You may have good reasons to want to control user access to Windows 8 apps. Here's how to disable Windows Store apps with Group Policy Objects.
Want to try a new OS sans commitment? Linux on USB sticks can be the first step to replacing Windows XP with an open source desktop such as Xubuntu.
Organizations moving from Windows XP should consider app compatibility, security and alternative OSes before conducting a migration to Windows 8.1.
It can be difficult to navigate cloud contracts. There are laws to abide by, SLAs, subcontractors and more. Where to start? One lawyer lays out the six basic issues he vets when he reviews cloud contracts with his clients.
For years, CIOs have talked about aligning technology with business strategies. That is still happening, but more often now; business strategies are formed based on technology trends.
Do you know what APIs are being leveraged inside your enterprise? Performing an internal audit is the first of four steps required for managing APIs.
DaaS is a great disaster recovery method, but why would you go to the trouble of setting up DaaS, only to stop short of actually doing it?
Virtual desktop environments aren't immune to viruses and malware, so it's important to have an antivirus tool and strategy in place before your deployment gets infected.
When older PCs were causing management and compliance headaches, Tickets.com turned to NComputing thin clients for an easier experience.
New Extreme switch and wireless access point introduced by Extreme Networks delivers high levels of network performance at a lower price point.
New enterprise firewalls from Fortinet and SonicWall offer carrier-class speeds and feeds at a nice price.
Meru Networks wins this month's Network Innovation Award for its work in developing the first OpenFlow-certified application in the wireless market.
VMware plans to introduce more storage-related APIs to the ESXi hypervisor, opening it up to more data services.
The NSX network virtualization platform signifies a shift in how networks can be managed, provisioned and protected by using software rather than relying on hardware to add services.
Virtual SAN is a novel feature in vSphere, but one new cloud services provider was confident enough to build its business around the software-defined storage technology.
Multifactor authentication technology can be complicated. Expert David Strom explains what enterprises need to know before they invest in an MFA product.
CurrentC, the retailer-backed mobile-payment platform, admitted to the breach shortly after the Apple Pay competitor was blamed for shutting down other NFC-based payment options.
Customers and partners like the new effort by the Intel-owned security vendor to integrate threat intelligence feeds with all of its existing products, but analysts are leery of lacking threat intelligence standards.
Salesforce.com's Dreamforce conference emphasized a mobile-first business strategy and user-friendly applications.
From the Salesforce Analytics Cloud to the Sales and Service Clouds, Dreamforce 2014 attendees want ROI from their investment in Salesforce's platform.
Beacon technology aims to change the way retailers interact with customers. But new location-based technologies usher in not only convenience but also privacy concerns.