-
Pro tip: How to use secure shell from your Chromebook
If you remotely administer Linux servers with the help of secure shell, grab the nearest Chromebook. Jack Wallen walks you through the steps of using ssh from Chrome OS.
-
Put data scientists' skills to excellent use in mission-critical scenarios
Don't overlook the value of having a data science team play an operational role at your company. Here are three steps to follow when assigning analysts to these roles.
-
'Get out there' and find your company's non-escalated problems: CIO of Williams Martini Racing
Williams Martini Racing CIO Graeme Hackland explains why CIOs need to 'get out there' and connect with frontline employees to make IT an invaluable part of the company.
-
India's IT services sector takes a hit from doubled work visa fees
Congress recently approved an increase on the fee for certain H1-B and L-I visas. Here's how that could affect India's IT services sector.
-
Super Bowl 50 smashes data records with 10.1TB flying across Wi-Fi
The amount of data used during Super Bowl 50 at Levi's Stadium crushes previous records, with more than 10 terabytes transferred over the stadium's Wi-Fi network on game day.
-
Power checklist: Managing and troubleshooting Windows user accounts
This comprehensive checklist offers management guidelines and solutions to many of the problems that routinely occur with Windows user accounts. You can print the list or use it in electronic form; th...
from Tech Pro Research
-
Why SMBs should build a threat intelligence program -- no tech investment required
Threat intelligence is not just for big businesses. One security pundit explains what SMBs gain from becoming 'threat intelligent,' and offers tips on how to gather actionable intel.
-
Grab 2GB extra for Google Drive by taking Security Checkup by Feb. 11
Google is giving users who complete its Security Checkup an additional 2GB of extra Google Drive storage. Here's how you can take advantage of it.
-
Locate devices on your wireless network in seconds with Fing
With Fing, you have a powerhouse wireless network scanner that's ready for action at all times. Here's how to use this Android app.
-
How to download your Snapchat Snapcode
Snapcodes are an easy means to get people to follow your brand on Snapchat. Here's how to get yours.
-
How to set up Google Apps in 5 simple steps
A new, streamlined setup lets you configure Google Apps for a new domain in minutes. Andy Wolber shows you how.
-
Malware developers hide in plain sight in online sandboxes
Malware analysis using online sandboxes is another example of technology designed to assist good guys that ends up helping bad guys as much if not more.
-
VMware VSAN 6.2: The 3 things you need to know
VMware recently announced the latest version of its storage area network product, VSAN 6.2. Here's what you need to know.
-
Quick glossary: Artificial intelligence
From "artificial neuron network" to "natural language processing" to "weak AI," this short word list will keep you on top of the AI terms you need to know. Technical jargon has been flying thick and ...
from Tech Pro Research
-
Office 365 expands Delve features for organizing collaboration
Microsoft has released a new feature for Office 365 Delve to simplify organized team collaboration. But is it too much of a good thing?
-
Pro tip: Edit Boot Camp to install Windows from a USB flash drive
Tired of burning DVDs to install Windows 7 or later in Boot Camp? If so, with a bit of editing, you can get it to use USB flash drives instead.
-
9 days: Black-hat hackers' threshold in untargeted attacks
When hackers deem their efforts in untargeted attacks such as credit card database breaches aren't profitable, they give up within nine days, according to a new study.
-
16 tech and startup companies with insane employee perks
If you work here, Monday blues will never be a problem again.
-
19 of Apple's biggest tech blunders
The largest company in the world has had more than its share of embarrassingly bad product launches. Here's the worst of Apple's worst.
-
Should the fight for the Linux desktop really matter?
World Domination has long been the battle cry for Linux. But does that cry really hold any relevance these days? Jack Wallen tackles that tireless question to hopefully put it to rest.
-
The 15 most frightening data breaches
These chilling stories about devastating data breaches might keep IT security pros up at night.
-
These tech office dogs want to crash your meeting
No industry seems to be friendlier toward workplace dogs than tech. It's a wonder we get anything done.
-
Power checklist: Managing and troubleshooting Windows user accounts
This comprehensive checklist offers management guidelines and solutions to many of the problems that routinely occur with Windows user accounts. You can print the list or use it in electronic form; th...
from Tech Pro Research
-
Screenshots: Five apps for the serious do-it-yourself'er
Finding helpful tools for tackling DIY projects can be difficult, but they're out there. These five apps offer everything from how-to resources to unit converters to feature-rich measuring tools.
-
The 18 scariest computer viruses of all time
There's no shortage of computer viruses in the wild, but not all malware is created equally. These 18 viruses are the worst of the worst: They've shut down banks, grounded airplanes, destroyed nuclear...
-
Grab 2GB extra for Google Drive by taking Security Checkup by Feb. 11
Google is giving users who complete its Security Checkup an additional 2GB of extra Google Drive storage. Here's how you can take advantage of it.
-
Ghosts of tech past: Photos of data storage from the 1950s - 1980s
Take a trip back in time to see examples of data storage from the 1950s through the 1980s.
-
Automatic Windows 10 installs begin but how easy are they to stop?
Microsoft's latest operating system will begin to automatically install on many home Windows 7 and 8.1 machines from now on but questions remain over how easily it can be blocked.
-
Screenshots: Windows 10 alternatives that won't disappoint
Despite the fanfare that Windows 10 is generating, these alternative upgrade paths are worth your consideration.
-
How Google Cardboard became the flag bearer for VR, and what's next
No one knew quite what to do with Cardboard when Google handed it out in 2014. Little did we know it would become a leader in the emergence of VR-especially for businesses.
-
Quick glossary: Artificial intelligence
From "artificial neuron network" to "natural language processing" to "weak AI," this short word list will keep you on top of the AI terms you need to know. Technical jargon has been flying thick and ...
from Tech Pro Research
-
Photos: 15 weird and useful things to 3D print for your desk
If you have a 3D printer, you have the means to produce all the functional (and maybe not so functional) office supplies you want.
-
How 3 new VMware products empower end users while keeping IT happy
On Tuesday, VMware announced Workspace ONE, Horizon 7, and Horizon Air. Here's how the products will enable an increasingly digital workforce.
-
OS X El Capitan: The smart person's guide
This comprehensive guide includes everything you need to know about Apple's OS X El Capitan, including features, requirements, upgrade options, software updates, and more.
























