Features

7 cool tools for doing devops right
Android Essential Apps

computerworld digital edition february 2015 300px

Read the February Computerworld Digital Magazine!

Inside this edition: the salary and jobs regional report for the southwest, revving up security, lessons in cloud jumping and much more.

Project manager - communication skills

IT hiring: 4 things you're doing wrong (and how to fix them)

IT organizations may be their own worst enemies when it comes to effective strategies for sourcing, screening and hiring IT talent.

computer network 000016779847

DNS tips and tricks

From testing server speeds to blocking access to unwanted domains, here are some tips for tweaking DNS settings to boost the speed and efficiency of your network.

elvis presleys ipad and other stories

Elvis Presley’s iPad and other stories

Mobile tech is transforming everything, here's a few illustrations as to how -- and why -- there's iPads in Gracelands.

Puzzle-piece faces, with one standing up; difference; fitting in

The embedded IT worker: Would you fit in?

The trend toward embedding IT workers within business units has been much heralded in theory, but slow to take off in practice. Those organizations that have made the move to an embedded IT workforce talk about the pros and cons.

Business woman using smartphone.

Which mobile data provider is best? (And will you make a switch?)

Computerworld readers rate AT&T, Sprint, T-Mobile and Verizon on data connection speed, reliability, customer service and more. Find out which carrier gets the most cheers — and which the most jeers — from our 2014 survey respondents....

fitbit charge

Why smart devices and wearables will be security's new headache

First it was BYOD and how to secure all of those smartphones in your organization. That's old news! Now those smart devices are communicating with smartphones, and that means they're the weakest link in your cyber kill chain.

Email

Acompli: A look at Microsoft's new mobile email tool

What the acquisition means for customers, and where some holes are.

Windows end of the line

Are you ready for the end of Windows Server 2003?

Microsoft is cutting off support for the popular OS in six months, so you need to start putting together a migration plan now.

identity theft

The 2015 Social Engineering Survival Guide

Despite being an integral aspect of many, if not most, major attacks, social engineering tactics always seem to go underappreciated by enterprise security teams. However, it’s often easier to trick someone into opening an email and...

docker

Container wars

Docker's getting all the container headlines, but as we're going to see in 2015, there's a lot more to containers than just one company.

security risk thinkstock

Now on CIO: 6 biggest business security risks and how to fight them

IT and security experts discuss the leading causes of security breaches and what your organization can do to reduce them.

battery crisis primary

Power up! The hunt is on to extend battery life for mobile devices

Check out 5 battery-boosting technologies being tested in research labs now.

development tools keyboard computer system tuneup wrench

TypeScript is industrial-strength JavaScript

Like it or not, JavaScript is the language of the Web, but it's tough to manage for enterprise-scale development. TypeScript offers an attractive alternative

nightmare clients monsters ghouls zombies dragons beasts

14 nightmare clients — and how to defang them

Here’s how to identify and neutralize beastly client behavior before it gets the best of your project

selfie hat 620x465

The world's worst wearable tech concepts (so far)

From a wig that buzzes your head with notifications to a bra that tells you when you're overeating, these wearable tech concepts are wacky in all the wrong ways.

primary

Cooler than cubicles: 18 new designs for the office

Sit, stand, lean, curl up – today’s commercial furniture designs let users choose how they want to work.

Premier 100 Alumni, 2000 - 2015

Search, sort or browse our database of IT leaders.

Load More