Windows 8 supports past versions of Microsoft Office, but installation problems may interfere with getting Office 2007 Ultimate to run in Windows 8.
The ongoing plague of POS security breaches is a reminder to desktop admins that endpoint security policies should always be a work in progress.
Find out about a quick, free alternative to the Windows 7 USB/DVD Download Tool -- the open source Reliable USB Formatting Utility.
CIOs harness the power of cloud computing and fine-tune their individual cloud model to the business' benefit.
Two small businesses with big website requirements explain how they ultimately got what they wanted in a website developer.
SearchCIO has rounded up free templates from around the Web providing guidance on IT vendor selection, social sharing and mobile device policies.
If your device uses a configuration server, it might be a zero client. But it might not. Here’s how to find out.
Thin clients used to be the thinnest, but now zero clients are giving them a run for their money with almost no storage or configuration requirements.
Experts agree VDI adoption may never make it above the 20 percent mark, but you'll still have to deliver Windows applications to the other 80 percent of desktops.
Cloud visibility is a major challenge. Luckily, there are options for creating observation posts in hybrid infrastructures. Here are some to consider.
NAC technology is stepping up to the plate to give better BYOD access control to enterprises.
Meru and Aerohive build affordable 802.11ac access points to put premium Gigabit Wi-Fi within reach of more businesses.
Without correct implementation and persistent monitoring, a resource pool can cause more problems than it solves.
Not all management tasks in a vSphere environment are handled from the vSphere client. Some require commands executed from ESXi Shell.
Starting with vSphere 5, VMware brought single sign-on functionality to vCenter to give administrators another way to manage identities.
When it comes to app risk management, who is ultimately responsible: business leaders or security professionals? A new report weighs in.
Expert Ernie Hayden explains how critical infrastructure organizations can use the NIST cybersecurity framework to assess, improve infosec practices.
Does your enterprise track eliminated firewall rules? It's one of the change management best practices suggested by expert Brad Casey.
Marketing automation tools have progressed, but the field is still developing. Here are buying considerations for marketing automation software.
At the AIIM 2014 conference, Guy Kawasaki outlined three pillars of behavior common to companies that have mastered the art of customer enchantment.
Customer self-service is a low-cost way to emancipate customers from phone-queue purgatory. But it's only part of a broader customer service strategy.