An .xpx file can cause problems for Office 2002 SP3 users, but Microsoft does provide help in Windows 7 and with a free XPS viewer.
Mobile device management, mobile application management and mobile information management form a security trio that protect data in the age of BYOD.
Desktop patch management is subject to its share of myths. Our expert penetrates the fog around waiting on software patching and Windows XP security.
As the number of IoT devices in the enterprise grows, so do the potential risks. In this #CIOChat, participants identify the biggest IoT security challenges facing IT and the enterprise.
Should your legacy IT systems stay or go? CIOs tasked with this decision might find eliminating past-their-prime systems to be the kindest cut of all.
Tom Davenport lays out five strategies for surviving automation; big data evolves; and the high-end food industry feasts on big data: The Data Mill reports.
Users and management have ideas about what desktops should look and feel like, and VDI might not fit that bill. Add the upfront costs and you've got some serious barriers to VDI adoption.
Cost savings and easier management are billed as top reasons to do VDI, but the technology also has downsides, and its complexity can make it daunting.
Windows Server 2003 support will come to an end in July, 2015. If you moved your pesky XP apps there, you could have a big migration ahead of you.
An expert discussed some of the particular challenges associated with the international procurement of MPLS VPN services.
Aruba is pushing Wi-Fi indoor positioning to new levels with a platform geared towards venues that connect with visitors via their smartphones.
SN blogs: Analysts this week discussed why big data analytics needs to be reassessed and why Lenovo's response to Superfish spawned consumer distaste -- and distrust.
When problems occur with the tool you use to protect your data, it's imperative to track down the logs that can help restore order.
When malware strikes or a patch goes bad, a regular backup cycle probably isn't the remedy you need when you want to minimize the loss of data.
VMware's February announcements focused on the features of the upcoming vSphere 6 release, but some cloud news also caught interest of the VMware faithful.
Expert George V. Hulme presents six real-world use cases for the deployment of WIPS to beef up wireless network security in the enterprise.
The serious HTTPS FREAK exploit was thought to only affect Android, iOS, and MacOS, but Microsoft has confirmed that it also affects all supported versions of Windows.
While regulatory compliance is valuable and necessary for enterprise, cyberthreat experts say that a compliance-centric security strategy may leave organizations with few resources to ward off emerging cyberthreats.
Today, companies struggle to find the most promising sales leads. Predictive lead scoring can make the process more efficient.
Companies jumping on the mobile payment bandwagon need to tread carefully as consumers are still skeptical about the security of their data.
If you're wondering, 'Should I groom IT talent from within or hire from the outside?' both paths offer risks and rewards.