Top Twelve tech hoaxes of all time
Social media pranks and viral videos have nothing on these truly historical technical hoaxes Top Twelve tech hoaxes of all time The art of the hoax is woefully underappreciated. Properly executed...
View ArticleIT power grab: Should you be a Machiavellian manager?
Ready to toss aside that meek service mentality and step up your game? Several savvy CIOs explain how to grasp the reins of IT power. Two recent works from leading analyst firms throw down the gauntlet...
View Article10 most powerful PaaS companies
Platform-as-a-service is the least mature of the major cloud services categories. There are multiple types of PaaS, and vendors are playing in more than one sub-category, so it’s not easy to tell the...
View ArticleThis IT worker had to train an H-1B replacement
This is the story of an IT worker who was replaced by a worker on an H-1B visa, one of a number of visa holders, mostly from India, who took jobs at this U.S. company. Computerworld is not going to […]
View ArticleWindows will be crucial to a PC market revival in 2015
Gartner projects Windows XP upgrades will stop the PC market bleeding next year Microsoft’s Windows OS could play a crucial rule in returning worldwide PC shipments to modest growth next year after...
View Article12 Tips to Help College Grads Land Their First IT Job
Technology and HR pros, as well as IT recruiters, share their advice on how recent graduates and those still in college can best position themselves for a technology career. According to research...
View ArticleMicrosoft slashes IE support, sets ‘huge’ edict for Jan. 2016
Microsoft slashes IE support, sets ‘huge’ edict for Jan. 2016 Company makes another move that will complicate the lives of its best customers: enterprises Hard on the heels of a decision to step up the...
View ArticleInternet of Overwhelming Things
As the era of Internet of Things (IoT) dawned, the fridge got hacked. Well, maybe not. In early 2014, as many media outlets such as NPR reported, security services vendor Proofpoint claimed to have...
View Article17 ways to hate Microsoft Outlook 2013 less
17 ways to hate Microsoft Outlook 2013 less Few software products draw such universal — and deserved — scorn as Outlook 2013. Here¿s how to tame the beast. 17 ways to hate Microsoft Outlook 2013 less...
View Article10 things about (the Internet of) things
Floating things, flying things, finding things and fashion things are all part of the Internet of Things. Prepare for a hyper connected future. We’ve all heard about the promise of the Internet of...
View ArticleHow to save your business in 24 hours, without any protections
The way some companies handle the problems facing them can seem as likely to work as hiding under a large piece of furniture to escape harm from a nuclear blast I have a fondness for old-time radio...
View ArticleThe 10 worst people you meet working in IT
You’re definitely going to meet them. Hopefull you aren’t one of them. Every human being is a unique and special person who doesn’t quite fit into any category, of course. That said, if you’ve worked...
View ArticleWomen in IT: No longer a nice-to-have
If you’re in IT — and reading this article about women in IT – the odds are that you’re male. After all, just 24% of the U.S. IT workforce is female, according to the U.S. Bureau of Labor Statistics,...
View ArticleBest Places to Work in IT 2014: The three best organizations
What makes a company No. 1 in the eyes of its employees? We take a look at Quicken Loans, LinkedIn and Noah Consulting to find their secrets to success. Work hard, have fun What makes an organization a...
View Articlethriving as an IT contractor
Companies continue to supplement their full-time technical ranks with temporary contractors. Here’s how to make it work. When demand exceeds the supply of available IT talent, many companies are using...
View ArticleJust where are the world’s hackers located?
China, Russia, and now from within the U.S. are the most common locations for hackers, depending on who you listen to. Here’s a question I was asked recently by an IT buddy: where do hackers live?...
View ArticleApple mobile devices in China targeted by WireLurker malware
Researchers at Palo Alto Networks said they’ve discovered an impressive malware attack against Apple devices, which for now appears to be limited to users of a Chinese application store. The campaign...
View Article20 great productivity apps for Android, iOS, and the Web
20 great productivity apps for Android, iOS, and the Web These 20 essential apps work on all three platforms, helping you stay productive no matter what device you or your co-workers use Android, iOS,...
View Article10 cheap or free ways to make your old PC run faster
If your old workhorse of a PC is starting to slow down in its old age, these low (or no-) cost tricks can help put some pep in its processing step. Teach an old dog new tricks There’s a reason […]
View ArticleThe 10 mightiest supercomputers on the planet
China retains top spot for fourth consecutive Top500 list The fastest computers in the world It was a familiar top 10 released today by the authors of the twice-annual Top500 ranking of world...
View Article