Microsoft has acknowledged that users aren't just tied to desktop OSes, shifting its focus to Office 365 and DaaS rather than its Windows strategy.
If IT administrators need information on document and application usage, they can use Office Telemetry, an Office 2013 feature that gathers such data.
Microsoft provides a few ways to check Windows 8.1 app compatibility, because legacy and Windows Store apps can have Windows 8 compatibility problems.
What should go into your organization's after-action review following a disaster recovery test? #CIOChat participants suggest what to include in the report and why.
If CTO Niel Nickolaisen saw a rogue application, he would crush it. If he spied an unauthorized device connecting to his network, he shut down the attempt. That was then. Now he's living the BYOx life.
How does a retailer known for customer service get even better at it? Matt Fisher of Nordstrom uses text analytics to parse tens of thousands of online customer reviews.
If you go by big analyst firm predictions and vendor hype, you'd think every IT shop has virtualized desktops, implemented BYOD and uses MDM software. But that's far from reality.
VMware Horizon 6 includes remote app publishing similar to XenApp, and the company launched an incentive program to seduce Citrix shops over to its side. The grass may not be greener in Palo Alto, however.
Citrix's new desktop CTO has brought the focus back to the company's tried and true XenApp platform, and has concerns about loose data security practices in the cloud and within organizations, where Snowden-like breaches can occur.
Lancope security research director Tom Cross says network security teams have a lot more to learn from military doctrine beyond the kill chain concept. Find out more about terrain analysis and deceiving the enemy in this Q&A.
Find the right monitoring and management tools for your cloud applications by choosing a strategy that works for your specific needs. Use the data to assess the overall quality of experience of your applications with application driven analysis
With zero-touch appliances and cloud-based gateways, VeloCloud offers a cloud WAN service that hybridizes MPLS and broadband links.
With OVA and OVF deployments, businesses can distribute a single or multiple VMs that save time and reduce the potential for problems.
Security and speed issues dog the vSphere Web Client, but will VMware listen to its users?
What is an OVA file and how does it compare to an Open Virtualization Format package?
Perhaps the biggest security bug of this generation, Heartbleed offers a number of lessons for improving incident response. Threat expert Nick Lewis highlights his key takeaways.
This seven-question quiz will test you on the key points we've covered in the malicious mobile apps Security School by Mike Cobb.
Preview: At Black Hat USA, experts will detail the steps taken by the security community and law enforcement to put down the infamous CryptoLocker ransomware.
You can collect lead generation data from multiple sources and use a CRM system to target marketing and sales campaigns.
Wearable computing can gather data that gets crunched in real time with a device as small as a USB stick. But wearables are mostly single-purpose.
In devising and implementing a social CRM strategy, companies need to look within and make sure their company culture is set up for success before the first tweet is posted.