Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Open Trusted Technology Provider Standard (O-TTPS)

        The O-TTPS is an open standard containing a set of guidelines that when properly adhered to have been shown to enhance the security of the global supply chain and the integrity of Commercial Off-The-Shelf (COTS) ICT products. It provides a set of guidelines, requirements, and recommendations that help assure against maliciously tainted and counterfeit products throughout the COTS ICT product life cycle encompassing the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal.

        View E-Handbook
      • The identity perimeter

        Successful businesses recognise the value of open communications within and beyond their organisations. However, achieving this means that the physical and virtual perimeters that had previously defined the reach of most organisations’ IT systems have disappeared. This report makes the case for the use of identity and advanced single-sign-on (SSO) to overcome many of the issues of providing open integration between businesses and their customers and partners. It should be of interest to all those in roles charged with the responsibility of providing secure access to online resources and to those who want to make the case for rolling out new online services, but have to overcome the security concerns of others in their organisation before they get the approval to do so.

        View E-Handbook
      • Enabling the secure use of RFID

        UHF radio frequency identification (RFID) promises vastly improved data collection and the analysis of physical objects from consumables to patients. Before its full potential can be exploited, it is critical that security surrounding its use is effectively implemented to ensure the data itself is not exploited

        View E-Handbook
      • Effective print management

        More businesses are now adopting a print management strategy to tackle rising print costs, enhance document security and reduce environmental impact. Intelligent print management features such as secure document release, rules-based printing and advanced reporting are helping businesses operate a cost-effective, secure and sustainable print environment.

        View E-Handbook
    • Page 1 of 1
      Page 1 of 1

Featured E-ZINES on searchDataCenterIN.comView all >>

  • CWEurope

    The monthly CW Europe e-zine focuses on multiple themes relevant to the European market. CW Europe discusses key management issues for IT pros – from building a new data centre, considering cloud computing, to developing a more secure infrastructure.

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchDataCenterIN.comView all >>

  • Cloud storage challenges and choices

    Our comprehensive e-book tackles the cloud storage challenges and business decisions that surround cloud storage investments, and breaks them into three areas of concentration: architecture, availability and return on investment.

    Get the latest updates on architectural choices when using the cloud for storage, including cloud controllers and application programming interfaces. We provide a short list of technical capabilities to look for in a cloud controller and questions to ask your service provider. Learn which metrics your peers are using to determine if cloud storage projects are meeting their potential, and what sort of service levels you can expect from providers or hybrid projects. Discover how to leverage the most cutting-edge cloud technologies and how not to get taken advantage of when choosing a cloud storage strategy/service.

  • Forging the path to tomorrow's CRM

    Perhaps no two words have more of an effect on business today than "customer experience." Consumers have a wealth of options for buying products and services -- and they're not shy about letting the social media sphere know when they’re not happy. To keep them coming -- and coming back -- organizations need to ensure that the experiences they’re serving up are nothing less than stellar.

    In our e-book series, The Risks and Rewards of Customer Experience Management, readers will get practical advice and real-world insight into strategies that place the focus of organizations' operations and processes on their customers. The first chapter concentrates on automation in the contact center. It will explore the technologies, such as interactive voice response and virtual agents. And it will examine what organizations need to evaluate when deciding which processes to automate and which areas will always need a human touch. The second installment delves into digital marketing, mobile applications and social media. It's no longer enough to send the same message to all customers; messages now must be personalized -- and soon, based on where customers are at any given moment. The chapter will look at location-based automated marketing and the pros and cons -- including the loss of privacy -- associated with such practices. The final chapter digs deep into the role of analytics in customer experience management plans, scrutinizing data harvesting methods and ways to use big data to augment customer experiences. And the chapter will look at times when knowing all about your customer goes horribly wrong.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchDataCenterIN.comView all >>

  • Open Trusted Technology Provider Standard (O-TTPS)

    The O-TTPS is an open standard containing a set of guidelines that when properly adhered to have been shown to enhance the security of the global supply chain and the integrity of Commercial Off-The-Shelf (COTS) ICT products. It provides a set of guidelines, requirements, and recommendations that help assure against maliciously tainted and counterfeit products throughout the COTS ICT product life cycle encompassing the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal.

  • The identity perimeter

    Successful businesses recognise the value of open communications within and beyond their organisations. However, achieving this means that the physical and virtual perimeters that had previously defined the reach of most organisations’ IT systems have disappeared. This report makes the case for the use of identity and advanced single-sign-on (SSO) to overcome many of the issues of providing open integration between businesses and their customers and partners. It should be of interest to all those in roles charged with the responsibility of providing secure access to online resources and to those who want to make the case for rolling out new online services, but have to overcome the security concerns of others in their organisation before they get the approval to do so.

OTHER FEATURED E-HANDBOOKS