Features

01 light

7 tips to strengthen online security

If you are online today, checking email, buying someone a gift, posting to Facebook, paying bills, streaming Netflix, or monitoring your sleeping baby, you need to practice these seven tips for protecting your online presence.

artificial intelligence brain circuit

A.I. in the driver’s seat with the enterprise

Artificial intelligence will be a critical driver of the U.S. economy. See what IBM’s Watson is doing at GlaxoSmithKline, Staples and 1-800-Flowers.

resume mistakes

IT Resume Makeover: Transitioning from IT pro to IT leader

Making the move from IT professional to IT leader takes a different set of skills. The same type of pivot is necessary with how you approach your resume.

floppy disk and SD card storage

CW@50: A half-century of data storage (PDF)

A free download that explains how storage went from $1 million to 2 cents per megabyte -- and how it evolved from punch cards to data storage, the internet and smartphones.

enterprise cloud thinkstock cloud computing microsoft docker HP helion

Enterprises get to work in the cloud

Companies are using the cloud for digital transformation, research and collaboration, and more are moving critical workloads there.

Windows Embedded OS

Windows Embedded's future looks rocky

Microsoft's apparent replacement versions for Windows Embedded -- which are based on Windows 10 -- have some limitations. Here's what you need to know.

what it takes to become an application security engineer cover

What it takes to become an application security engineer

Application security engineers earn more money than application engineers and are in high demand, but the job requires additional training in security.

MicroPro - WordStar ad

10 fun tech ads through the years

80 Mbytes of storage for less than $12,000! boasts one ad. In another, a woman in hot pants touts a modem that's "maybe even sexy." These were too much fun not to share.

email encryption

Top 5 email security best practices to prevent malware distribution

With email representing an open, trusted channel that allows malware to piggyback on any document to infect a network, it’s often up to the organizations – their security teams and employees – to adopt appropriate security strategies...

vendor divests 1

10 things to worry about when your vendor divests

Although your vendor’s divestiture is out of your control, you can at least do your due diligence in limiting any negative impact to your company. With that in mind, ZL Technologies lists 10 things you should worry about if your...

man standing out crowd individual

Hiding in plain sight: 4 places to find cybersecurity talent in your own organization

Organizations are missing opportunities to cultivate inside talent who may lack experience but already know the business and have the fundamental skills to succeed in cybersecurity.

windows 10 hidden revealed

10 hidden features in the new Windows 10 Creators Update

Microsoft is also adding several under-the-covers changes that may not be as showy, but are equally important. They affect the underlying way that the OS works, and how you may use it on a more technical level. Here are 10 that you...

corporate culture

How the company culture can make or break your business

If you don't build a strong culture in your organization, one will appear anyway -- and it likely won't serve your company well.

Employee handcuffed to keyboard

6 terrible tech managers — and how to succeed despite them

From the Know It All to the Overwhelmer, succeeding beneath a bad manager takes strategy and finesse

cloud data binary pixabay

Expert tips for managing your cloud data

Yes, security is important, but so are networking, governance, data formatting and other technical issues.

Career roadmap

Follow these career roadmaps to 7 hot IT jobs

What skills, education and experience do you need to land some of today’s hottest IT jobs? Find out in this free report from the editors of CIO.com.

eye on computer monitor showing privacy security or breach

Top 5 VPN services for personal privacy and security

If you regularly travel or work remotely, you need to use a VPN or you're putting yourself — and your data — at risk. Here's a look at the options and price plans for some of the top VPNs.

FCC

Broadband privacy: What happened, what it means and what you can do

When Congress revoked FCC's broadband privacy rules, ISPs relaxed and privacy advocates cried foul. This collection of Computerworld articles explains the issues.

resume makeover executive

IT Resume Makeover: Find focus by building a theme

The longer your career, the more difficult it can be to pull out the right details to create a focused resume. Finding a common theme that runs through your experience can help guide the process.

sd card comparison 2005 2014 2016

CW@50: Data storage comes into its own

The invention of thin-film heads, the rise of storage competitors, and the landscape as it exists today.

Load More