Frank Gens, IDC’s senior vice president and chief analyst, presents the analyst firm's annual outlook for the next several years in IT, including the top 10 worldwide IT industry predictions and how they will impact every enterprise’s ability to ...
In this fifth episode of Do More with R, Sharon Machlis, director of Editorial Data & Analytics at IDG Communications, shows how code snippets work in RStudio—and how you can make your own
Six Sigma streamlines quality control in an effort to improve current processes, products or services. Here are the methodologies, roles and certifications central to this quality management methodology.
Host Steve Ragan reports from the RSA 2018 conference, talking with Liv Rowley, an intelligence analyst at Flashpoint, about Spanish cybercrime, an underground community that poses persistent security risks.
In this fourth episode of Do More with R, Sharon Machlis, director of Editorial Data & Analytics at IDG Communications, shows how to create dashboards in the R language with the flexdashboard package.
In this episode, host Maryfran Johnson talks with James Rinaldi, CIO at NASA's Jet Propulsion Lab, about opening up data silos and driving data transformation; having a seat at the table to lead change; and using technology to explore the universe.
Apple on Monday unveiled a variety of software updates, tweaks and features for the upcoming iOS 12, macOS 'Mojave,' watchOS 5 and tvOS. Here's a look at what's coming, what we liked and what we didn't.
From data scientists to data security pros, the battle for the best in IT talent will wage on next year. Here’s what to look for when you’re hiring for the 7 most in-demand jobs for 2018 — and how much you should offer based on experience.
Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build a zero trust model, including consistently authenticating users.
In this episode of Do More with R, learn how to automate testing your R functions with Hadley Wickham’s testthat package.
With blockchain technology showing up in everything from global shipping to cloud storage and real estate transactions, it's no surprise that it's now seen as a way to help companies trade and sell carbon credits.
TSB customers in the U.K. were already frustrated by the bank's technical problems, but now the situation has gotten worse as criminals take advantage of the chaos. Host Steve Ragan looks at recent TSB phishing attacks and the kit that powers them.
The data scientist role varies depending on industry, but there are common skills, experience, education and training that will give you a leg up in starting your data science career.
Network virtualization pioneer Martin Casado explains the concept behind network virtualization, how the technology works and why it was created.
In this episode, host Maryfran Johnson talks with Cynthia Stoddard, SVP and CIO at Adobe. Their hour-long conversation covers a range of topics, including IT innovation and ROI, data strategy, automation, machine learning and AI, and the new IT ro...
Cutting back on your Android data use can make your phone bill plummet, and it's easy to do with a few key tweaks. Ready to start saving?
In this second episode of Do More with R, Sharon Machlis, director of Editorial Data & Analytics at IDG Communications, shows how dplyr's case_when() function helps avoid a lot of nested ifelse statements
Host Steve Ragan reports from the show floor at RSA 2018, where talks with Chris Roberts, chief security architect at Acalvio Technologies, about the benefits and misconceptions of deception technologies.
CSO's Michael Nadeau and Steve Ragan join Computerworld's Ken Mingis and IDG Communications' Mark Lewis to look at what the new EU privacy rules mean. They offer insights on how companies can prepare – and what happens if they don't.
Cryptocurrency such as Bitcoin has garnered most of the media coverage and hype to date, but keep your eye on blockchain – this new technology is poised to change IT in much the same way open-source software did a quarter century ago.
How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.
Reporting from RSA 2018, host Steve Ragan helps dispel the hype and confusion surrounding the dark web, as he talks with Alon Arvatz, co-founder at IntSights.
Host Steve Ragan reports from the show floor at RSA 2018, taking with Oliver Tavakoli, CTO at Vectra Networks, and author of the Thinking Security blog on CSOonline.com, about the types of IT security work that can be off-loaded to artificial intelli...
In this first episode of Do More with R, Sharon Machlis, director of Editorial Data & Analytics at IDG Communications, demonstrates how easy it is to use the R language to create an interactive scatter plot with multiple trendline choices
In this episode of CIO Leadership Live, host Maryfran Johnson talks with Jack Clare, CIO and chief strategy officer at Dunkin' Brands, about the company's mobile payment, ordering and loyalty apps, and how it's striving to improve customers' drive-th...
This year's RSA security conference focused on a variety of cybersecurity topics – everything from blockchain to the looming GDPR rules. CSO's Steve Ragan was there and offers insights on what he learned.
Host Steve Ragan reports from the RSA 2018 show floor, talking with Greg Reber, founder and CEO at AsTech Consulting, about the looming GDPR deadline and what IT security professionals should be getting done now.
Not getting any bites on your resume? You might be making one or more of these eight common resume mistakes.
From multi-cloud strategies to cost containment and container orchestration, CIOs are getting more pragmatic and prudent when taking advantage of the cloud’s economies of scale.
The all-screen design of Apple's iPhone X necessitated a 'notch' at the top of the display for various cameras and sensors. Now, Android phone makers are going with the same design. But why?
In this Q&A, host Maryfran Johnson talks one-on-one with Sanjay Shringarpure, CIO at E.& J. Gallo Winery, about the changing landscape of IT and innovation technologies in the agriculture industry, the challenges of recruiting talent, and more.
What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, director of Security Solutions and security evangelist a...
Firewalls have become ubiquitous across the enterprise IT landscape because of their proven ability to stop bad traffic from entering corporate networks and protect a company’s most valuable assets. So how have firewalls evolved over the years and ...
Google's Android Oreo release is full of fresh flavor for your phone. But some of its most useful touches are all too easy to overlook. Whether you've had Oreo for months or are just now getting a taste, it's time to learn something new about what yo...
With the right set of apps, you can turn your Android phone into a collaboration hub — and then stay connected and productive -- wherever you might be.
Android's practically overflowing with options, and it's easy to lose track of some useful features along the way. Here are a few handy but hidden capabilities you probably forget to use.
In today’s Linux tip, we’re going to look at the mtr command and see what it can tell us about network connections. Mtr stands for “my traceroute” and displays the route that a connection to a particular system takes by providing a continuous...
In today’s tip, I’m going to show you how to terminate processes on Linux systems using kill, pkill and killall and show you why it makes a difference which command you choose.
In today’s Linux tip, we’re going to look at the adduser and deluser commands. As the names suggest, they are used to add and delete user accounts on Linux systems.
Google's Android OS sometimes gets unfairly maligned as being weak on security. Computerworld blogger JR Raphael explains why that's a misconception and how users can keep their devices safe.
Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.
In this 60-second video, learn how the cloud-native approach is changing the way enterprises structure their technologies, from Craig McLuckie, founder and CEO of Heptio, and one of the inventors of open-source system Kubernetes
In today’s 2-minute tip, we’re going to look at the alias command – a tool that can save you a lot of time and trouble and maybe even a few brain cells.
Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Adrian Sanabria, director of research at Savage Security, about de-emphasizing network penetration tests to put more focus on attack simulations and helping companies improv...
In this explainer video, learn several techniques that can improve your Node development experience.
Now considered essential to driving profits, digital transformations are shifting from platform-first strategies to initiatives that leverage emerging technologies in service of clear customer and operational goals.
Maryfran Johnson talks with Klara Jelinkova, Rice University’s CIO, on a range of topics, including the responsibility of senior women in IT to mentor the next generation and how the university's GDPR project was an opportunity to talk with busines...
In today's 2-minute Linux Tip, we look at the bash history command – a tool that shows you commands you've recently used and allows you to use them again without having to retype them.
In today’s 2-minute Linux Tip, we’re going to look at a command that you might never have heard of. It’s called logsave, and it allows you to selectively add command output to a file.