If IT administrators need information on document and application usage, they can use Office Telemetry, an Office 2013 feature that gathers such data.
Microsoft provides a few ways to check Windows 8.1 app compatibility, because legacy and Windows Store apps can have Windows 8 compatibility problems.
Based on the Windows 8.1 update, it's reasonable to expect Windows 9 features for universal apps and cloud integration. Will they entice enterprises?
Can building better relationships with cloud-based technology providers boost your IT competitive advantage? Discuss with SearchCIO Wednesday, July 30, at 3 p.m. EDT on Twitter.
Mobile app dev is the easy part. Find out how mobile application performance management software can prevent lackluster performance in the field.
In the latest CIO Decisions, CIOs and IT experts share their thoughts on infonomics -- placing a value on data assets -- and other of-the-moment IT concerns.
Automating VDI image creation shrinks the margin of error, combats performance problems and eases image management. At a BriForum 2014 session this week, attendees learned how to automate golden images with the Microsoft Deployment Toolkit.
Sometimes the user profile management utilities that are built into your vendors' VDI product are enough. But if you have more advanced needs than allowing workers to personalize their desktops, you might need third-party tools.
Desktop and server virtualization are different beasts, and not knowing the difference can put your VDI deployment in hot water.
As the Internet of Things continues to gain traction, specialized machine-to-machine networks will play a larger role as they serve as the last hop.
Half of networking devices are aging or obsolete, a new report says, as fallout from the recession continues to disrupt legacy network refresh cycles.
SN blogs: This week, an analyst said sharing threat intelligence information is a new security strategy; data analytics as a service offers all enterprises a competitive edge.
Using vApps adds powerful features to an administrator's arsenal, such as determining a VM startup and shutdown order.
Vendors can reduce potential issues by packaging VMs into a virtual appliance for customers. Here's how to create and modify the resulting OVF file.
Here's how VMware's vCSA differs from its Windows-based counterpart -- and why it's the wave of the future.
Expert Kevin Beaver explains how enterprises can take a page from Facebook's ThreatData framework security analytics to boost enterprise defense.
With the release of Microsoft EMET 5.0 come new features and functionality. Michael Cobb explains what's new in the technical preview.
Hailed by card brands as the cure to payment card fraud, Chip and PIN security technology will take years to deploy and has already proven vulnerable.
Wearable computing can gather data that gets crunched in real time with a device as small as a USB stick. But wearables are mostly single-purpose.
In devising and implementing a social CRM strategy, companies need to look within and make sure their company culture is set up for success before the first tweet is posted.
At George Street Photo & Video, President Michelle Mantel uses Salesforce to streamline formerly manual processes and make nuptials less stressful.