Windows 8.1 doesn't include Backup and Restore as its predecessors did, so you may have to use Windows 8 File History and other disaster recovery features instead.
Outlook Express was supported only through Windows XP, so you'll need a Windows Essentials workaround or a third-party utility to read DBX files.
Changing default Windows 8.1 settings -- such as the dialog box confirming file deletion -- is easy and potentially useful for desktop admins.
What separates the high earners from the low earners among senior IT executives? The ability to negotiate a bonus helps, according to the 2014 TechTarget IT Salary and Careers Survey.
IT executives said 2015 will be the year of security, cloud computing and business intelligence/big data projects, according to TechTarget's IT Salary and Careers Survey. A lesser priority? Mobile technology.
Is your enterprise mobile app development strategy download-worthy? Discuss mobile app dev in our SearchCIO tweet chat Wednesday, Oct. 29, at 3 p.m. EDT.
DaaS has advantages, but don't discount cloud security concerns. Competitors, disgruntled employees and careless users can all put the data and desktops you host with DaaS providers at risk.
Application virtualization is a good way to deliver apps that don’t perform well in a local installations, but packaging and delivering virtual applications does come with some caveats.
DaaS providers tout hosted desktops as more efficient and secure than traditional VDI, but cloud security concerns persist. Companies looking to do DaaS have to trust their provider's staff and back-end security measures without first-hand insight.
The Cisco IOx platform has been updated to help businesses simplify the management of IoT endpoints and applications.
There's been a lot of talk recently about Cisco vs. HP switches. Read this comparison to help you choose the best networking switch.
National Cyber Security Awareness month has been around for 11 years, but more talk -- and action -- is needed to achieve real goals.
Fault Tolerance in vSphere duplicates a critical workload to ensure a server outage doesn't slow the business down, but some setup is required to ensure performance isn't compromised.
While there are several ways a vSphere administrator can save time and trouble before disaster visits the data center, there are a few measures to take while correcting an issue to keep a problem from growing into a full-blown catastrophe.
Today's enterprises are using virtualization to wring the highest utility from their servers, but with fewer hosts come greater risks to business continuity.
When evaluating the business cases for MFA in the enterprise, expert David Strom says an organization must first identify which of the three operational scenarios apply to a potential implementation.
Expert Ernie Hayden takes an in-depth look at the development of NIST SP800-82 since its birth, and what the standard includes in the most recent revision.
SQL injection attacks continue to plague enterprises. However, performing audit code validation when using outsourced developers can be a challenge. Expert Nick Lewis explains how to prevent these attacks.
From the Salesforce Analytics Cloud to the Sales and Service Clouds, Dreamforce 2014 attendees want ROI from their investment in Salesforce's platform.
Beacon technology aims to change the way retailers interact with customers. But new location-based technologies usher in not only convenience but also privacy concerns.
After the rollout of Wave, the Salesforce Analytics Cloud, questions about cost and mobile ease of use give industry watchers pause.