No problem! Submit your e-mail address below. We'll send you an email containing your password.
There are good reasons to migrate to Windows 8, but a few Windows 8 drawbacks could be deal-breakers for some who might want to wait for Windows 9.
Despite the end of Microsoft's Windows XP support, many IT shops are sticking with the OS, and there are third-party options for security support.
Are the supposed Windows 8 benefits enough to justify a migration? Our expert takes a look at potentially useful Windows 8 features.
Not all rogue IT is bad for business. Here, we look at how CIOs keep tabs of the tech outside of IT and handling risk.
The consumerization of IT and increasing demands for business agility are forcing the evolution of rogue IT. How are CIOs responding?
When thinking of rogue IT in today's enterprise, envision the Big Bad Wolf from Little Red Riding Hood.
A new tool from Spoon virtualizes any browser and streams it from the Web, which helps cut through some of the more annoying app demands.
While journeying through your virtual desktop migration, two important steps are to ensure VDI uptime and data availability -- especially on the go.
Before you deploy VDI, you need to take stock of your applications, how often they're used, and how users access them. Plus, make a long-term plan.
With the ratification of the IEEE 802.11ac standard, Ethernet is all but dead. But is your organization's network ready for gigabit speeds?
The white-box switch market grew exponentially in 2013 thanks to hyperscale companies and cloud providers, but will enterprises buy in?
SN blogs: MWC highlights new mobile technology, Apple comes out with improvements to its MDM program, and analysts discuss big data and security.
VMware's vCenter Log Insight gives systems administrators a tool to troubleshoot both their virtual environment and physical devices.
There are times when VMware's vCenter Log Insight needs a nudge to troubleshoot an underperforming vSphere data store.
Getting the newest ESXi platform running in a home lab requires some ingenuity if the necessary drivers aren't in the general availability release.
Speakers at RSA Conference 2014 said information security incident response teams must identify and prep key participants well before incidents occur.
Expert Nick Lewis details how the Tilon malware strain utilizes a unique communication protocol with its C&C infrastructure.
Expert Nick Lewis explains the logic behind the 'Bouncer' attack toolkit and its seemingly contradictory use of whitelisting security methods.
Social CRM tools have hit the mainstream. Companies that don't monitor what customers and competition are saying about them could get left behind.
Community software gives customers a new avenue to voice their opinions and grievances, but high-touch interaction is still part of customer service.
Customer support software exploits community forums to address customer support issues in a low-cost way.