Slideshows

CW > In Memoriam 2018 > Luminaries we lost this year [slideshow cover]

Tech luminaries we lost in 2018

Hailing from five different nations, the 13 remarkable women and men memorialized here had a lasting influence on technology and the world.

2018

The top 10 stories of 2018: Blockchain rises, open source reigns, trust wanes

Optimists can look at 2018 and point to GDPR privacy protections, the launch of blockchain business apps and the creativity of the open-source community as signs technology can lead us to a safe and prosperous future. Meanwhile,...

intro toxic boss gas mask

10 toxic traits of bad bosses

If you recognize your boss (or even yourself) among these examples — well, at least you're not alone.

2 industrial iot utility nuclear plant power plant

The state of ICS and IIoT security in 2019

Industrial control systems continue to be soft targets due to poor cyber hygiene. New study identifies what's wrong and best practices for fixing it.

credit card
Updated

10 killer PC upgrades that are shockingly cheap

Looking to put more pep in your PC's step? These surprisingly cheap PC upgrades and accessories do the trick without breaking the bank.

Apple wireless charging AirPower

16 wireless chargers for iPhones and Android devices

We've compiled a list of Qi-enabled chargers – including the new Google Pixel Stand – designed for use with Apple's latest iPhones and various Android devices.

intro biggest data breach fines

Biggest data breach penalties for 2018

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes, have cost these eight companies a total of nearly $280 million and counting.

1b intro anonymous executives leadership team

9 chiefs you don't need in the C-suite

What's in a title? Sometimes surprisingly little, it turns out.

intro where to look for threat intel binoculars binary code cybersecurity

7 places to find threat intel beyond vulnerability databases

National Vulnerability Databases (NVDs) can be slow and miss things. Use these sources to supplement your threat and vulnerability intelligence efforts.

bos 2018 machine learning

The best open source software for machine learning

InfoWorld’s 2018 Best of Open Source Software Award winners in machine learning and deep learning

bos 2018 cloud

The best open source software for cloud computing

InfoWorld’s 2018 Best of Open Source Software Award winners in cloud computing

bos 2018 data

The best open source software for data storage and analytics

InfoWorld’s 2018 Best of Open Source Software Award winners in databases and data analytics

bos 2018 software dev

The best open source software for software development

InfoWorld’s 2018 Best of Open Source Software Award winners in software development

intro woman leadership leader executive cityscape vision

8 CIO archetypes: What kind of IT leader are you?

From order taker to business leader, CIO responsibilities vary widely. Learn what role you currently play and how to break that mold in service of improved business value and career growth.

intro crew highly effective teams rowing

10 traits of highly effective teams

High-performing teams, lauded for their ability to achieve results, are something of a management obsession. But a group of individuals doesn't magically coalesce into a team. They need leadership. Here's how to build your own highly...

intro data breach circuit board technology security

What is the cost of a data breach?

These are the factors that determine the cost of a breach, along with advice for minimizing their impact.

intro security vulnerability

6 ways companies fail at security fundamentals

A new report suggests many organizations are failing in the basic cyber hygiene efforts and leaving themselves exposed to hackers.

1 intro top ai startups

The biggest AI startup deals of 2018

Total investments in U.S. venture-backed artificial intelligence companies topped $1.9 billion in the first quarter of 2018, the highest ever. Here's where the money went.

1 weakest link broken rusted chain security breach hacked

10 topics every security training program should cover

A thorough end-user education program is a necessary weapon in the battle to protect your perimeter. These 10 topics are the baseline of what to include in an awareness training program.

multi person vr
Updated

The highest-performing PC hardware you can buy today

Looking to build the ultimate PC? If price is no object, this is the hardware you want, from Nvidia's GeForce RTX 2080 Ti to AMD's 32-core Threadripper 2990WX.

Load More