Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Open Information Security Management Maturity Model (O-ISM3)

        Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives.

        View E-Handbook
      • CW+ Open Group: The Open Group Architecture Framework (TOGAF™ 9) and the US DoD

        This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM phases to develop a visual, integrated model of an architecture. The intended audience is the DoD architect who can benefit from a formal methodology to guide architecture efforts and result in a quality architecture description in a DoD-compliant format, and the TOGAF architect who can benefit by a formal set of defined models to capture output for each of the ADM phases. This document provides the architect with a map of the specific DoDAF 2.0 model that should be produced or consumed in a specific phase of TOGAF 9 with enough context to understand the fundamental concepts of both DoDAF and TOGAF.

        View E-Handbook
      • Open Group: FAIR -ISO/IEC 27005 Cookbook

        This document discusses the different purposes of the two standards, how to reconcile the two with regard to terminology and process, and combine the best elements of both to produce a consistent, repeatable risk management process.

        View E-Handbook
      • Governance in IT and Architecture - TOGAF

        The primary audiences for this Paper are business and IT managers who are responsible for the performance of operations. However, enterprise architects also play a key role in supporting IT governance, including architecture governance. Governance is defined as giving direction to activities. In this Paper, the authors focus on governance of the IT domain and its alignment to business. Governance is viewed as a mechanism that influences the internal logic and decision-making of organizations. The internal logic is defined as a compromise between practically conflicting parameters. The mechanism that has to deal with these conflicting parameters consists of decision domains, governance structure, social processes between individuals and groups, and controls to ensure the proper functioning of IT governance. In the context of IT governance, enterprise architecture can be considered as a means for coordination of decision-making related to IT and business. Furthermore, it is recognized that enterprise architecture in its own right also needs to be governed.

        View E-Handbook
    • Page 1 of 1
      • The latest on cloud backup and cloud disaster recovery

        The earliest and still most widely used cloud storage services were designed for backing up small organizations’ data. Today, many of those services have upgraded their products to serve enterprise clients as well. Combined with server virtualization, cloud storage can provide an agile, inexpensive route to business continuity. According to Storage magazine/SearchStorage.com research, the next most popular application for cloud storage is disaster recovery. Find out the latest information on cloud backup and cloud disaster recovery and learn effective deployment and management techniques in this valuable handbook.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Master the complexities of using cloud storage

        Companies of all sizes are investing in cloud technology, even if it's just using an outside provider for cloud backup. But what about using cloud storage as an archive or for primary data? Or a hybrid scenario where you meet your own, on-premises criteria for cloud storage and use a gateway to ship data associated with some applications to the cloud? Now you’re talking about major decisions surrounding service providers, appliances and security.

        The articles in this drill-down offer insight into the latest cloud technology, and tell you the key questions you need to ask your service provider, and your storage team, if you decide to buy or build cloud storage technology. Find out what our experts say are the most important things to know when drawing up your cloud roadmap, and which tools can be most helpful when it comes time to deploy cutting-edge cloud technology.

        View E-Handbook
      • The two faces of file sync and share

        Bring your own device, file sync-and-share technology and an increasingly mobile workforce are changing the requirements for how workers want (and need) to access corporate data, and putting new pressures on storage administrators. IT is no longer in a command-and-control role where they can dictate the hardware and software that employees use. Workers wanting to get to their files anywhere, anytime and from a variety of endpoint devices have turned to consumer cloud-based file-sharing and collaboration services. These services can be simple to use, but they pose a new challenge for IT when it comes to deciding how to police, patrol, monitor and protect the information employees keep and share in these files. This handbook takes a closer look at the growing sync-and-share phenomenon and offers real-world advice from experts and peers on how to address accessibility and security issues.

        View E-Handbook
      • Moving data to the cloud: Advice, how-to tips and use cases

        In this handbook on finding the right data for cloud storage, industry experts Marc Staimer and Arun Taneja share their best practices and experiences with cloud installations and moving data to the cloud. They’ll outline how to evaluate your organization’s security plans, recovery times, accessibility needs and cost requirements to determine where and when to apply cloud technology. In addition, they’ll answer such key questions as: What about primary data and the cloud? Will I need to rely on object storage? and Can a public cloud meet my availability requirements? Whether you’re just beginning your search for a cloud storage provider, considering a hybrid cloud project or building your own private cloud, this handbook can serve as a guide to your project and help you design a roadmap for moving data of all types to the cloud.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Architecture essentials and options when implementing a private cloud

        Building a private cloud means trying to replicate the elasticity, scalability and on-demand accessibility that large public cloud providers can offer, but doing it on your own. In strategizing for private cloud implementations, data storage pros must understand the requirements and functions of a private cloud.

        This handbook offers a detailed plan for implementing a private cloud, drills into virtualization and object storage technology choices, and includes expert advice on how to design on-demand, internal cloud services and guarantee multi-tenancy, geographically aware systems. Read our expert content to help you decide whether a private cloud implementation makes sense for your organization, how to get started and why many industry analysts say private clouds can be a good fit for organizations of any size.

        View E-Handbook
      •  
      Page 1 of 1

Featured E-ZINES on searchCloudStorage.comView all >>

  • Storage magazine

    Storage magazine keeps IT and storage managers up to date on new storage technologies, and how those techs can meet emerging business requirements.

  • CIO Decisions

    Enterprise CIO Decisions Ezine offers IT and business strategies and insights on the latest technologies making waves in the modern IT organization.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchCloudStorage.comView all >>

  • Forging the path to tomorrow's CRM

    Perhaps no two words have more of an effect on business today than "customer experience." Consumers have a wealth of options for buying products and services -- and they're not shy about letting the social media sphere know when they’re not happy. To keep them coming -- and coming back -- organizations need to ensure that the experiences they’re serving up are nothing less than stellar.

    In our e-book series, The Risks and Rewards of Customer Experience Management, readers will get practical advice and real-world insight into strategies that place the focus of organizations' operations and processes on their customers. The first chapter concentrates on automation in the contact center. It will explore the technologies, such as interactive voice response and virtual agents. And it will examine what organizations need to evaluate when deciding which processes to automate and which areas will always need a human touch. The second installment delves into digital marketing, mobile applications and social media. It's no longer enough to send the same message to all customers; messages now must be personalized -- and soon, based on where customers are at any given moment. The chapter will look at location-based automated marketing and the pros and cons -- including the loss of privacy -- associated with such practices. The final chapter digs deep into the role of analytics in customer experience management plans, scrutinizing data harvesting methods and ways to use big data to augment customer experiences. And the chapter will look at times when knowing all about your customer goes horribly wrong.

  • Market trends tell the future of predictive analytics deployments

    Predictive analytics employs statistical or machine-learning models to discover patterns and relationships in data, thereby enabling the prediction of future behavior or activity. Long used by credit card companies, predictive analytics -- and now self-service predictive analytics -- is making inroads in organizations of all sizes. Based on a survey of more than 3,000 IT and business professionals, this report analyzes their responses to provide information on implementation status, maturity of implementations, value and vendors of predictive analytics tools.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchCloudStorage.comView all >>

  • Open Information Security Management Maturity Model (O-ISM3)

    Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives.

  • CW+ Open Group: The Open Group Architecture Framework (TOGAF™ 9) and the US DoD

    This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM phases to develop a visual, integrated model of an architecture. The intended audience is the DoD architect who can benefit from a formal methodology to guide architecture efforts and result in a quality architecture description in a DoD-compliant format, and the TOGAF architect who can benefit by a formal set of defined models to capture output for each of the ADM phases. This document provides the architect with a map of the specific DoDAF 2.0 model that should be produced or consumed in a specific phase of TOGAF 9 with enough context to understand the fundamental concepts of both DoDAF and TOGAF.

OTHER FEATURED E-HANDBOOKS