This year's MWC was mainly about 5G networking. And foldable phones. In fact, it was the foldables that stole the show, according to PC World's Michael Simon. He and Computerworld Executive Editor Ken Mingis chew over both topics in this episode of T...
The ongoing battle between the U.S. and Huawei could soon go to court as Huawei reportedly prepares to sue the U.S. government. Plus, 2019 will see ride sharing companies going public… but which will be first? And as a decade-old malware resurfaces...
When you hear “R package,” you may think something to share with other people. But an R package can also be a good way to organize your own work
Learn the key aspects of today's data center, from hyperconvergence to flash storage to hybrid connections.
New 5G phones have been unveiled at Mobile World Congress in Barcelona, but will users even be able to access 5G networks? And another country rejects U.S. allegations that Huawei spies on users. All that and more on today’s episode of TECH(feed).
Samsung kicked off a busy week for mobile devices with the Samsung Galaxy S10 line-up, just ahead of this year's Mobile World Congress. That makes it a perfect time to talk about the S10, foldable phones and 5G networking.
Pinterest is cracking down on the spread of misinformation, a new report reveals why smartphone sales are declining, Apple tests self-driving cars and Android devices may soon become passwordless. We’ll dive into all of these topics on today’s ep...
How will the impending Brexit decision impact data privacy, sharing and regulations? IDG U.S. and U.K. Editorial director Matt Egan talks with TECH(talk) hosts Ken Mingis and Juliet Beauchamp about the March 29 deadline -- the politics, the planning ...
What should you expect at this year's RSA Conference? Security reporter J.M. Porup and TECH(talk) host Juliet Beauchamp talk about the hot topics and sessions to look for at the March 4 to 8 gathering in San Francisco.
Cryptocurrency is headed for the enterprise, data breaches are down and Apple will soon launch video streaming platform. Want to learn more about any of these topics?
While R is a useful language, Python is also great for data science and general-purpose computing. See how to run Python code within an R script and pass data between Python and R
Use these Windows registry key changes and fixes to protect your systems from known side channel vulnerabilities.
The yearly release of a new version of Android always causes a hopeful stir among users. But most of them have to wait months, or even longer, to get the update on their devices.
An Android security flaw could leave your phone vulnerable to hackers while viewing images. And yes, we're talking more about Huawei's battle with the U.S. government. All that and more mobile news on today's episode of TECH(feed).
How to keep your business running in the event of an emergency or disaster.
5G networks are coming soon, but what obstacles will companies face while building the necessary infrastructure? And what will be the next start-up to reach unicorn status? All that and more on today’s episode of TECH(feed).
What's ahead for Internet of Things technology in 2019? Prepare for more location-based advertising, warehouse robotics, and concepts such as the no-line, no-checkout Amazon Go store.
In this Linux tip, we look at the hostnamectl command. It’s a command that provides information on a particular system – including but not limited to its hostname – and even allows you to make some changes.
Slack preps for IPO, Google’s quarterly report, and how the spread of false information online could be a threat to all of us. All that and a bit more on today’s episode of TECH(feed).
With smartphone sales slowing – even for the iconic iPhone – have we reached 'peak smartphone'? And if so, how does the industry innovate its way out of the funk?
Use these basic settings to make it harder for attackers to Windows hardware.
Today's episode delves into Amazon's revenue, Facebook and Apple's dispute, and more.
J.M. Porup, senior writer at CSO online, joins Juliet on this week's episode of TECH(talk) to discuss trends in ransomware, IoT security and enterprise cybersecurity roles.
In this tip, we look at the pstree command. It allows you to get a listing of running processes that clearly indicates the relationship between them.
Today's episode features more on Apple’s first-quarter report, news that Google and the Internet Advertising Bureau are profiling users, collaboration software spending, and more problems for Huawei.
Configure Office 365 to detect email-delivered malware.
Today's episode explores blockchain payments, smartphone sales and Google's fine from the European Union.
The year started off with a bang for several companies that make collaboration software. Here's what's been going on with Microsoft Teams, G Suite and others since the start of 2019.
Guest host Juliet Beauchamp and CSO senior writer J.M. Porup talk about the challenges around securing the systems and networks used to control industrial plants and infrastructures.
This RStudio Addins tutorial shows step by step how to create an addin for the RStudio IDE
Following the Center for Internet Security’s benchmarks and checklists, here’s how to configure Microsoft Office 365 for the security level you need.
Google's foray into cellular networking lets it deliver wireless access that can undercut rivals like AT&T and Verizon. Here's an explainer on what Google Fi is and does.
See how well you’re achieving daily goals with a color-coded calendar made in R
When some new iPad owners found their devices were bent, Apple acknowledged the issue and said, in essence, 'no problem.' Then the company announced revenues would fall short of expectations. What the heck is going on?
Make sure Microsoft Office 365 logging and auditing is set up properly so forensic data is available when needed.
Guest host Juliet Beauchamp talks with senior writer J.M. Porup about the newly created cybersecurity insurance industry, and how a policy could fit into an organization's overall security strategy to help minimize risk.
In 2018, blockchain boosters touted the distributed ledger technology as a game-changer. Maybe so, but not yet. Here's how it evolved last year and where it's going in 2019.
Find security scripts, compliance and other Windows resources.
Set data loss prevention policies in Windows 10 to prevent data leakage.
Set Office 365 Advanced Threat Protection policies to block known malicious URL addresses.
Discover an easy way to use key-value pairs in R
Follow these steps to enable multi-factor authentication in Office 365 for more secure log-ins.
Set up Office 365 to defend against hackers who use hidden Outlook rules to forward emails.
In this episode, host Maryfran Johnson talks with Elizabeth Hackenson, CIO at Schneider Electric, about talent acquisition, Schneider Electric's new capabilities on mobile devices, and the value of having a "healthy paranoia" about potential industry...
Allow devices to share and distribute updates across a network without having to rely on Windows Software Update Services.
Learn an easy method to use key-value pairs in R
Learn how to create a script that will install security and other feature updates at a specific time
IDC analyst Joe Pucciarelli shares insights on the most relevant global trends and key predictions impacting CIOs, IT professionals and their organizations.
In this episode, host Maryfran Johnson talks with Vince Kellen, CIO, University of California at San Diego, about data science, cloud computing and the future of the online learning space.
Windows 10 update settings are varied and at times confusing. Here is an exact list of the settings that control when updates will automatically run.