Tutorials »

  • Bloatware: What it is and how to get rid of it

    Many Windows PCs are sold laden with unnecessary -- or even harmful -- software. We look at what you might find on your new system and how to get rid of it.

  • The smart user's guide to getting better tech support

    As a user, you can do four things to get issues resolved faster and more completely

  • The shocking truth about Proactive intelligence in iOS 9

    Proactive is Apple’s name for an intelligent iOS 9 technology wants to help you get things done – but shockingly it tries to keep your private life private.

  • Flash click-to-play on Chrome breaks Ticketmaster

    Chrome users can not buy tickets at Ticketmaster if they did the Defensive Computing thing and configure Flash for click-to-play.

  • How to embrace open source tools in the enterprise

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

  • Video how-to: Speed up R with C++ and Rcpp

    Sometimes when using R, you'll want more speed than base R can offer. That's why some advanced R users combine R and C++ -- and there's a package that makes it easy for you do so, too.

  • Everything you need to know about Windows 10

    Windows 10 has been one of the most anticipated Windows releases in Microsoft history -- especially given the <a href="http://www.computerworld.com/article/2948467/emerging-technology/good-riddance-windows-8.html">issues with Windows 8</a>, the result of Microsoft's decision to build an operating system that works on both touch and non-touch systems.

  • Word 2013 cheat sheet

    The buzz today may be all about Office 2016 for Windows, which is due to be released this fall, but many business users are still getting acquainted with Office 2013 and will continue to use it for some time. Use this Word 2013 cheat sheet to help take advantage of all it has to offer.

  • 5 steps to transform support services

    <em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

  • Closing the security loop with automated incident response

    <em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

  • Preparing for your Windows Server upgrade

    <em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

  • Breach detection: Five fatal flaws and how to avoid them

    IT Security today is not about defending a (non-existent) perimeter, but about protecting the organization's attack surface, which has changed dramatically due to the cloud, mobility, BYOD, and other advances in corporate computing that have caused fundamental shifts in network architecture and operations.

  • How to check your Docker container - video

    Once you've configured a Docker container, you'll probably want to see how it's configured. In this video excerpt from the Pearson/Addison-Wesley training course <a href="http://www.informit.com/store/docker-containers-livelessons-9780134096131">"Docker Containers LiveLessons"</a>, Christopher Negus will show you how to use commands such as

  • Beyond Alerts: Using orchestration to realize network self-healing

    Managing modern networked systems and applications is daunting because infrastructure is complex and things can go wrong in so many parts of the technology stack -- servers, storage, network devices, applications, hypervisors, APIs, DNS, etc. How can you address the challenge?

  • How to make shortcuts to Windows 10 settings on your Desktop

    Want to see Windows 10's log of your I/O usage -- the Data Usage app in Settings -- by simply clicking or tapping on the Desktop? Enable or disable your microphone with two clicks? Turn off your webcam? Manage your Wi-Fi settings? It's easy.

  • Digging Deeper into the Cisco ASA Firewall REST API

    Security orchestration methods and of course SDN is driving the need for programmable interfaces in  security products.  The Cisco ASA Firewall added a REST API back in December with the 9.3(2) code release.  I've asked Mason Harris, from Cisco, to write up a quick how-to primer on the ASA API capabilities.  Thank you Mason for the great information.

  • Android tune-up: How to boost performance while you wait for Lollipop

    Android 5.0 Lollipop has been heralded as the operating system's biggest step forward to date. Improved battery life and performance through changes to Android's core runtime and power management systems are among the most anticipated enhancements among users, given their promise of a faster, more efficient experience."

  • FREAK attack: How to keep your code secure

    <em>Bill Weinberg, Senior Director, Open Source Strategy,</em> <a href="http://www.blackducksoftware.com">Black Duck Software</a>

  • Doxxing defense: Remove your personal info from data brokers

    Many women gamers and developers, as well as those who support them, havelately come under attack from online trolls. A common intimidation tactic that trolls use is "doxxing," or publicly exposing their targets' personal details, including home address, phone number and even financial records.

  • 10 more do's and don'ts for faster SQL queries

    Everyone wants faster database queries, and both SQL developers and DBAs can turn to many time-tested methods to achieve that goal. Unfortunately, no single method is foolproof or ironclad. But even if there is no right answer to tuning every query, there are plenty of proven do's and don'ts to help light the way. While some are RDBMS-specific, most of these tips apply to any relational database.

  • CIOs are finding agility through cloud-based communications

    Companies grappling with new customer expectations turn to Communication-as-a-Service model (CaaS) for a more agile, cloud-based omnichannel experience.

    Interactive Intelligence

    Interactive Intelligence is a global provider of enterprise-grade collaboration, communications and customer engagement software and cloud services that help customers improve service, increase productivity and reduce costs.