How-Tos

15 tricky job interview questions -- and how to nail them
internet security risk public domain web

1 incident response police tape crime death

Incident response is like tracking down a perpetrator

What is incident response? Larry Zulch, President & CEO, Savvius, walks us through the crime scene.

allo selfie stickers

How to make and send selfie stickers in Google Allo

The latest update to Google's Allo messaging app lets you create stickers in your likeness and send them to your friends. Here's how to do it.

netflix g6 hdr

How to watch Netflix movies in HDR and Dolby Vision on your LG G6 right now

The newest version of the Netflix app ushers in support for HDR and Dolby Vision content on the LG G6. Here's how to get it up and running on your phone.

webinar marketing primary

11 tips to create a must-see webinar

Experts discuss how to put together and market an online seminar that will attract prospective customers and hold their attention.

himss omb image microsoft health IT

Health tips for Unix systems

Things to watch and tools to use to make sure your Unix/Linux systems maintain their health and vigor

Computerworld Cheat Sheet - Microsoft Excel 2016

Excel 2016 cheat sheet

Are you getting the most from Microsoft Excel 2016? Get to know the key new features.

0 iot intro smart appliances

Six things you need to know about IoT security

It’s in every company’s best interest to “do” IoT correctly, which will mean ratcheting up security measures to capture and ensure a good customer experience. Jack Nichols, director of product management at Genesys, proivdes six ways...

google home start up

How to use Google Home's built-in ambient audio to get some rest and relaxation

A new feature for Google Home lets you listen to ambient sounds while you fall asleep. Here's how to get it to work.

split company primary2

Why one CIO chose ‘speed over elegance’ in corporate split

Tony Bender discusses the mindset he adopted when preparing IT to split off Energizer Holdings from Edgewell Personal Care, owner of brands such as Schick, Playtex and Hawaiian Tropic.

1 tracking hunting dogs horse

Pitfalls of identity access management

Whether dealing with a third parties access or tracking an insider through your network, action needs to be taken to see who goes where. Too few organizations treat IAM as the crucial, secure connective tissue between businesses'...

unix mug commands linux

10 Unix commands every Mac and Linux user should know

Get started with Bash, Unix pipes, directory navigation, sudo, Nano, and other command-line essentials

google maps edit roads

Here's how you can edit roads right in Google Maps

Google recently added the ability to edit road segments in Maps for Android and on the web, but it's not so easy to find. Here's how to do it.

0 intro strikeout baseball

How to strike ransomware out

Carbonite created this list of 10 important ransomware prevention tips and best practices.

amazon freetime

Here's how to use FreeTime, Amazon's answer to Google's Family Link parental control app

Previously only available on Amazon devices, the FreeTime app for Android lets parents control what their kids can see on their phones and how long they can use them.

executive pointing to video play button icon

How to produce a must-see small business video

Video experts and small business owners share their tips for creating videos that grab and keep viewers’ attention and offer advice on how and where to showcase them.

2 meetings

15 ways to make meetings more productive

Business and HR experts share their top tips on what managers can do to improve meeting attendance and make them more constructive.

08 strategy

How to connect business strategy with project management

Making the connection between your business strategy and project management isn't easy, but it is necessary if projects are going to serve a purpose and meet inherent business needs. Here are some things you can do to make the...

3 sensitive data hacker phone

How can CSOs protect their CEO?

CEOs have a high level of visibility outside the organization and attackers can leverage the data they collect as a way to target them for cybersecurity attacks. Organizations can help protect your CEO from cybersecurity attacks by...

Load More