Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Register now!

bestandroidphones
Getting the job when you're overqualified

erp

The ERP upgrade conundrum: How to calculate the true cost

If you use an old on-premise financial management solution, you have a difficult decision to make over the next few years: do you upgrade the application one last time and get a few more years out of it or move to a modern cloud...

speech bubble

Java 101: Deciding and iterating with Java statements

Learn how to use statements like if, if-else, switch, and while to specify expression, make decisions, and iterate in your Java programs.

Executive weighing pros and cons

Why R? The pros and cons of the R language

Package ecosystem and graphics are strengths; security and memory management are weaknesses.

Microsoft Word 2013: Cheat Sheet

Word 2013 cheat sheet

Learn to find your way around Microsoft Word 2013 and get the most out of its features.

workforce future

How CIOs can create the IT workforce of the future

Today’s businesses are more dependent on technology than ever. For CIOs this is a change-or-be-changed scenario -- a call to action to guide their businesses and shape the IT workforce.

security ciso

How CISOs can create security KPIs and KRIs

The Information Security Forum recommends that CISOs take a four-step approach to creating key performance indicators (KPIs) and key risk indicators (KRIs) to support informed decision-making.

Inside the bold plan to bring gigabit fiber to Detroit

One startup is bringing a Google Fiber-like broadband offering to Detroit. Here's why that might not be as crazy as it sounds.

battle war fight

Who's winning the mobile payments war?

It’s still early, but Apple seems to be gaining momentum. Other players to watch: Google, PayPal, Walmart, Microsoft.

lock security breakthrough

Review: Breakthroughs in endpoint security

In our recent roundup of anti-virus programs, we discovered several new techniques being employed by anti-virus companies to make PCs safer against advanced threats.

skype for business desktop sharing

A look at the new Microsoft Skype for Business Server 2015

Most of the action happens behind the scenes, in the server-side plumbing.

Which way to management?

The programmer's guide to breaking into management

The transition from command line to line-of-command requires a new mind-set -- and a thick skin

sharing business secrets

The dirty secrets of project management revealed

Thousands of project managers are in a mad rush to push IT projects live on July 1. Why are PMs more than willing to go over budget than miss a deadline?

lifebuoy on wooden wall rescue overboard preserver saver

Upgrading Windows Server 2003: The procrastinator's guide

Yes, this is something you really need to get going on. Here are some factors to consider in your planning.

cwjuly2015 klossner microsoft automotive cartoon

Microsoft at a crossroads in the automotive tech market

Microsoft is being squeezed out of the in-vehicle infotainment business, but it's by no means giving up on the automotive industry. It may have a future as an OS-agnostic provider of cloud-based services.

A sign that says Advice

Welcome to the workforce: Advice for new programmers

Veteran software developers share the lessons they’ve learned over the years about how to successfully navigate the professional coding business.

Securing SQL Server

SQL Server remote access setup guide

In this free PDF download, you'll get step-by-step instructions for setting up VPN access to SQL Server. Securing SQL Server: Protecting Your Database from Attackers. -->

motivation

Morale boosters: 5 proven ways to motivate your IT team

Disengaged teams foster a toxic and unproductive work environment. When motivation slips, here’s what you can do to get staff back on track.

hacker group

Cybercrime: Much more organized

Estimates vary on how deeply organized crime has penetrated the world of cybercrime, but most experts agree that it is on the rise. How best to counter it is still a matter of discussion.

Load More