How-Tos

iot internet of things education learning training icon connection smart

holiday e commerce shopping holiday hacking security breach retail security by rupixen via unsplash

Fighting holiday fraud: 5 ways ecommerce retailers can boost security

Everyone loves online shopping -- especially cybercriminals. If you’re a small or midsize ecommerce retailer you are the biggest target this holiday season, but it’s not too late to protect yourself and your customers.

ifcr 037 thumb
video

How to use the dtplyr package

The dtplyr 1.0 package lets you write dplyr R code and access speedy data.table performance. Find out how

nwht 044 thumb
video

How to use the uniq command: 2-Minute Linux Tips

In this Linux tip, learn how to use the uniq command. It’s a command that’s very useful when you want to reduce or summarize information.

CSO > colleagues writing on a glass wall / collaboration / teamwork

Peer product reviews: IT pros evaluate 7 enterprises offerings

These downloadable reports offer objective user-contributed product evaluations to help IT decision-makers navigate the tech purchase process.

resume template job application recruit stack of paper by yurily altukhov getty

Downloads: 10 tech resume templates

Getting your resume 'just right' in order to attract recruiters, HR pros and hiring managers is as daunting as it is critical. To jump start the process, Insider Pro has assembled this collection of real resumes revamped by...

linkedin curating primary4

23 LinkedIn tips for job seekers

What’s the the best time to post on LinkedIn for maximum visibility? Should you hire a professional photographer to take your LinkedIn profile pic? LinkedIn experts share their secrets for job hunting success.

cssg 032 thumb
video

How to harden web browsers against cyberattacks

Use these techniques to limit attackers’ ability to compromise systems and websites.

online certification mortar board graduate student study certificate  by pettycon pixabay and janjf

Earn your IoT security certification

Insider Pro is teaming up with CertNexus to offer subscribers access to an online course that leads to a Certified IoT Security Practitioner (CIoTSP) certification.

nwht 042 thumb
video

How to use the screen command: 2-Minute Linux Tips

In this Linux tip, learn how to use the screen command. It's a command that allows you to detach an SSH session and then reconnect to it.

ifcr 036 thumb
video

R data.table in 5 minutes

Get a quick look at the R data.table package in this 5-minute tutorial that gives a sample of the package’s speed and power.

cssg 031 thumb
video

How to and why you should disable LLMNR with Windows Server

Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019.

planning / organization / strategy / development / project management / notes

Top 17 project management methodologies — and how to pick the best for success

Choosing the right project management methodology for the job is essential. Our guide to evaluating project management methodologies will ensure you pick the perfect fit for your next project.

nwht 041 thumb
video

How to use the tee command: 2-Minute Linux Tips

In this Linux tip, learn how to use the tee command. It’s a very simple command that allows you to run some other command and send its output both to the screen and to a file at the same time.

cssg 030 thumb
video

How to double-check permissions post migration from Windows 7

It pays to make sure all permissions in your Windows environment are correct after migrating from Windows 7 or Server 2008 R2. Here’s how to check.

nwht 040 thumb
video

How to use the who command: 2-Minute Linux Tips

In this Linux tip, learn how to use the who command. It will show you details regarding who is logged in and about the system.

ruckus
video

Build a Resilient, Efficient Campus Network with Ruckus ICX Switches

Build a Resilient, Efficient Campus Network with Ruckus ICX Switches

bi business intelligence ts

What is business intelligence? Transforming data into business insights

Business intelligence (BI) leverages software and services to transform data into actionable insights that inform an organization’s business decisions.

Load More