Tutorials

  • 4 overblown Windows 10 worries

    There are a lot of alarms going off about Windows 10's effect on your security and privacy. We look at the four top concerns to find out whether they're true or not, and tell you what you can do about them.

    25 Aug. 15 13:30 Written by Preston Gralla
  • Securing the enterprise digital footprint

    You need to continuously discover unknown digital assets, maintain an inventory of these assets, monitor for threats and engage to remediate risks as they appear

    24 Aug. 15 17:39 Written by By Elias Manousos, CEO, RiskIQ
  • Bloatware: What it is and how to get rid of it

    Many Windows PCs are sold laden with unnecessary -- or even harmful -- software. We look at what you might find on your new system and how to get rid of it.

    21 Aug. 15 13:30 Written by Preston Gralla
  • How to embrace open source tools in the enterprise

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

    14 Aug. 15 04:18 Written by Bernard Golden
  • Video how-to: Speed up R with C++ and Rcpp

    Sometimes when using R, you'll want more speed than base R can offer. That's why some advanced R users combine R and C++ -- and there's a package that makes it easy for you do so, too.

    07 Aug. 15 23:36 Written by By Jared Lander
  • Everything you need to know about Windows 10

    Windows 10 has been one of the most anticipated Windows releases in Microsoft history -- especially given the <a href="http://www.computerworld.com/article/2948467/emerging-technology/good-riddance-windows-8.html">issues with Windows 8</a>, the result of Microsoft's decision to build an operating system that works on both touch and non-touch systems.

    31 July 15 20:35 Written by Preston Gralla
  • Word 2013 cheat sheet

    The buzz today may be all about Office 2016 for Windows, which is due to be released this fall, but many business users are still getting acquainted with Office 2013 and will continue to use it for some time. Use this Word 2013 cheat sheet to help take advantage of all it has to offer.

    01 July 15 01:42 Written by Preston Gralla
  • 5 steps to transform support services

    <em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

    06 June 15 07:08 Written by By Michael Runda, Senior Vice President and President, Avaya Client Services
  • Closing the security loop with automated incident response

    <em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

    06 June 15 06:51 Written by By Cody Cornell, founder and CEO, Swimlane
  • Preparing for your Windows Server upgrade

    <em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

    06 June 15 01:07 Written by By John Abbett, Director of Advanced Technology Services, CentriLogic
  • Breach detection: Five fatal flaws and how to avoid them

    IT Security today is not about defending a (non-existent) perimeter, but about protecting the organization's attack surface, which has changed dramatically due to the cloud, mobility, BYOD, and other advances in corporate computing that have caused fundamental shifts in network architecture and operations.

    06 June 15 00:37 Written by By Lior Div, Co-founder and CEO, Cybereason
  • How to check your Docker container - video

    Once you've configured a Docker container, you'll probably want to see how it's configured. In this video excerpt from the Pearson/Addison-Wesley training course <a href="http://www.informit.com/store/docker-containers-livelessons-9780134096131">"Docker Containers LiveLessons"</a>, Christopher Negus will show you how to use commands such as

    05 June 15 19:58 Written by By Christopher Negus
  • Beyond Alerts: Using orchestration to realize network self-healing

    Managing modern networked systems and applications is daunting because infrastructure is complex and things can go wrong in so many parts of the technology stack -- servers, storage, network devices, applications, hypervisors, APIs, DNS, etc. How can you address the challenge?

    05 June 15 06:26 Written by By Ernest Mueller, APM Product Manager, Idera Software
  • How to make shortcuts to Windows 10 settings on your Desktop

    Want to see Windows 10's log of your I/O usage -- the Data Usage app in Settings -- by simply clicking or tapping on the Desktop? Enable or disable your microphone with two clicks? Turn off your webcam? Manage your Wi-Fi settings? It's easy.

    03 June 15 21:17 Written by Woody Leonhard
  • Digging Deeper into the Cisco ASA Firewall REST API

    Security orchestration methods and of course SDN is driving the need for programmable interfaces in  security products.  The Cisco ASA Firewall added a REST API back in December with the 9.3(2) code release.  I've asked Mason Harris, from Cisco, to write up a quick how-to primer on the ASA API capabilities.  Thank you Mason for the great information.

    13 May 15 07:29 Written by Jamey Heary
  • Android tune-up: How to boost performance while you wait for Lollipop

    Android 5.0 Lollipop has been heralded as the operating system's biggest step forward to date. Improved battery life and performance through changes to Android's core runtime and power management systems are among the most anticipated enhancements among users, given their promise of a faster, more efficient experience."

    06 March 15 06:23 Written by Anndrew Vacca
  • FREAK attack: How to keep your code secure

    <em>Bill Weinberg, Senior Director, Open Source Strategy,</em> <a href="http://www.blackducksoftware.com">Black Duck Software</a>

    05 March 15 07:21 Written by By Bill Weinberg, Senior Director, Open Source Strategy, Black Duck Software
  • The Internet of Things in the Real World

    The future of healthcare is a goldmine for IoT that will have an immediate impact on wellbeing.

    Avaya

    Avaya provides communications services and networking solutions to enable digital transformation for organisations across a wide range of verticals