Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Penn Medicine’s approach to managing BYOD and security

        May 2013

        Includes:
        • Penn Medicine takes three-pronged approach to BYOD management, security
        • HIPAA omnibus rule and stage 2 test organizational compliance
        • Building HIPAA compliance, patient privacy investment business cases
        View E-Zine
      • Developing effective DR/BC plans

        Business continuity/disaster recovery planning is frequently overlooked, delayed or underfunded, because it can be painful to spend time and money on risk mitigation. As a result, we often read survey results that show IT managers are not confident in their company’s ability to adequately recover following a disaster. Indeed, year after year, our surveys show that organizations are not confident in their ability to recover data after an outage. And the reasons they cite remain largely the same. Some lack confidence in the backup/DR technologies they rely on. Others say that DR planning is too expensive and they can’t get management support for an initiative that isn’t directly tied to revenue. There are technologies and techniques available today that have simplified DR and made it more affordable. This handbook will offer tips on how to develop and implement a disaster recovery plan.

        View E-Handbook
      • Understanding SAP's social media collaboration, analytics software

        Nowadays, companies no longer have to guess what their customers think about their products or services. Customers are taking to social media channels like Twitter to praise, rant or just ask questions, all in real time. This presents unique challenges for companies as they struggle to make the best use of the information. SAP has a number of products designed to help interpret trends playing out on social media channels, but how well do they work, and how do they compare to the competition? How can companies decide if they really need this kind of software? This handbook looks at all those issues, and how social is infiltrating other parts of SAP's portfolio, such as the Jam social collaboration platform.

        View E-Handbook
      • Can HP, IBM and Dell survive the cloud?

        May 2013, Volume 2, Number 5

        Includes:
        • Get to know SoMoClo: Social, mobile and cloud technologies
        • Server vendors must innovate to stem bleeding
        • Looking to the future of legacy applications in the cloud
        View E-Zine
    • Page 1 of 1
      • E-book: Understanding cloud networks

        Cloud computing is catching on, but cloud networks are proving to be challenging to implement and manage. Before enterprises begin architecting their cloud computing networks, they need to consider the impact on the network. Read this e-book to find out what you need to know about cloud networks.

        View E-Book
      • Is the network ready for the private cloud?

        August 2011 Vol. 2, No. 4

        Includes:
        • Developing a private cloud computing strategy for your network
        • Is OpenFlow networking bunk? What vendors don't want to discuss
        • Zappos cloud security strategy: Distributed management
        View E-Zine
      • Network planning for cloud computing

        The cloud promises to be one of the most dramatic transformations in technology since IT shifted from mainframes to client server systems. Cloud computing comes in different shapes and sizes, and the architecture used will have an impact on the network. Network managers must be involved in cloud architecture decision-making, and must understand the impact that private, public, or hybrid clouds will have on the network. Read this e-guide to learn more about network planning for cloud computing.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Building the infrastructure to enable flat Data Center network architecture

        November 2010 Vol. 1, No. 1

        Includes:
        • Navigating the road to flatter, converged data center networks
        • Virtual cluster switching: Finding management in a flat network
        • ATA over Ethernet for converged data center networks? No way
        View E-Zine
      • Modern data center networking strategies

        Data center design is changing at a rapid pace, and network architects find themselves at a crossroads when selecting and implementing infrastructure. Their short-term and long-term goals often seem at odds, and they are dealing with major changes in traffic patterns and user needs. In addition, virtualization, the convergence of data and storage networks, and the evolution of how and where people work are all changing the way the data center should be designed. This e-book examines the issues and offers strategies for developing a data center network that will stand the test of time and emerging technology. Get access to the latest information on modern data center networking strategies in this guide.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Upgrading your network: Top tips and timesavers

        This SearchNetworking.com handbook will explore the challenges, best practices and essential technologies for responding to the shortcomings of today's network, as well as future-proofing your network for tomorrow's business challenges. We offer step-by-step advice from experts on what you need to know about upgrading your network, and learn about common pitfalls to avoid. Finally, learn about the latest tools to help you make your network upgrade faster and easier.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • The new era of network performance management

        Today's networks are highly complex, dynamic environments that demand comprehensive performance management. Fortunately, technological advancement is simplifying management and addressing new challenges. This e-book explains why network performance management is more important now than ever and how it can help deliver business-critical applications faster.

        View E-Book
      Page 1 of 1
    • Page 1 of 2
      • Data center fabric wars

        August 2012 Vol. 3, No. 4

        Includes:
        • Deep packet inspection tools: Proxy vs. stream-based
        • Using wireless network bandwidth monitoring to stay within data caps
        • Data center network fabrics vs. software – defined fabrics
        View E-Zine
      • Network security in a world of mobile workers

        April 2012 Vol. 3, No. 2

        Includes:
        • Mobile device security best practices for BYOD
        • Is virtual desktop infrastructure the answer?
        • Networking for BYOD: No single solution
        View E-Zine
      Page 1 of 2
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • BYOD challenges that lurk beyond network security

        Feburary 2013 - Vol 4/ No.1

        Includes:
        • Balancing wireless LAN troubleshooting strategies for BYOD
        • Four IT shops, four approaches to BYOD network security
        • BYOD challenges that lurk beyond network security
        View E-Zine
      • Upgrading wireless networks in the hospital

        In the next few years, hospitals will be rolling out all kinds of technology to improve patient care. Each of these devices and systems must be able to send and receive information instantly. This e-book will dig into best practices for upgrading wireless networks in health care organizations.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Leveraging 802.11n for increased coverage and performance

        Deploying 802.11n can increase a WLAN's speed, capacity, reach and reliability, enabling mobility services that make workforces informed and productive. To be competitive, workers need ready access to data, people and tools for collaboration and decision making. Extending your network to deliver multimedia over wireless can make services like unified messaging and video conferencing available wherever needed. This e-book covers best practices for deploying and optimizing 802.11n to support data, voice and video applications.

        View E-Book
      • The mobile enterprise: Taking wireless networking to the next level

        Get the latest scoop on how faster, more robust 802.11n WLANs can help your business offer new mobility services to improve mobility and reduce cost through fixed-mobile convergence. Discover how unified communications applications can exploit wireless mobile connectivity to facilitate workforce collaboration and enhance productivity. And finally, get advice from our experts on mobile enterprise security.

        View E-Book
      Page 1 of 1

Featured E-ZINES on searchNetworking.comView all >>

  • Network Evolution

    Network Evolution magazine keeps IT professionals up-to-date on next-generation IT enterprise networking.

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchNetworking.comView all >>

  • Tuning performance and capacity management

    As data centers virtualize a greater number of resources and scale for more workloads, two tasks become critical to ensure application performance: performance monitoring and capacity planning. Whether these servers are physical or virtual, performance monitoring is crucial to ensure that hardware can handle the workload, and capacity planning tools and techniques enable you to plan for peak loads and adjust for predicted changes in demand. In this series on monitoring and capacity planning, we explore the tools and best practices available to optimize a data center/private cloud environment and forestall performance issues.

  • Log management tightens data security and IT performance

    Log management is a compliance cornerstone in today's enterprise IT environment. The chief benefit of log management is the way in which it offers IT compliance officers the ability to ferret out malicious behaviors and data security threats posed both by internal users and external threats. Given the proliferation of data in modern organizations and corresponding concerns about unauthorized access, this is not a minor consideration. A committed log management strategy can also help IT executives sort through operational bottlenecks at all levels of the enterprise by cataloging incidents and allowing for a simpler review of this information. In this log management buyer's guide, find out how a log management program can guide you in managing your organization's security and operational concerns. This guide also contains a list of vendors offering their services in the log management arena.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchNetworking.comView all >>

  • Developing effective DR/BC plans

    Business continuity/disaster recovery planning is frequently overlooked, delayed or underfunded, because it can be painful to spend time and money on risk mitigation. As a result, we often read survey results that show IT managers are not confident in their company’s ability to adequately recover following a disaster. Indeed, year after year, our surveys show that organizations are not confident in their ability to recover data after an outage. And the reasons they cite remain largely the same. Some lack confidence in the backup/DR technologies they rely on. Others say that DR planning is too expensive and they can’t get management support for an initiative that isn’t directly tied to revenue. There are technologies and techniques available today that have simplified DR and made it more affordable. This handbook will offer tips on how to develop and implement a disaster recovery plan.

  • Understanding SAP's social media collaboration, analytics software

    Nowadays, companies no longer have to guess what their customers think about their products or services. Customers are taking to social media channels like Twitter to praise, rant or just ask questions, all in real time. This presents unique challenges for companies as they struggle to make the best use of the information. SAP has a number of products designed to help interpret trends playing out on social media channels, but how well do they work, and how do they compare to the competition? How can companies decide if they really need this kind of software? This handbook looks at all those issues, and how social is infiltrating other parts of SAP's portfolio, such as the Jam social collaboration platform.

OTHER FEATURED E-HANDBOOKS