Tutorials »

  • How to get security right when embracing rapid software development

    Five steps to reduce risk while moving to continuous updates

  • 12 time-saving tips for the Chrome Android browser (with video)

    Become a mobile browsing pro with these little-known tips for Google's Chrome browser for Android.

  • 4 overblown Windows 10 worries

    There are a lot of alarms going off about Windows 10's effect on your security and privacy. We look at the four top concerns to find out whether they're true or not, and tell you what you can do about them.

  • Securing the enterprise digital footprint

    You need to continuously discover unknown digital assets, maintain an inventory of these assets, monitor for threats and engage to remediate risks as they appear

  • Bloatware: What it is and how to get rid of it

    Many Windows PCs are sold laden with unnecessary -- or even harmful -- software. We look at what you might find on your new system and how to get rid of it.

  • The smart user's guide to getting better tech support

    As a user, you can do four things to get issues resolved faster and more completely

  • The shocking truth about Proactive intelligence in iOS 9

    Proactive is Apple’s name for an intelligent iOS 9 technology wants to help you get things done – but shockingly it tries to keep your private life private.

  • Flash click-to-play on Chrome breaks Ticketmaster

    Chrome users can not buy tickets at Ticketmaster if they did the Defensive Computing thing and configure Flash for click-to-play.

  • How to embrace open source tools in the enterprise

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

  • Video how-to: Speed up R with C++ and Rcpp

    Sometimes when using R, you'll want more speed than base R can offer. That's why some advanced R users combine R and C++ -- and there's a package that makes it easy for you do so, too.

  • Everything you need to know about Windows 10

    Windows 10 has been one of the most anticipated Windows releases in Microsoft history -- especially given the <a href="http://www.computerworld.com/article/2948467/emerging-technology/good-riddance-windows-8.html">issues with Windows 8</a>, the result of Microsoft's decision to build an operating system that works on both touch and non-touch systems.

  • Word 2013 cheat sheet

    The buzz today may be all about Office 2016 for Windows, which is due to be released this fall, but many business users are still getting acquainted with Office 2013 and will continue to use it for some time. Use this Word 2013 cheat sheet to help take advantage of all it has to offer.

  • 5 steps to transform support services

    <em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

  • Closing the security loop with automated incident response

    <em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

  • Preparing for your Windows Server upgrade

    <em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

  • Breach detection: Five fatal flaws and how to avoid them

    IT Security today is not about defending a (non-existent) perimeter, but about protecting the organization's attack surface, which has changed dramatically due to the cloud, mobility, BYOD, and other advances in corporate computing that have caused fundamental shifts in network architecture and operations.

  • How to check your Docker container - video

    Once you've configured a Docker container, you'll probably want to see how it's configured. In this video excerpt from the Pearson/Addison-Wesley training course <a href="http://www.informit.com/store/docker-containers-livelessons-9780134096131">"Docker Containers LiveLessons"</a>, Christopher Negus will show you how to use commands such as

  • Beyond Alerts: Using orchestration to realize network self-healing

    Managing modern networked systems and applications is daunting because infrastructure is complex and things can go wrong in so many parts of the technology stack -- servers, storage, network devices, applications, hypervisors, APIs, DNS, etc. How can you address the challenge?

  • How to make shortcuts to Windows 10 settings on your Desktop

    Want to see Windows 10's log of your I/O usage -- the Data Usage app in Settings -- by simply clicking or tapping on the Desktop? Enable or disable your microphone with two clicks? Turn off your webcam? Manage your Wi-Fi settings? It's easy.

  • Digging Deeper into the Cisco ASA Firewall REST API

    Security orchestration methods and of course SDN is driving the need for programmable interfaces in  security products.  The Cisco ASA Firewall added a REST API back in December with the 9.3(2) code release.  I've asked Mason Harris, from Cisco, to write up a quick how-to primer on the ASA API capabilities.  Thank you Mason for the great information.

  • Disrupt or be disrupted in the digital economy

    The reality is that there is an urgent need for today’s enterprises to drive their digital transformation, especially if they do not want to be disrupted in their industry.

    SAP

    SAP is at the centre of today’s technology revolution. The market leader in enterprise application software, SAP helps organisations fight the damaging effects of complexity, generate new opportunities for innovation and growth, and stay ahead of the competition