Windows 8 supports past versions of Microsoft Office, but installation problems may interfere with getting Office 2007 Ultimate to run in Windows 8.
The ongoing plague of POS security breaches is a reminder to desktop admins that endpoint security policies should always be a work in progress.
Find out about a quick, free alternative to the Windows 7 USB/DVD Download Tool -- the open source Reliable USB Formatting Utility.
IT upgrades and social data mining better equip Boston Marathon organizers for their 118th year; plus, soft robotics and Microsoft's forced update.
CIOs harness the power of cloud computing and fine-tune their individual cloud model to the business' benefit.
Two small businesses with big website requirements explain how they ultimately got what they wanted in a website developer.
If your device uses a configuration server, it might be a zero client. But it might not. Here’s how to find out.
Thin clients used to be the thinnest, but now zero clients are giving them a run for their money with almost no storage or configuration requirements.
Experts agree VDI adoption may never make it above the 20 percent mark, but you'll still have to deliver Windows applications to the other 80 percent of desktops.
Cloud visibility is a major challenge. Luckily, there are options for creating observation posts in hybrid infrastructures. Here are some to consider.
NAC technology is stepping up to the plate to give better BYOD access control to enterprises.
Meru and Aerohive build affordable 802.11ac access points to put premium Gigabit Wi-Fi within reach of more businesses.
Without correct implementation and persistent monitoring, a resource pool can cause more problems than it solves.
Not all management tasks in a vSphere environment are handled from the vSphere client. Some require commands executed from ESXi Shell.
Starting with vSphere 5, VMware brought single sign-on functionality to vCenter to give administrators another way to manage identities.
Can Project Sonar, an Internet-scanning project, benefit enterprise network security? Expert Brad Casey discusses.
Sophisticated malware was behind the Michaels breach that resulted in three million compromised payment cards, according to the crafts retailer.
When it comes to app risk management, who is ultimately responsible: business leaders or security professionals? A new report weighs in.
Companies want to use better data analytics to get a more comprehensive understanding of their customers. But today's reality suggests that is in the distant future.
Marketing automation tools have progressed, but the field is still developing. Here are buying considerations for marketing automation software.
At the AIIM 2014 conference, Guy Kawasaki outlined three pillars of behavior common to companies that have mastered the art of customer enchantment.