Dell's latest update to KACE includes more tracking and recording capabilities for issues that may crop up with Internet of Things devices.
Microsoft has improved Windows 8.1 security, but no OS is free of vulnerabilities. Some basic settings can further protect Windows 8.x systems.
The best way to run Windows on Mac OS devices depends on whether you need performance, open source support or centralized management.
Learn about one approach to mobile app development that cuts the amount of resources that go into expensive software development and testing.
Application consolidation is not for the faint of heart. Among other hurdles are the users who threaten mutiny. Niel Nickolaisen offers advice on getting the deed done.
Application consolidation is never an end unto itself. It's the business benefits that matter. SearchCIO columnist Harvey Koeppel explains.
In addition to letting 900 employees go, some Citrix products will be eliminated as part of a re-organization, with VDI-in-a-Box the first to go.
VMware is in talks to acquire Immidio to fill the gaps within its user management and App Volumes tech and draw interest from XenApp customers.
Application refactoring could be the solution to delivering mouse-and-keyboard apps to mobile devices. Refactoring vendors all take different approaches, however, so it's important to know the differences before choosing a tool.
ICYMI: F5 Network upgraded its BIG-IQ to provide a more integrated framework; a California convention center is rolling out a 10 Gbps Wi-Fi network.
Brocade is promoting router encryption in the release of its MLXe security module, but expert opinions fall short of unanimous endorsement.
Cisco ONE provides a single license for all-in-one hardware and software package aimed at a specific networking use case, but it may be the high-priced option.
The imminent arrival of vSphere 6 will bring several new features, some that have been in development for quite some time.
For a company that wants to open up the lines of communication in its NSX virtual network, using the NSX Edge gateway service will provide access to isolated networks.
VMware is preparing for vSphere 6 general availability early in 2015. How well do you know the new features and enhancements in this coming release?
Email encryption is a valuable security tool for enterprises, but where and how should it be deployed? Expert Karen Scarfone outlines specific use cases for email encryption software.
An FTC report urges vendors to be proactive in creating Internet of Things security and privacy controls, while a Tripwire survey shows IoT devices are a growing corporate risk.
With a number of new network security certifications available, knowing which one will best help your career can be confusing. Expert Kevin Beaver discusses the options.
If your CRM system isn't designed for ease of data entry, it can undermine data analysis and decision making. Here's how to promote cleaner data.
Location-based technologies like personalization are yielding valuable consumer data, but companies need to be careful stewards of the information.
Getting a holistic view of customers takes more than technology; companies need to eliminate data silos and gain insight about customer experience.