Enterprise IT vendors are rushing to protect users from the Heartbleed bug, which has been found in some servers and networking gear and could allow attackers to steal critical data -- including passwords and encryption keys -- from the memories of exposed systems.
VMware is about to release a new version of its Horizon VDI (virtual desktop infrastructure) software that will allow administrators to manage VDI and non-VDI deployments in a unified manner, by using multiple VMware technologies.
The proposed $45.2 billion acquisition of Time Warner Cable by Comcast would give the company huge market power to determine broadband prices and Internet content, a group of U.S. senators said Wednesday.
If the imminent end-of-support deadline for Windows XP has finally spurred you to make the update to Windows 8, you might be concerned about whether you'll still be able to run your old programs. Fortunately, there's a way you can run any Windows XP software you wish, using virtualization.
Apple and Samsung were back in San Jose federal court last week arguing over more patents and another set of devices. Apple is demanding more than $2 billion in damages, in the second case between the companies in California.
The make-or-break project kept engineers just out of college working around the clock hunting down bugs. The product had so much buzz that speculators bought up units to resell later for a profit. The company invested so much in development that its future was riding on success.
When it comes to security risks, BYOD is the gift that keeps on giving. But what about the devices that your employees used to use, gave up on and, months later, finally dug out of the closet to sell? That's another issue to wrestle with. Here are seven ways to beat the monsters.
Every business, it seems, needs a data scientist, but not everyone knows what to look for. The four qualities of a good data scientist described here will help you first write a job description and then evaluate candidates for your data scientist vacancy.
One of the legacies of Edward Snowden's treason is that companies are now concerned about the insider threat more than they ever were before. He demonstrates that a single person inside an organization can devastate the organization. While technology should have caught Snowden, there is also the realization that his coworkers and managers should have noticed indications of unusual activities.
As networking continues to expand and diversify, encompassing a growing number of wired and wireless devices, the demand for network monitoring tools remains high. While feature-packed commercial products abound, the growing market for monitoring tools has also fueled robust offerings from the open source community.
As the evasion of consumer tech changes IT, it makes sense that support for consumer devices would start to reflect the retail experience. Think Apples Genius Bar. Mike Burgio of Inergex, an IT services firm, talks about why IT leaders need to think about hitting the bar.
There's a lot to like in Windows Server 2012 R2, but the key question centers around how Microsoft will handle licensing, our reviewer says. That alone might be the gating factor for the eventual success of this OS release.
The future of IT will be systems that are intelligent enough to detect and solve problems without human interaction, CIO.com columnist Rob Enderle conjectures. This will be great for analytics but bad for security--and it may leave IT workers reaching for Valium.
CIOs in emerging economies have to be creative to keep IT up and running -- addressing redundancy, navigating a thicket of sometimes onerous regulations, and in general doing more with less. Insider (registration required)
Word's out that Microsoft is poised to reorganize itself as a 'device and services' company. CEO Steve Ballmer has been trying to do this for a decade, but executives disloyal to him--or still loyal to Bill Gates--often got in Ballmer's way. But Redmond's successes, including Azure and Office 365, suggest this culture may finally be changing.