CSO's collection of videos on topics ranging from cryptocurrency to data breaches to security leadership, as well as IT security-related videos from some of Foundry's most popular virtual summits,
If you're a multi-core fan but could never afford it, think again. AMD's new Ryzen 5 and Ryzen 7 makes powerful multi-core CPUs within reach to all
In this far-ranging interview from 2001, "Father of the Internet" Vinton Cerf recalls having to "shove TCP down people's throats" and lobby for government permission to commercialize the 'Net.
Chief Digital Officer Ganesh Bell describes how GE Power followed the "digital exhaust" of its customers to capture $4 billion in new business. Exclusive 40-minute session.
Chief Digital Officer Ganesh Bell shares the three keys to a successful digital transformation and explains how GE Power turned "digital exhaust" to $4 billion in new business.
BlackBerry's new KEYone Android phone, complete with a real keyboard, could win back some of its enterprise customers.
Is it time to trade in your mobile device? If you're considering an Android smartphone, Samsung's Galaxy S8 seems to be the popular favorite but is it the right phone for you? Here, CIO.com senior writer Sarah White takes a more in-depth look at Samsung's newest offering.
Network World Cool Tools columnist Keith Shaw shows off four gadgets (two sleep trackers, two noise machines) that can help you get more or better sleep at night.
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks via Skype with Michael A. Davis, the CTO of behavioral analytics company CounterTack. The two discuss why machine learning is so important to CSOs and CISOs, even if they themselves are not particularly investing in such technology for their own security systems.
Employees are often the weakest link in your company's security chain. But with a little knowledge and foresight you can mitigate the risks. In this video, CIO.com senior writer Sharon Florentine explains the anatomy of a phishing scam and how you and your workers can avoid becoming a victim.
CIO.com writer, Sarah White looks at 6 portable keyboards for IT pros that want a light easy-to-use keyboard that can go anywhere.
The Galaxy S8+ is Samsung's first major phone release since the Note7 debacle, but does it live up to the hype?
With the market of fitness wearables growing fast, CIO.com contributor Jim Martin looks at the Fitbit Alta HR to see where this device fits.
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild sits down with Sanjay Raja from Lumeta, a network and performance monitoring company. The two discuss how CSOs and CISOs can get a handle on the explosion of new devices entering the network and how to make sure those devices are secured.
In this animation, Network World explains some of the concepts of serverless computing, and how it represents the next phase of cloud computing for Internet of Things applications and products.
Follow the beeps to find your missing AirPods.
The BeatsX are more comfortable than the AirPods, and last longer...but do they look as cool?
CSO Online's Steve Ragan and Joan Goodchild chat about the hot security news of the week, including their take on the recent WikiLeaks revelations around the CIA, and how Cisco, Samsung and Apple have responded to the information.
By the time Computerworld was born in 1967, IBM was well established as the kingpin for computer storage. But over the next five decades, that changed dramatically as new companies rose and fell, storage capacities soared and costs plummeted.
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild sits down with Jeff Fagnan from Accomplice, a venture capital and private equity firm in Cambridge, Mass. The two discuss the current state of VC funding in security companies and where the money is going (and not going), and why CSOs should "follow the money."
Network World editors Keith Shaw and Brandon Butler compete against each other to see who can recite more digits of Pi in honor of Pi Day. Which editor wins and gets to put a pie in the face of the loser?
CSO’s Fahmida Rashid and Zscaler's Senior Director of Security Research, Deepen Desai, take a deep dive into the recent rise of malware using SSL/TLS to encrypt their activities.
CIO.com senior writer Sarah White demonstrates what it takes to get your mobile hotspot access working so you can hit the open road.
On the road and need to connect for work? No worries, because CIO.com senior writer Sarah White, has you covered. In this video she demonstrates what it takes to turn your 4G enabled Android device into a a mobile wireless hotspot.
To celebrate the 2017 Pi Day, Network World editors Brandon Butler and Keith Shaw are preparing for the Network World Pi Day Challenge. Who can recite more digits of Pi? The winner gets to put a pie into the face of the loser. Streaming live on Facebook and YouTube at 2 pm ET on March 14, 2017.
Every year on March 14, math geeks and others celebrate Pi Day. Here are the basics of the beginnings of the celebration and other interesting facts around this new holiday.
Computerworld's Premier 100 tech leaders share pointers on how to sell digital transformation within IT and across the organization (hint: say goodbye to hierarchies).
CIO.com senior writer, Sarah White digs into recent research to look at the impact employee engagement has on your business and the economy as a whole.
Venerable smartphone brands Motorola, Nokia and BlackBerry got new life at Mobile World Congress 2017, largely due to the influence of Chinese and Finnish manufacturers that licensed the names.
Matt Gangwer, CTO of Rook Security and Ryan O'Leary, VP of Threat Research Center and Tech Support at WhiteHat Security join CSO Online's Steve Ragan to talk about the evolution of ransomware, and what companies need to do to combat it.
Porsche Design's Book One turns a laptop into an expression of beauty, money, and power.
CIO contributor Jim Martin tries out three of the easier to use fitness trackers for those who want something that doesn't require a steep learning curve.
At RSA 2017, security expert Konstantin Karagiannis (CTO at BT North America) gives Network World an overview of blockchain security and how it could help shape the future of cybersecurity.
Does Dell's XPS 13 2-in-1 have what it takes to get you through you a full day of demanding work, streaming video and social media posting? CIO.com senior writer Sarah White runs Dell's newest hybrid through the paces to find out the answer.
Tech leaders face mounting uncertainties in cybersecurity and Generative AI. This panel session offers vital insights for tech leaders to protect their organizational data. Drawing upon real-world experiences and industry expertise, our panelists will underscore the imperative for adaptability and proactivity in the face of dynamic threats. With tech and cyber talent shortages exacerbating vulnerabilities, the stakes have never been higher. Panelists will discuss warning signs, stressing adaptability and proactivity against evolving threats. Join us for actionable guidance on cybersecurity infrastructure and resilience in a digital era.
After infecting a system with Locky Ransomware, CSO attempted to recover it using basic tools and backups
If you're hunting for compact laptop with solid performance, HP’s revamp of its excellent convertible is a great option.
The AirPods sound great, work well, and stay put—we put them to the headbanging test.
John Gallant, Chief Content Officer for IDG Enterprise, sits down with Kirill Tatarinov, CEO of Citrix, to discuss the company’s vision and transformation over the past year.
These four gifts for gadget lovers are guaranteed not to be re-gifted.
CIO.com's senior writer Sarah White puts this updated Surface Book with Performance Base through its paces to see what this thoroughbred device can do.
Cloud adoption continues to move ahead, transitioning from being an emerging technology to a mainstream powerhouse. Here are some results from the latest IDG Enterprise survey of more than 900 IT decision makers about their cloud usage.
With its innovative, contextual, customizable controls, the Touch Bar makes the new MacBook Pros worth buying.
Fitbit's newest wearable is ideal for fashionistas and swimmers.
The infrastructure cloud computing world is dominated by vendors like Amazon Web Services, Microsoft Azure and Google Cloud, so is there room for startups? ClearSky Data in Boston thinks so. The company launched in 20 14 and helps customers manage primary data on premises in the cloud. Network World's Brandon Butler recently visited ClearSky to talk to the founders about what it's like to be a startup in the cloud.
The top three reasons why Charge 2 is Fitbit’s best activity tracker yet.
Apple improved almost everything about the iPhone 7, from the processor to the camera. Then they took away the headphone jack. Do the iPhone 7’s drawbacks ruin the experience?
CIO.com's Rich Hein spoke to seasoned IT leaders to learn the ways in which they foster a workplace culture that values and rewards innovation.
CIO.com's Sarah White explores Huawei's most recent tablet design to see how it competes in this growing market of Windows 10 hybrids.
Panelists at the AGENDA16 conference discuss how efficient core systems help fund innovation.
Your USB drive isn't slow because you have too much stuff on it. It's slow because it uses a slow storage format like FAT32 or exFAT. You can re-format it to NTFS to get faster write times, but there is a catch.