Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Does Windows 8.1 meet the demands of the BYOD age?

        The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features and tools; Windows 8.1 is Microsoft's response. Windows 8.1 includes what is promised to be a less frustrating two-factor authentication method, plus improved malware resistance and better VPN and app management. This handbook presents a concise review of Window 8 security tactics and compares its promises to reality.

        View E-Handbook
      • Cloud migration confidential

        September 2014, Volume 3, Issue 8

        Includes:
        • How to implement a solid DevOps team structure
        • Docker containers, virtualization can work in harmony
        • What's the best data center network topology?
        View E-Zine
    • Page 1 of 1
      • Cloud computing applications force attitude adjustment in the enterprise

        With companies everywhere still grappling with the bring-your-own-device phenomenon, industry observers are pointing to fast-growing "bring your own cloud" as the real trend to watch. Employees are increasingly bringing their own cloud apps to work, creating new headaches for the business side, where managers may have workers using a variety of different tools, and for the IT team, which could find itself tackling any number of new security threats.

        In this three-part guide, consultant Tom Nolle and journalist George Lawton discuss the trend -- while offering sound advice for organizations looking to keep ahead of the cloud curve. First, Nolle looks at potential outcomes from the BYOC trend -- specifically, what it means for worker and application support in the enterprise. In the next piece, readers will examine the tenuous balance of cost advantages and security risks that are part and parcel to personal cloud-hosted services. Yet more trends -- cloud storage being the most common -- further threaten that necessary balance. To close, Lawton picks the brains of two early cloud adopters, a major medical supply vendor and NASA's Jet Propulsion Laboratory, to advise readers on cloud pilot program best practices.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Up, up and away: Java app development heads to the cloud

        With all the hype surrounding cloud computing, everyone is eager to see how the cloud "revolution" will play out. And while a "paradigm shift" might be interesting for analysts and theorists, day-to-day IT professionals need to know how the cloud changes day-to-day IT. In this expert handbook, see how the advent of cloud computing is affecting Java app development. Learn about the specific ways in which Java development is moving into the cloud, how cloud security is evolving, and what to expect in the near future from Java in the cloud.

        View E-Handbook
      • Developing for the cloud: Challenges and best practices

        The developer is in demand more than ever, and yet the role still alludes most in the IT world. With some insight into cloud computing, platforms and ecosystems, development processes can be more clearly defined, and the part of the developer will come into focus.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • What to know about PaaS in the cloud

        Platform as a Service technologies have quickly evolved beyond just supporting application development for Software as a Service. PaaS technologies and providers now offer broad application lifecycle management support, and more are on the way. In addition to having more services from which to choose, application decision makers also have more vendors to evaluate, as more than 50 PaaS cloud vendors are vying for customers today. This handbook shows what PaaS technologies and providers offer today and will offer in the future -- as well how to evaluate both.

        View E-Handbook
      • Cloud architecture key to leveraging cloud-based services

        February 2012, Issue 1

        Includes:
        • Java Platform as a Service providers vie for developers' affection
        • VIP Art Fair picks OpDemand over RightScale for IaaS management
        • Java PaaS providers compete for the attention of developers
        View E-Zine
      Page 1 of 1

Featured E-ZINES on searchCloudApplications.comView all >>

  • Business Information

    Cloud computing, mobile devices and massive amounts of data flowing into organizations are combining to put heavy pressure on business systems. To adapt, organizations have been forced to transform the way in which corporate information is managed.

  • Cloud Development Digest

    Access essential resources aimed at educating IT and development managers on the latest trends, strategies and best practices in cloud development.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchCloudApplications.comView all >>

  • Enterprise Hadoop: Ready for prime time?

    Many vendors are pitching Hadoop as the foundation for enterprise data management environments that delivers information and insights to business users and serves as a hub for other data systems and applications. In the era of big data, the case for Hadoop is strong: Hadoop provides a cost-effective way to ingest, store and process large volumes of multi-structured data. With Hadoop, organizations can store all data in its original format and provide a system of record for the enterprise. Even more, they can bring the applications to Hadoop and process the data in place.

    But does reality square with the promise today? Are companies willing to trust their enterprise data to Hadoop? The big question is whether Hadoop is ready to support enterprise-scale, production environments where data can't be corrupted or inconsistent. Does Hadoop have adequate management, monitoring, backup, recovery and security features? What are the major gaps today and what are vendors doing to plug the holes? At what point can companies trust production computing environments to Hadoop? This report, based on a comprehensive survey of business intelligence professionals and interviews with experts in the field, addresses these questions.

  • Overcome today's disaster recovery challenges

    The use of devices not connected to a local network is a challenge for IT staffs tasked with protecting data on those devices. Completing backups within a reasonable timeframe has become an issue for organizations. Some organizations are opting for alternatives to traditional backup to address these challenges. The cloud has been pushed as an alternative to tape for offsite storage for disaster recovery. However, there are challenges with this approach and with protecting applications running in the cloud.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchCloudApplications.comView all >>

  • Does Windows 8.1 meet the demands of the BYOD age?

    The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features and tools; Windows 8.1 is Microsoft's response. Windows 8.1 includes what is promised to be a less frustrating two-factor authentication method, plus improved malware resistance and better VPN and app management. This handbook presents a concise review of Window 8 security tactics and compares its promises to reality.

  • Social networks in the enterprise: Collaborate seamlessly

    CIOs have swung from dismissing social networks in the enterprise to applauding and seizing on their potential to boost business productivity and creativity. In this SearchCIO handbook, we examine the latest trends in enterprise social networking, the tools that enhance collaboration and the role of CIOs in this communications revolution.

    In our first piece, business writer Christine Parizo finds out how the San Jose Sharks and other organizations are using enterprise social networking tools in a seamless, engaging and effective manner. In our second piece, expert contributor Harvey Koeppel introduces the acronym SMAC into his analysis of how social media technologies, as well as mobile, cloud and analytics, have transformed business communications. In our third piece, CTO Niel Nickolaisen dubs social networks in the enterprise the new email, and explicates how IT should handle these new tools.

OTHER FEATURED E-HANDBOOKS