Outlook Express was supported only through Windows XP, so you'll need a Windows Essentials workaround or a third-party utility to read DBX files.
Changing default Windows 8.1 settings -- such as the dialog box confirming file deletion -- is easy and potentially useful for desktop admins.
In addition to Copy as Path, the third-party Long Path Tool might be helpful for deleting a file or folder whose Windows path is too long.
Break out the champagne -- 2014 was a good year for IT executive pay, according to the latest TechTarget IT salary survey. Those on the receiving end say they had it coming.
Business transformation is a hot topic in IT and business circles these days. But how do you actually make it happen? A CIO at a nationwide voluntary health organization tells his story here.
Hadoop's disappearing act, data science in New Yorker cartoons, and the elusive purple unicorn in big data: The Data Mill reports from Strata + Hadoop World.
Application virtualization is a good way to deliver apps that don’t perform well in a local installations, but packaging and delivering virtual applications does come with some caveats.
DaaS providers tout hosted desktops as more efficient and secure than traditional VDI, but cloud security concerns persist. Companies looking to do DaaS have to trust their provider's staff and back-end security measures without first-hand insight.
When virtual desktops don't work well, it makes for unhappy employees and IT pros. Luckily, there's a lot you can do to optimize VDI performance, such as allocating enough hardware and using some flash in your storage system.
When a rogue administrator went undetected at this enterprise, its entire cloud infrastructure was at risk. How can you protect yourself?
ICYMI: The NBA shows its commitment to the Internet of Things by keeping Cisco as its official technology provider; Ruckus launches smart APs.
Aerohive and Verizon are offering an all-inclusive cloud-managed Wi-Fi networking offering for retail customers, backed by Verizon's LTE network.
While there are several ways a vSphere administrator can save time and trouble before disaster visits the data center, there are a few measures to take while correcting an issue to keep a problem from growing into a full-blown catastrophe.
Today's enterprises are using virtualization to wring the highest utility from their servers, but with fewer hosts come greater risks to business continuity.
VMware's vStorage APIs for Array Integration functionality enables storage devices that support VAII to reduce traffic on the network and reduce some work on the server to speed up input/output tasks.
While many Web proxies are legitimate, some attackers use them to hide their attacks. Expert Nick Lewis explains how block the malicious proxies.
The Staples breach is suspected to have affected payment card information in an as-yet-undetermined number of the office supply chain's stores in the northeast U.S.
The Sality malware has reemerged with new capabilities: brute-forcing passwords on wireless access points. Enterprise threats expert Nick Lewis explains how to.
From the Salesforce Analytics Cloud to the Sales and Service Clouds, Dreamforce 2014 attendees want ROI from their investment in Salesforce's platform.
Beacon technology aims to change the way retailers interact with customers. But new location-based technologies usher in not only convenience but also privacy concerns.
After the rollout of Wave, the Salesforce Analytics Cloud, questions about cost and mobile ease of use give industry watchers pause.