You may have good reasons to want to control user access to Windows 8 apps. Here's how to disable Windows Store apps with Group Policy Objects.
Want to try a new OS sans commitment? Linux on USB sticks can be the first step to replacing Windows XP with an open source desktop such as Xubuntu.
Organizations moving from Windows XP should consider app compatibility, security and alternative OSes before conducting a migration to Windows 8.1.
Is it time to bring text analytics in-house? A director of analytics at Visa advises CIOs to consider these three questions before making a move.
An introduction to Tamr; JSON as the next SQL; and why agile doesn't always work: The Data Mill reports.
Is there a 'd-i' missing from the middle of the IoT acronym? Read on for IT and business strategist Harvey Koeppel's humorous take on the meaning and disruptive nature of the Internet of Things and the 10 things CIOs can do to prepare for the IoT.
DaaS is a great disaster recovery method, but why would you go to the trouble of setting up DaaS, only to stop short of actually doing it?
Virtual desktop environments aren't immune to viruses and malware, so it's important to have an antivirus tool and strategy in place before your deployment gets infected.
When older PCs were causing management and compliance headaches, Tickets.com turned to NComputing thin clients for an easier experience.
Meru Networks wins this month's Network Innovation Award for its work in developing the first OpenFlow-certified application in the wireless market.
VSS Monitoring offers a low-price network packet broker to network monitoring operations in mainstream, midrange enterprises.
SN blogs: This week, one analyst discusses the importance of incident detection and response; another speculates on the benefits of SDN and DevOps.
Virtual SAN is a novel feature in vSphere, but one new cloud services provider was confident enough to build its business around the software-defined storage technology.
Virtualization company VMware continues to plug holes in its software-defined portfolio as it adapts to a more mobile, cloud-centric world. Where should it look next?
VMware's Site Recovery Manager product can protect critical workloads in a disaster, but unless an administrator has fine-tuned SRM for the business, it may not perform as expected when trouble strikes the data center.
Customers and partners like the new effort by the Intel-owned security vendor to integrate threat intelligence feeds with all of its existing products, but analysts are leery of lacking threat intelligence standards.
State-affiliated actors, possibly tied to the Russian government, are thought to be behind a newly confirmed breach of the White House's unclassified computer network.
The IBM patches address several Java vulnerabilities, some of which were rated as severe, in the company's Notes and Domino platforms.
Salesforce.com's Dreamforce conference emphasized a mobile-first business strategy and user-friendly applications.
From the Salesforce Analytics Cloud to the Sales and Service Clouds, Dreamforce 2014 attendees want ROI from their investment in Salesforce's platform.
Beacon technology aims to change the way retailers interact with customers. But new location-based technologies usher in not only convenience but also privacy concerns.