Features

IT Salary Survey 2017 - salaries hold tight 1a
Computerworld IT Salary Survey 2017 highlights

Best Bluetooth speaker

Best Bluetooth speakers

We'll help you find the best wireless speakers for pairing with your smartphone or tablet—whatever your budget, and whatever music floats your boat.

sdn automate

SDN solves a lot of network problems, but security isn't one of them

As the digital enterprise struggles to find the best security solutions to defend their ever-expanding networks, many are looking to next generation tools that offer interoperability capabilities.

tech soft skills

6 soft skills employers should be looking for in tech talent

LinkedIn's Jennifer Shappley shares how she sources for soft skills and what to look for in your own candidates.

small businessmeeting copy

Why SMBs need to get project management right from the start

Project management products aren't just for big business. With increasing competition and the always-changing digital landscape, it's important for small businesses to take the grunt work out of critical business processes.

mbp13 v xps15

Switching from Mac to PC, Part 3: The software challenge

When you switch from Mac to PC, you’ll be leaving some software behind. We've found some solid replacements.

Alternative facts: 9 falsehoods programmers believe

9 lies programmers tell themselves

Confidence in our power over machines also makes us guilty of hoping to bend reality to our code

bob friday mist

Mist CTO Bob Friday: 'Beacons are reaching critical mass'

With a wealth of experience in the field, Friday explains how his company is inventing and bringing to market virtual BLE beacons.

video

Building virtual PCs in PC Building Simulator

PC Building Simulator says it teaches you how to build your own computer. Is it true? PCWorld's PC gurus put it to the test.

gamification customer loyalty5

How gamification improves customer engagement and retention

Marketing pros and business owners share tips on how to use gaming techniques to attract, educate and retain customers -- and sell more stuff.

Hand reaching out considering job candidates

Why building candidate personas helps you hire the right talent

Learn how using candidate personas can improve the diversity of your candidate pool when sourcing and recruiting.

IRS

IRS makes tax refund scams harder but W-2 phishing attacks continue unabated

Anti-fraud measures by the Internal Revenue Service (IRS) and state agencies over the past two years have made tax refund scams harder for cyber criminals to pull off even as attacks targeting taxpayer information continue unabated.

mass effect andromeda 3

Why I'm addicted to Mass Effect: Andromeda's gorgeous, secret Nvidia super-screenshots

Nvidia's Ansel screenshot tool and Mass Effect: Andromeda's gorgeous graphics are a match made in art geek heaven.

China Mobile 4G

How to choose a prepaid mobile data plan

Pre-paid data SIM cards are a great way to get 4G LTE data on a device without paying for a long-term contract. Here are seven options if you're looking for a contract-free, pre-paid SIM card for your unlocked smartphone or tablet.

offline

How to prep your phone for offline use

The internet isn’t quite everywhere yet, so here’s what you need to do to survive your next commute, flight, camping trip, or whenever you want to disconnect.

Going rogue! 10 scary examples of AI gone wild

Danger, danger! 10 alarming examples of AI gone wild

Our dystopian future of machine learning breaking bad is already unfolding before our eyes

Hard drive SD card comparison

CW@50: Data storage goes from $1M to 2 cents per gigabyte (+video)

Over the past 50 years, data storage development has blown past barrier after barrier to give us denser, higher-capacity hard drives (and flash storage) at ever-cheaper costs.

voice assisted devops4

Why AI will rule all UIs

Voice-controlled assistants are proliferating and opening them to third-party app makers is proving to be a key to success — for some assistants more than others.

1 threat intro

These 10 people may be your greatest inside security risks

Last year was the worst on record for information security incidents, and the majority of those were due to inside sources, many studies agree. Prime suspects are employees and contractors with privileged user access.

Load More