Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Open Trusted Technology Provider Standard (O-TTPS)

        The O-TTPS is an open standard containing a set of guidelines that when properly adhered to have been shown to enhance the security of the global supply chain and the integrity of Commercial Off-The-Shelf (COTS) ICT products. It provides a set of guidelines, requirements, and recommendations that help assure against maliciously tainted and counterfeit products throughout the COTS ICT product life cycle encompassing the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal.

        View E-Handbook
      • The identity perimeter

        Successful businesses recognise the value of open communications within and beyond their organisations. However, achieving this means that the physical and virtual perimeters that had previously defined the reach of most organisations’ IT systems have disappeared. This report makes the case for the use of identity and advanced single-sign-on (SSO) to overcome many of the issues of providing open integration between businesses and their customers and partners. It should be of interest to all those in roles charged with the responsibility of providing secure access to online resources and to those who want to make the case for rolling out new online services, but have to overcome the security concerns of others in their organisation before they get the approval to do so.

        View E-Handbook
      • Enabling the secure use of RFID

        UHF radio frequency identification (RFID) promises vastly improved data collection and the analysis of physical objects from consumables to patients. Before its full potential can be exploited, it is critical that security surrounding its use is effectively implemented to ensure the data itself is not exploited

        View E-Handbook
      • Effective print management

        More businesses are now adopting a print management strategy to tackle rising print costs, enhance document security and reduce environmental impact. Intelligent print management features such as secure document release, rules-based printing and advanced reporting are helping businesses operate a cost-effective, secure and sustainable print environment.

        View E-Handbook
    • Page 1 of 1
      • Identity management in the era of cloud and mobility

        Managing identity and access in the cloud represents a difficult challenge for IT administrators. Proper identity management contributes to a secure IT operation and is an element for a number of compliance regulations. For those and other reasons, an organization’s ability to control who accesses particular areas of an IT environment is important. Many IT organizations, however, aren’t succeeding; one Gartner report suggests almost half of businesses take the wrong approach to identity management. The cloud and the prevalence of mobile devices only adds layers of complexity to the problem. This handbook looks at tools and best practices that can help ensure an organization is properly handling identity management in the cloud. It will include discussion of tools and methods to manage authentication, how to work with cloud providers, and how Active Directory can and cannot help.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Ten reasons to upgrade to Windows Server 2008 R2

        It's always difficult to make a change in your server operating system, especially if your current solution mostly meets your needs. But organizations running older versions of Windows Server should take a hard look at upgrading to 2008 R2, which offers a number of new features that can serve to increase productivity and lower the total cost of ownership (TCO). In this handbook we explore the enhanced capabilities of Windows Server 2008 R2 (Service Pack 1), including Hyper-V improvements such as live migration and dynamic memory. This handbook takes a look at BranchCache, the product’s automated caching capability, the DirectAccess remote management feature, several PowerShell enhancements and the product’s ability to reduce power consumption. We'll take a close look at how to get the most from your upgrade, including insights on what are the most useful third-party tools and what hardware options are best for your server needs. If you aren’t ready to make the switch just yet, we'll discuss what you can do in the interi m, including how to test and update your 32-bit applications to ensure they'll be compatible with the 64-bit Windows Server 2008 R2 platform.

        View E-Handbook
      • Windows Server 2008 R2 migration checklist for SMBs

        Data centers that are still running Windows Server 2003 or Windows 2008 should look to migrate at least some legacy servers to Windows 2008 R2 in order to take advantage of its greatly expanded manageability options. And as organizations move existing servers to new hardware, they also need to take a close look at consolidation and virtualization as a way to free up space in the data center. This handbook highlights key considerations -- taking an inventory of server roles, ensuring application compatibility, creating a migration target plan, and selecting the correct edition of Windows -- to make your Win2008 R2 migration a success.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Windows Server 2012 migration station

        Windows Server has traditionally formed the cornerstone of the IT infrastructure in many organizations, and, for a majority of those companies, that will remain true. Enhancements in areas such as automation and scalability, however, make Windows Server 2012 much more of a cloud tool.

        This handbook provides details about what's changed in Windows Server 2012 and Windows Server 2012 R2. It also includes guidance on how best to bring Windows Server 2012's enhanced capabilities into a data center with as little disruption as possible.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Evaluating hardware for Windows Server 2008 R2

        You might think selecting the right system to run Windows Server 2008 R2 would focus largely on price/performance factors. While these factors are high on the list, there are other key considerations. In this handbook, we explore hardware considerations for Windows Server 2008 R2, including processing power, memory, storage capacity and built-in networking connectivity and management hooks needed to properly run an application workload and a specific version of Windows Server. We also evaluate maintenance contracts and which one best suits your business needs, which hardware add-ons are worthy to bundle with the system and which built-in software you need to more easily deploy the hardware in production environments. We also review hardware requirements to get ready for Microsoft’s next-generation operating system.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • How to successfully manage Windows Server storage

        This e-book addresses some of the most critical issues affecting Windows servers and storage -- from choosing the right server to planning your server room and assessing your storage needs, get useful, applicable information that can help you manage Windows Server storage and integrate your servers and storage smoothly.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Can Microsoft map the future of IT?

        Microsoft is in an unusually busy period, releasing new versions of 12 of its products, with an eye toward better integration of systems and applications to brace environments for the cloud era. With coverage of Office 365 to Windows Desktop and Server to Office 15 and Exchange, this e-book looks at the feature updates that could make a difference in how you operate your day-to-day IT environment all the way from the data center to mobile devices.

        View E-Book
      •  
      Page 1 of 1

Featured E-ZINES on searchWindowsServer.comView all >>

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.

  • Network Evolution

    Network Evolution magazine keeps IT professionals up-to-date on next-generation IT enterprise networking.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchWindowsServer.comView all >>

  • Cloud storage challenges and choices

    Our comprehensive e-book tackles the cloud storage challenges and business decisions that surround cloud storage investments, and breaks them into three areas of concentration: architecture, availability and return on investment.

    Get the latest updates on architectural choices when using the cloud for storage, including cloud controllers and application programming interfaces. We provide a short list of technical capabilities to look for in a cloud controller and questions to ask your service provider. Learn which metrics your peers are using to determine if cloud storage projects are meeting their potential, and what sort of service levels you can expect from providers or hybrid projects. Discover how to leverage the most cutting-edge cloud technologies and how not to get taken advantage of when choosing a cloud storage strategy/service.

  • Forging the path to tomorrow's CRM

    Perhaps no two words have more of an effect on business today than "customer experience." Consumers have a wealth of options for buying products and services -- and they're not shy about letting the social media sphere know when they’re not happy. To keep them coming -- and coming back -- organizations need to ensure that the experiences they’re serving up are nothing less than stellar.

    In our e-book series, The Risks and Rewards of Customer Experience Management, readers will get practical advice and real-world insight into strategies that place the focus of organizations' operations and processes on their customers. The first chapter concentrates on automation in the contact center. It will explore the technologies, such as interactive voice response and virtual agents. And it will examine what organizations need to evaluate when deciding which processes to automate and which areas will always need a human touch. The second installment delves into digital marketing, mobile applications and social media. It's no longer enough to send the same message to all customers; messages now must be personalized -- and soon, based on where customers are at any given moment. The chapter will look at location-based automated marketing and the pros and cons -- including the loss of privacy -- associated with such practices. The final chapter digs deep into the role of analytics in customer experience management plans, scrutinizing data harvesting methods and ways to use big data to augment customer experiences. And the chapter will look at times when knowing all about your customer goes horribly wrong.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchWindowsServer.comView all >>

  • Open Trusted Technology Provider Standard (O-TTPS)

    The O-TTPS is an open standard containing a set of guidelines that when properly adhered to have been shown to enhance the security of the global supply chain and the integrity of Commercial Off-The-Shelf (COTS) ICT products. It provides a set of guidelines, requirements, and recommendations that help assure against maliciously tainted and counterfeit products throughout the COTS ICT product life cycle encompassing the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal.

  • The identity perimeter

    Successful businesses recognise the value of open communications within and beyond their organisations. However, achieving this means that the physical and virtual perimeters that had previously defined the reach of most organisations’ IT systems have disappeared. This report makes the case for the use of identity and advanced single-sign-on (SSO) to overcome many of the issues of providing open integration between businesses and their customers and partners. It should be of interest to all those in roles charged with the responsibility of providing secure access to online resources and to those who want to make the case for rolling out new online services, but have to overcome the security concerns of others in their organisation before they get the approval to do so.

OTHER FEATURED E-HANDBOOKS