Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

3 bitcoin

Would killing Bitcoin end ransomware?

Bitcoin and ransomware seem to go hand-in-hand, but experts explain that doing away with the cybercurrency would just force cybercriminals to find another anonymous way to extort money.

virtual executive

Are virtual CISOs the answer to your security problems?

Virtual CISOs can be an invaluable resource for companies with limited resources. But are they a short-term fix to a long-term problem?

windows 10 UUP

Understanding Windows 10's Unified Update Platform

Since UUP was introduced in December, it's gotten faster, more robust and much more stable. By the time the Windows 10 Creators Update comes around, it should indeed be ready for prime time.

chris mcnabb
Q&A

Dell Boomi bringing startup mentality to hybrid cloud market

In this installment of the IDG CEO Interview Series, CEO Chris McNabb talks about why Dell Technologies kept Dell Boomi in the fold and how the company operates as a startup within the Dell ecosystem.

winner medal contest victory

Review: Visual Studio 2017 is the best ever

Visual Studio 2017 is not only smaller and faster, but armed for many more use cases than previous versions.

Computerworld - March 2017 digital edition [cover]

Read Computerworld’s March digital magazine!

In this edition: The 2017 Premier 100 Technology Leaders: IT in the driver’s seat; Microsoft’s Windows 10 user base may be stuck at 400 million; opinion about data’s importance by Thornton May; and more.

windows

Review: Deep dive into Windows Server 2016

In this review, we will go through the various new and improved features of Windows Server 2016. We found that many of them worked as advertised, while others weren’t totally baked yet.

apple ipad (public domain)

iPad smackdown: Microsoft Office vs. Apple iWork vs. Google G Suite

Your iPad can largely function like a laptop with two of the three main office productivity suites

cloud providers battle

Battle of the clouds: Amazon Web Services vs. Microsoft Azure vs. Google Cloud Platform

With more and more workloads going to the cloud, and the top vendors being as competitive as they’ve been, deciding on which provider to go with isn’t getting any easier. This handy guide will outline the pros and cons of each...

green light in madrid go proceed traffic

The top Go language IDEs and editors

Among dozens of options for developing Go programs, Gogland, Visual Studio Code, and Cloud9 rise to the top

Computer monitor with pixelated locks for security breach

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways.

bug bounty

Why you need a bug bounty program

If you’re ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do.

jan cover

State of the CIO 2017: More challenging, still complicated

The 16th annual State of the CIO report shows that the life of the dual-role CIO is both more challenging and more rewarding. Get used to the new reality.

snail rocket fast speed

Three technologies that could demolish slow internet

Broadband internet has opened up almost unlimited possibilities for commerce, distance learning, civic participation, and knowledge sharing. But we are only scratching the surface of what's to come.

stats big data stocks analytics

Data visualization tools: The features users love and hate

It seems like making sense of data is everyone’s job now. Here are the pros and cons of five leading data visualization tools, as reported by enterprise users of the products.

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need a plan for negotiating with people who take their data hostage.

H-1B visa man entering U.S. with briefcase

Should security pros get special H-1B visa consideration?

The skills, education and experience that would garner additional merit have not been discussed publicly, but some cybersecurity leaders and industry-watchers say that special consideration should be given to H-1B visa applicants with...

employees technology planning data [Computerworld, January-February 2017 - HR IT]

HR and IT combine efforts on workforce analytics

As more companies depend on information about their employees to make crucial decisions, HR and IT are working closer together than ever before to deliver the data. 

wrestling wrestlers competition match fight

Smackdown: Office 365 vs. G Suite productivity

Can you really use Google’s G Suite instead of Microsoft Office? Here's how they compare on Windows, MacOS, iOS, Android, and Chrome OS.

paper documents files

3 enterprise-strength file sync services to check out

Popular file-sync services are great for individuals, but can lack controls for access, encryption and other services that enterprises require.

Load More