It might come as no surprise that you can downgrade your Microsoft operating system one level, from Windows 8.x to Windows 7, for example, but did you know that you can limbo all the way down to Windows 95? You can.
There are no sacred cows to someone who believes that consumer devices and self-service IT are the keystones of the new business model. IT Apologist Ken Hess takes on Consumerization and bring your own device.
Kenneth 'Ken' Hess is a full-time Windows and Linux system administrator with 20 years of experience with Mac, Linux, UNIX, and Windows systems in large multi-data center environments.
Do you think you know all about the Internet of Things? Think again. Francis daCosta tells us why it's time to rethink the Internet of Things.
For the past seven years, Sara Sutton Fell, CEO and founder of FlexJobs.com has helped techies, and others, work flexible jobs. Work from home isn't just for stay-at-home moms or socially inept nerds; it's for everyone who has the discipline to do it.
SSDs are fast, quiet, and they make spinning disks obsolete. Meet the Crucial M5xx SSDs: M500 and M550, your spinning disk replacements.
As promised, here is an exclusive video that gives you an inside scoop on Hollywood high tech. This one covers bad guy Electro and the Green Goblin from the latest Amazing Spider-Man movie, The Amazing Spider-Man 2.
2x Software offers up a solution to your XP woes. Worry no more. The 2xLifeCyclePlus replacement shell for XP is available now and ready to serve.
It's a rare treat to see a new blockbuster movie like Amazing Spider-Man 2 before anyone else does, but it's an even rarer treat to get to talk to the people who made it and to see how they made it.
You'd better get ready for the personal computing, BYOD, and corporate computing revolution. Linux is coming to a desktop near you. But not like you think or had hoped. It's coming in the form of the Chrome OS on Chromebooks.
If you're considering implementing an IoT strategy for your business, you need a serious security plan. Here's your checklist of five security weak points and what to look for when you attempt to fix them.
The broadening of the FTC's powers to include cybersecurity and lawsuits over security breaches extends the government's ability to destroy businesses.