Microsoft's shift in focus on strengthening its offered services and providing compatible software across multiple platforms is a good indication that the company has plans to stay relevant in a post-Windows OS world.
- By Mary Jo Foley
Disk failures happen. Here's how to get back up and running with minimal effort.
The new process looks to verify the authenticity of a Google site before users provide their login details.
This month's security update has led to compatibility and installation errors for many users.
This month's security offering includes three bulletins rated "critical" and five "important" items.
This Windows Server 2012 feature makes it easy to set storage quotas and manage file types.
It's hard to sell units when customers can't find them in stores.
This step-by-step visual guide will get you up and running in no time.
- By Spike Xavier
Romanian hackers are targeting the Yahoo Games servers.
IT should keep an eye on some of Microsoft's upcoming cloud-based services, including Power BI and Enterprise Mobility Suite.
- By Mary Jo Foley
While the new features may be tempting, the new Hyper-V VMs' incompatibilities should stop you from jumping on board.
- By Greg Shields
IT's security spending is not keeping up with the reported 42.8 million security incidents in PwC's enterprise survey.
Does your IT team have the competencies it'll need to survive the remainder of this decade?
The 25-year-old flaw, which was just discovered on Wednesday, leaves systems running Linux and Mac OS X open to remote code execution attacks.
The longer you use the Windows Server tool, the more uses you'll find for it.
The remaining members will be absorbed into Cloud & Enterprise and Legal and Corporate Affairs groups.
From Cortana integration to the return of the Start Menu, here are some of the rumors circulating online about Microsoft's next OS.
The pulled item marks the third month in a row in which Microsoft has had to address issues with its monthly security update.
The tech company said it was fined $250,000 per day for not handing over requested user data.
Here's how to access the information you need when analyzing storage status.