Tutorials »

  • Word 2013 cheat sheet

    The buzz today may be all about Office 2016 for Windows, which is due to be released this fall, but many business users are still getting acquainted with Office 2013 and will continue to use it for some time. Use this Word 2013 cheat sheet to help take advantage of all it has to offer.

  • 5 steps to transform support services

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

  • Closing the security loop with automated incident response

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

  • Preparing for your Windows Server upgrade

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

  • Breach detection: Five fatal flaws and how to avoid them

    IT Security today is not about defending a (non-existent) perimeter, but about protecting the organization's attack surface, which has changed dramatically due to the cloud, mobility, BYOD, and other advances in corporate computing that have caused fundamental shifts in network architecture and operations.

  • How to check your Docker container - video

    Once you've configured a Docker container, you'll probably want to see how it's configured. In this video excerpt from the Pearson/Addison-Wesley training course "Docker Containers LiveLessons", Christopher Negus will show you how to use commands such as

  • Beyond Alerts: Using orchestration to realize network self-healing

    Managing modern networked systems and applications is daunting because infrastructure is complex and things can go wrong in so many parts of the technology stack -- servers, storage, network devices, applications, hypervisors, APIs, DNS, etc. How can you address the challenge?

  • How to make shortcuts to Windows 10 settings on your Desktop

    Want to see Windows 10's log of your I/O usage -- the Data Usage app in Settings -- by simply clicking or tapping on the Desktop? Enable or disable your microphone with two clicks? Turn off your webcam? Manage your Wi-Fi settings? It's easy.

  • Digging Deeper into the Cisco ASA Firewall REST API

    Security orchestration methods and of course SDN is driving the need for programmable interfaces in  security products.  The Cisco ASA Firewall added a REST API back in December with the 9.3(2) code release.  I've asked Mason Harris, from Cisco, to write up a quick how-to primer on the ASA API capabilities.  Thank you Mason for the great information.

  • Android tune-up: How to boost performance while you wait for Lollipop

    Android 5.0 Lollipop has been heralded as the operating system's biggest step forward to date. Improved battery life and performance through changes to Android's core runtime and power management systems are among the most anticipated enhancements among users, given their promise of a faster, more efficient experience."

  • FREAK attack: How to keep your code secure

    Bill Weinberg, Senior Director, Open Source Strategy, Black Duck Software

  • Doxxing defense: Remove your personal info from data brokers

    Many women gamers and developers, as well as those who support them, havelately come under attack from online trolls. A common intimidation tactic that trolls use is "doxxing," or publicly exposing their targets' personal details, including home address, phone number and even financial records.

  • 10 more do's and don'ts for faster SQL queries

    Everyone wants faster database queries, and both SQL developers and DBAs can turn to many time-tested methods to achieve that goal. Unfortunately, no single method is foolproof or ironclad. But even if there is no right answer to tuning every query, there are plenty of proven do's and don'ts to help light the way. While some are RDBMS-specific, most of these tips apply to any relational database.

  • Automate image editing with GIMP

    For a project I was recently working on I needed to remove the white background from several hundred images in PNG format and replace it with transparency. I know you can automate Photoshop but that's like getting into a Sherman tank to go shopping at your local supermarket. Another constraint (other than my reluctance to wrangle Photoshop) was the need to be able to do this in the future as part of a process to be built into a virtual machine running Linux.

  • Hacking PingPlotter, Part 2

    In the previous column on hacking PingPlotter I discussed how you can use the tool's Web interface and the curl utility to add targets to be tracked, for example, to add a single host you would enter the following on the command line:

  • How to protect yourself against privileged user abuse

    The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.

  • To get the most out of WebRTC, integrate it into existing collaboration tools

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

  • How to sort your Facebook feed by time on mobile

    Weddings. Job promotions. News articles. Facebook thinks it knows what the best stories are to drop in your news feed. But some users might want to see things their own way.

  • How to change the voice on your Android phone

    Changing the voice used for navigation on an Android phone from robotic to something more natural is easy, but buried in the menus.

  • 5 tips for data manipulation in Excel

    If you work with data much, you don't need a statistical model to predict that the odds of consistently getting data in the format you need for analysis are pretty low. Those who do a great deal of data cleaning and reformatting often turn to scripting languages like Python or specialty tools such as OpenRefine or R.

  • Key to omnichannel CX is customisation

    In order to achieve success with omnichannel customer experience strategy, companies need to utilise user personas, while maintaining excellence across all channels, according to customer transformation service expert, Brad Starr.

    Interactive Intelligence

    Interactive Intelligence is a global provider of enterprise-grade collaboration, communications and customer engagement software and cloud services that help customers improve service, increase productivity and reduce costs.

  • CIO
    ARN
    Techworld
    CMO