Lost laptops pose obvious risks to enterprise data and systems, but a variety of laptop finder products can help put admins' minds at ease.
Although Microsoft's Modern.ie can be helpful with testing Windows app compatibility with Internet Explorer, there are some things to keep in mind.
Windows 8 supports past versions of Microsoft Office, but installation problems may interfere with getting Office 2007 Ultimate to run in Windows 8.
Forrester's Andy Bartels spells out the reasons CIOs remain central to tech budgets, starting with the reality that CMOs don't want to go it alone.
Experts from Cisco, Caesars, Schneider, and GE give their two cents on how BI and analytics trends will evolve in the next two years.
As corporations go high-tech, the bad guys go low-tech around cyberdefenses. Here's what CIOs miss and how to go on the cyberoffense.
VMware GPU virtualization options Soft 3D, vSGA and vDGA have different uses and benefits, but they all help companies reap performance rewards.
VMware is trying to usurp Citrix's throne with Horizon 6, but the suite faces some challenges, including Citrix's years of app remoting experience.
Focus on delivering data, not applications. You can give users offline access to data, but applications often rely on an online connection.
Enterprises are revisiting their security policy management processes in wake of high-profile breaches, but security fundamentals can't be ignored.
New Cisco managed security services collect enterprise network telemetry and apply real-time analysis and detection of threats.
In the age of the virtual enterprise, hybrid cloud performance is crucial. Watch this video to learn how to improve cloud delivery.
VMware's vExpert program can offer many benefits, both professional and personal. Is the program worth the cost of admission?
Without correct implementation and persistent monitoring, a resource pool can cause more problems than it solves.
Not all management tasks in a vSphere environment are handled from the vSphere client. Some require commands executed from ESXi Shell.
A number of tech giants have pledged financial help to OpenSSL and other open-source projects after the Heartbleed bug exposed numerous issues.
Java-based malware and JRE vulnerabilities are a constant enterprise threat. Expert Nick Lewis reveals how to reduce (or at least tolerate) the risk.
The security practices in place at healthcare organizations is not up to par with those of other, more mature industries, according to an FBI notice.
Mobile POS systems free salespeople from being chained to registers, allowing them to serve customers where they are: on the retail floor.
While call centers have gotten a bad rap, new contact center technologies have helped turn their reputation around.
Customer nurturing helps companies solidify relationships with existing customers -- who make up 80% of company revenue; new customers claim only 20%.