Features

Google chart options
Amazon Echo

dsc04877
video

LG G6 vs Google Pixel Camera Showdown

Can the LG G6 dethrone the Google Pixel for the best camera in a smartphone?

windows 10 updates 1

Windows 10 Redstone: A guide to the builds

Now updated for build 16179, released on April 19, 2017: Get the latest info on new builds of Windows 10 Redstone as they roll out from Microsoft.

Cartoon from 2013: Hiring manager looking for applicants

CW@50: A look at life on the job in IT through cartoons

Unforgiving boom-and-bust cycles, skills that go stale overnight, outsourcing: IT careers aren't all signing bonuses, Ping-Pong tables and beanbag chairs. Here’s a look at life on the job in IT through the years, from the pen of...

alexa products 800x600

Got Alexa? 12 devices that extend its reach

Got Alexa? Want Alexa? These 12 interesting devices work with Amazon's personal assistant to provide news, information and other services.

breeze lifestyle 14

The follow-me mode in this drone is like a scary, fanatical personal assistant

Like Alexa, but with perks.

data analytics chart money finance laptop computer

Buyers’ Guide: Prices dropping for data visualization software

Buyers of data visualization software are enjoying “steady price drops” due to intense vendor competition, according to IBISWorld. Download this free procurement report, which analyzes the vendors, pricing trends and ways to negotiate...

hackers shadows group gang

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

boston one microgrid drone footage.00 00 55 00.still005

Microgrids: Energy independence (and money saved) for companies

Rising costs and an aging infrastructure are pushing companies, military bases and schools to consider energy microgrids to keep the lights on, save money and reduce greenhouse gases.

01 light

7 tips to strengthen online security

If you are online today, checking email, buying someone a gift, posting to Facebook, paying bills, streaming Netflix, or monitoring your sleeping baby, you need to practice these seven tips for protecting your online presence.

artificial intelligence brain circuit

A.I. in the driver’s seat with the enterprise

Artificial intelligence will be a critical driver of the U.S. economy. See what IBM’s Watson is doing at GlaxoSmithKline, Staples and 1-800-Flowers.

resume mistakes

IT Resume Makeover: Transitioning from IT pro to IT leader

Making the move from IT professional to IT leader takes a different set of skills. The same type of pivot is necessary with how you approach your resume.

floppy disk and SD card storage

CW@50: A half-century of data storage (PDF)

A free download that explains how storage went from $1 million to 2 cents per megabyte -- and how it evolved from punch cards to data storage, the internet and smartphones.

enterprise cloud thinkstock cloud computing microsoft docker HP helion

Enterprises get to work in the cloud

Companies are using the cloud for digital transformation, research and collaboration, and more are moving critical workloads there.

Windows Embedded OS

Windows Embedded's future looks rocky

Microsoft's apparent replacement versions for Windows Embedded -- which are based on Windows 10 -- have some limitations. Here's what you need to know.

what it takes to become an application security engineer cover

What it takes to become an application security engineer

Application security engineers earn more money than application engineers and are in high demand, but the job requires additional training in security.

MicroPro - WordStar ad

10 fun tech ads through the years

80 Mbytes of storage for less than $12,000! boasts one ad. In another, a woman in hot pants touts a modem that's "maybe even sexy." These were too much fun not to share.

email encryption

Top 5 email security best practices to prevent malware distribution

With email representing an open, trusted channel that allows malware to piggyback on any document to infect a network, it’s often up to the organizations – their security teams and employees – to adopt appropriate security strategies...

vendor divests 1

10 things to worry about when your vendor divests

Although your vendor’s divestiture is out of your control, you can at least do your due diligence in limiting any negative impact to your company. With that in mind, ZL Technologies lists 10 things you should worry about if your...

Load More