Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Computer Weekly networking case studies

        Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for networking.

        View E-Handbook
      • Contact center technology today requires a new approach

        Managing customer relationships today is about a whole lot more than a weekly newsletter and a few phone lines. Organizations ahead of the curve have accepted this rule, drilling down on customer experience management strategies designed to deal with the multitude of communication channels available to customers. It's not just about about the technology -- though, that is an important part of CEM. Successful customer service is also about strategy: how to ensure customers are satisfied at each and every point of contact, whether it's via smartphone, tablet, email or social media.

        This three-part guide will focus on the steps that companies need to start making to keep up. We kick off with a guide to forming a successful e-commerce strategy -- starting with six key factors that can make or break a customer's shopping experience and, ultimately, your business. Next we examine the "outside-in" approach to contact center technology -- putting yourself in the customer's shoes and making the technology they use to contact you as simple as possible. We close with a look at where tomorrow's CEM technology is heading.

        View E-Handbook
      • Special Report on VDI

        The articles contained here were written by Brian Madden, the fiercely independent thought leader in the world of virtualisation and mobility management. Along with his co-author Gabe Knuth, Brian is responsible for both “The VDI Delusion” and “Desktops as a Service” books – considered to be the most reliable sources of information on battling today’s technology pain points.

        View E-Handbook
      • Confront the problem with healthcare data storage

        State and federal data-retention regulations and an ever-increasing volume of data -- with imaging data as the biggest culprit -- are creating a big storage dilemma for many healthcare providers. Providers are required by law to store patient data for years and, in some cases, decades -- even though it's likely they will never give many pieces of data a second glance.

        So how to make room for the ever-growing mountains of healthcare data? Start with this three-part guide. Inside, our health IT experts outline useful tips for every step of the data management process. Readers will gain insight on the differences between data archiving and data backup as well as expert advice on storing and managing imaging data for the long term.

        View E-Handbook
    • Page 1 of 1
      • Hybrid cloud: When public and private clouds collide

        December 2013 Vol. 4 / No.6

        Includes:
        • Hybrid cloud: Who's in control when public and private clouds collide?
        • IPv6, SDN: When worlds collide ... in a good way
        • When cloud-based UC makes sense
        View E-Zine
      • E-book: Understanding cloud networks

        Cloud computing is catching on, but cloud networks are proving to be challenging to implement and manage. Before enterprises begin architecting their cloud computing networks, they need to consider the impact on the network. Read this e-book to find out what you need to know about cloud networks.

        View E-Book
      • Is the network ready for the private cloud?

        August 2011 Vol. 2, No. 4

        Includes:
        • Developing a private cloud computing strategy for your network
        • Is OpenFlow networking bunk? What vendors don't want to discuss
        • Zappos cloud security strategy: Distributed management
        View E-Zine
      • Network planning for cloud computing

        The cloud promises to be one of the most dramatic transformations in technology since IT shifted from mainframes to client server systems. Cloud computing comes in different shapes and sizes, and the architecture used will have an impact on the network. Network managers must be involved in cloud architecture decision-making, and must understand the impact that private, public, or hybrid clouds will have on the network. Read this e-guide to learn more about network planning for cloud computing.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 2
      • Does SDN change everything in network architectures?

        February 2014 Vol 5 / No.1

        Includes:
        • New network architectures and traditional components: Why both are key
        • Is service agility the payoff in network functions virtualization?
        • How WebRTC technology could turn enterprise video on its head
        View E-Zine
      • Your next switch: The data center's software-defined future

        The hardware-defined network is still around, but a software-defined switch is coming. Your next switch will include SDN features and will also need to be application-aware and integrated with robust security strategies. This handbook covers everything pros must know now about the software-defined switch of the near future.

        View E-Handbook
      • Converged infrastructure: The future of network efficiency

        Taking the complexity out of the data center has been a complex challenge in itself. Vendors have introduced have variety of ways to converge IT infrastructure to consolidate networking, storage and compute resources in the data center. But cloud computing and virtualization have changed what a converged infrastructure could look like. This handbook looks at the current state of converged infrastructure and how network virtualization and software-defined networking can help make converged infrastructure a reality.

        View E-Handbook
      • Revisiting past predictions for networking technology

        December 2011 Vol. 2, No. 6

        Includes:
        • Enterprise wireless connection policy: Navigating cellular vs. WiFi
        • FCoE network convergence will start at the edge but move to the rack
        • Myth of VM mobility and follow-the-sun data centers
        View E-Zine
      Page 1 of 2
    • Page 1 of 1
      • Upgrading your network: Top tips and timesavers

        This SearchNetworking.com handbook will explore the challenges, best practices and essential technologies for responding to the shortcomings of today's network, as well as future-proofing your network for tomorrow's business challenges. We offer step-by-step advice from experts on what you need to know about upgrading your network, and learn about common pitfalls to avoid. Finally, learn about the latest tools to help you make your network upgrade faster and easier.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Is virtual networking the link to end-to-end management?

        Network virtualization has lagged behind server and storage virtualization, which means “single-pane-of-glass management and monitoring” in the data center is still on the horizon. Although the advent of software-defined networking (SDN) may make virtual network management easier, most enterprises are looking for more use cases before setting out an SND strategy. One thing is clear: The virtual network can’t remain invisible to the network manager. This handbook looks at existing network management and monitoring options that will help enterprises see the value in adding the network to server and storage virtualization.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • WAN optimization policy goes deep

        June 2013 / Vol. 4/ No. 3

        Includes:
        • WAN security vendor: To go network hardware provider or third-party?
        • What is Ethernet-dedicated Internet?
        • WAN optimization policy goes deep: Think, user, time, location
        View E-Zine
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Harvesting business intelligence with network monitoring tools

        August 2013 / Vol. 4 / No. 4

        Includes:
        • CIOs are laying SDN plans, but slowly
        • The 802.11ad standard is fast, but do we need that much throughput?
        • When network monitoring tools improve business intelligence
        View E-Zine
      • The new generation of network management and monitoring

        Network management and monitoring have grown from being similar operations that were at times challenging to get distinct views of, to a sophisticated monitoring and management toolset to provide real-time performance data. While these requirements have been driven by trends like the need to monitor network devices and boundary performance, the onslaught of virtualization has made things more challenging. As a result, tracking both physical and virtual assets has become critical. This TechGuide will help you understand how these tools have evolved and give network managers some insight into ensuring optimum performance in your organization.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 2
      • Finally! APM vendors design tools with networking pros in mind

        April 2014 Vol.5 / No.3

        Includes:
        • Benefits of video conferencing include less travel, but it's not No. 1
        • Complex apps need network-based application performance management tools
        • 802.11ac Wi-Fi takes the lead, but wired network has to play backup
        View E-Zine
      • Assessing your options for increasing wireless LAN capacity

        Enterprises most often assess new wireless specifications in terms of speed, but capacity should also be at the top of the list due to the increased use of wireless LAN for functions that include file transfers and high-bandwidth video. Network engineers are increasingly challenged to make sure their WLANs have enough capacity to handle end-users' needs. This handbook looks at how enterprises can increase capacity in the WLAN with 802.11ac and examines the uses of 60 GHz wireless technology in the upcoming 802.11ad standard.

        View E-Handbook
      Page 1 of 2
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 2
      • Data center fabric wars

        August 2012 Vol. 3, No. 4

        Includes:
        • Deep packet inspection tools: Proxy vs. stream-based
        • Using wireless network bandwidth monitoring to stay within data caps
        • Data center network fabrics vs. software – defined fabrics
        View E-Zine
      • Network security in a world of mobile workers

        April 2012 Vol. 3, No. 2

        Includes:
        • Mobile device security best practices for BYOD
        • Is virtual desktop infrastructure the answer?
        • Networking for BYOD: No single solution
        View E-Zine
      Page 1 of 2
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 2
      • Understanding the new WAN: Management and design

        This TechGuide will help you understand the demise of the traditional WAN and the emergence of the new WAN. Articles focus on how mobile devices and an increase in teleworkers have forced IT departments to find new ways to connect users to corporate resources. This TechGuide digs deeps into how to design, manage and optimize this new endpoint-driven network and extend secure access to private and public cloud services and virtual applications.

        View E-Handbook
      • BYOD challenges that lurk beyond network security

        Feburary 2013 - Vol 4/ No.1

        Includes:
        • Balancing wireless LAN troubleshooting strategies for BYOD
        • Four IT shops, four approaches to BYOD network security
        • BYOD challenges that lurk beyond network security
        View E-Zine
      Page 1 of 2
    • Page 1 of 1
      • Next-generation WLAN: How IEEE 802.11ac will change your network

        Just five years ago, no one would have described Wi-Fi as a primary access technology but now, as Wi-Fi and cellular architectures deliver security, reliability and robust throughput sufficient to delivery video and multimedia content, wireless LAN (WLAN) is a critical enterprise component. With the IEEE 802.11ac-2013 standard approved, WLAN data rates will soar to multiple-gigabit territory. This TechGuide focuses on the WLAN's evolution and why it will soon be a viable alternative to Ethernet.

        View E-Handbook
      • Leveraging 802.11n for increased coverage and performance

        Deploying 802.11n can increase a WLAN's speed, capacity, reach and reliability, enabling mobility services that make workforces informed and productive. To be competitive, workers need ready access to data, people and tools for collaboration and decision making. Extending your network to deliver multimedia over wireless can make services like unified messaging and video conferencing available wherever needed. This e-book covers best practices for deploying and optimizing 802.11n to support data, voice and video applications.

        View E-Book
      • The mobile enterprise: Taking wireless networking to the next level

        Get the latest scoop on how faster, more robust 802.11n WLANs can help your business offer new mobility services to improve mobility and reduce cost through fixed-mobile convergence. Discover how unified communications applications can exploit wireless mobile connectivity to facilitate workforce collaboration and enhance productivity. And finally, get advice from our experts on mobile enterprise security.

        View E-Book
      Page 1 of 1

Featured E-ZINES on searchNetworking.comView all >>

  • Network Evolution

    Network Evolution magazine keeps IT professionals up-to-date on next-generation IT enterprise networking.

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchNetworking.comView all >>

  • Tap into enterprise data governance for business value

    Data governance is all about managing data as a business asset and ensuring that data is accurate, consistent, integrated, timely, complete and secure. This report examines the market trends for implementing data governance. Based on data from a recent survey of 317 business intelligence professionals, IT professionals and consultants, this SearchBusinessAnalytics Benchmark Report analyzes the responses and provides trend information on the increasing executive acceptance of the importance of managing data as a corporate asset, the current status and types of data governance initiatives, data quality and data governance benefits.

  • VM management and capacity prediction

    As hypervisor features have become more similar, the next vendor battleground will be over management software. Microsoft and VMware have similar capabilities, and now they'll look to make their products stand out by touting their management tools and complimentary products. Soon, IT pros won't spend time looking at unique features when they compare hypervisors; they will be looking at how an organization can use the hypervisor to improve workflows throughout the data center.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchNetworking.comView all >>

  • Computer Weekly networking case studies

    Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for networking.

  • Contact center technology today requires a new approach

    Managing customer relationships today is about a whole lot more than a weekly newsletter and a few phone lines. Organizations ahead of the curve have accepted this rule, drilling down on customer experience management strategies designed to deal with the multitude of communication channels available to customers. It's not just about about the technology -- though, that is an important part of CEM. Successful customer service is also about strategy: how to ensure customers are satisfied at each and every point of contact, whether it's via smartphone, tablet, email or social media.

    This three-part guide will focus on the steps that companies need to start making to keep up. We kick off with a guide to forming a successful e-commerce strategy -- starting with six key factors that can make or break a customer's shopping experience and, ultimately, your business. Next we examine the "outside-in" approach to contact center technology -- putting yourself in the customer's shoes and making the technology they use to contact you as simple as possible. We close with a look at where tomorrow's CEM technology is heading.

OTHER FEATURED E-HANDBOOKS