnerable to all the usual cyberattacks. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp and CSO Online’s J.M. Porup discuss the threats to these devices, plus how to secure t...
Aircraft manufacturer Boeing's insecure networks leave the company--and potentially its aircraft--at risk of exploitation. Security researcher Chris Kubecka uncovered these threats in April, and new reporting by CSO's J.M. Porup reveals little has be...
The U.S. Commerce Department announced it would begin approving licenses for some of the companies to resume business with Chinese tech giant Huawei. After a monthslong freeze on many transactions between U.S. tech companies and Huawei, these approva...
Most consumers don't consider security when purchasing IoT devices. Yet botnet attacks can be devastating, impacting large portions of the internet. Learn how to prevent botnets in this video.
In this Linux tip, learn how to use the screen command. It's a command that allows you to detach an SSH session and then reconnect to it.
Get a quick look at the R data.table package in this 5-minute tutorial that gives a sample of the package’s speed and power.
Robotics and AI play increasingly important roles in a variety of industries and no, they're not here to take over mankind. Keith Shaw, editor-in-chief of Robotics Business Review, joins Ken Mingis and Juliet Beauchamp to discuss the state of robotic...
Drones, self-driving vehicles and intrusive tech devices have our otherwise fearless hosts on edge. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp, plus Macworld’s Michael Simon discuss why that tech scares them and share your worst ...
Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019.
In this Linux tip, learn how to use the tee command. It’s a very simple command that allows you to run some other command and send its output both to the screen and to a file at the same time.
Amid concern from regulators and Libra Association members alike, Facebook CEO Mark Zuckerberg testified to Congress about plans for his company's planned digital currency, Libra. He revealed Libra will not roll out until U.S. regulators are on board...
It pays to make sure all permissions in your Windows environment are correct after migrating from Windows 7 or Server 2008 R2. Here’s how to check.
Seven huge companies have bowed out of the association in charge of overseeing Facebook’s new cryptocurrency, Libra. While it doesn’t bode well for the cryptocurrency’s rollout, it doesn’t mean all hope is lost. Juliet discusses if, amongst r...
In this Linux tip, learn how to use the who command. It will show you details regarding who is logged in and about the system.
Your Android phone can help you stay productive on the go — if you have the right apps to get the job done.
Microsoft has issued guidance and offered resources to help election officials and candidate campaigns to better protect their Windows and Office 365 systems.
Gmail, Google Calendar, Google Drive — we all know the main titles. But if you're only using the obvious ones, you're missing out. Google's got some great stuff out there that's under the radar and all too easy to miss.
UK group editor, Scott Carey sits down with online editor Hannah Williams to discuss the rivalry between cloud storage giants Dropbox and Box, what the two platforms offer and how they are differentiating in the future.
Computerworld Windows expert Preston Gralla and Executive Editor Ken Mingis are back to answer your questions about Windows 10.
The Huawei Mate 30 launched without full Android support due to the Commerce Department’s ban on business with the Chinese tech company. However, a website allowed users to download beloved Google apps such as Gmail and the Google Play Store. It wa...
Don’t assume VPNs are always safe. These popular enterprise VPNs all have known remote code execution vulnerabilities.
Bitlocker and self-encrypting hard drives can make it easier to erase data so that it cannot be recovered. This is how the “crypto-erase” method works.
See how to save a data frame from R to Excel – with styling or multiple tabs.
Computerworld’s Ken Mingis, Android expert JR Raphael, and Apple expert Michael Simon are talking about Smartphone innovation – How iOS and Android “borrow” from each other.
Android 10 delivers new gestures for quick navigating around your phone. But not all gestures are created equally, and some can be downright confusing at first.
Wells Fargo is the latest financial institution with plans to launch its own stablecoin cryptocurrency. As the fourth largest bank in the world, Wells Fargo is looking to use blockchain to ease cross-border payments and cut back on costs and fees. Ju...
Learn the expr command. It allows you to do mathematical calculations on the command line.
5G has been getting more and more buzz over the past few months, but very few people have actually experienced its promised high speeds. Customers in the U.S. are still months--if not years--away from widespread 5G coverage. PCWorld's Michael Simon i...
Microsoft is turning off basic authentication, so it’s wise to move mobile users to the Outlook app to better protect them from attackers.
As the global push toward 5G continues to pick up speed, government officials in the U.S. continue to have concerns about China's growing dominance in the 5G market. One U.S. senator, Sen. Mark Warner, has concerns about Chinese telecom companies pav...