Administrators need to be careful when connecting Windows 8.1 endpoints to enterprise domains. Windows 8 Group Policy and Active Directory can help.
Although there are many tools and best practices for password policies across remote offices, it's important to remember the basics for Windows security.
Microsoft has made many changes in its suite, and some desktop admins have made surprising choices after comparing Office 365 vs. Office 2013.
On-the-spot decision making and in-the-field analysis are but two mobile business intelligence benefits that it a worthy investment.
The best enterprise social networks are fine-tuned to corporate culture. Using gamification to spur employee adoption of ESNs will depend on your workforce and industry regulations.
For the San Jose Sharks, employee morale and back-end integration factored heavily into choosing an enterprise social network tool but, as SearchCIO discovers, every company has its own reason for upping its ESN game.
Amazon WorkSpaces has gotten a lot of lip service in the DaaS market. It doesn’t require a long-term commitment and its pricing is competitive. But it's SLA-free and doesn't let you host Windows client OSes.
Attendees at BriForum 2014 in Boston learned about the hottest topics in end-user computing: desktop as a service hype, how Google Chromebooks fit with VDI, evaluating mobile operating systems and management vendors and more.
Desktop virtualization and end-user computing experts shared tips and tricks while vendors offered insight at BriForum 2014. Check out some of the best quotes from the conference here.
Cisco unveiled its managed service, Cisco Secure Ops Solutions, to help unify security risk management for business environments with isolated IT and industrial networks.
Arista, Google, Microsoft, Broadcom and Mellanox are developing 25 and 50 Gigabit Ethernet (GbE) top-of-rack switches. After initial reluctance, the IEEE is considering a standard for 25 GbE, but vendors may be out of luck with 50 GbE.
Updated Juniper security tool, DDos Secure, now offers broader DDoS intelligence to routers for improved attack mitigation.
An administrator wishing to implement the VSAN software-defined storage functionality in vSphere 5.5 can spare a drive for the cause.
Whether it's a routine task or a huge migration project, virtualization administrators can tap into the magic of automation through PowerCLI.
VMware announced vCenter Server Heartbeat licenses can no longer be purchased, which may mean other high availability options could be approaching.
A vendor's Heartbleed scan shows that a majority of Global 2000 organizations may still be vulnerable despite patching the OpenSSL flaw.
A variant of malware on Android devices removes and reinstalls itself when a device powers on or off. Learn how to completely eradicate the threat.
Big data clusters require a different security model. Four common approaches can help security teams migrate beyond familiar RDBMS techniques, to the tools and processes required in new database environments.
You can collect lead generation data from multiple sources and use a CRM system to target marketing and sales campaigns.
Wearable computing can gather data that gets crunched in real time with a device as small as a USB stick. But wearables are mostly single-purpose.
In devising and implementing a social CRM strategy, companies need to look within and make sure their company culture is set up for success before the first tweet is posted.