Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Open Group technical document: IT Specialist Certification Accreditation Policy

        Clearly “book learning” is a critical first step to becoming effective at anything. But the effectiveness, potential, and the degree and value of contribution rise to a new level as relevant skills and experience are gained in a topical area. It is clearly important to “know” a subject, but it is more valuable to have applied that knowledge. It is for this reason that The Open Group IT Specialist Certification (ITSC) program is based on an assessment of people skills, technical skills, and experience, not just tests of knowledge.

        View E-Handbook
      • Determine if NoSQL databases are right for your organization

        NoSQL databases offer more flexible alternatives to mainstream relational software, particularly for big data applications. But NoSQL offerings include a diverse set of technologies that can present prospective users with a bewildering array of choices. And those technologies have yet to secure a place in many organizations. In fact, in a survey of IT and business professionals conducted by The Data Warehousing Institute in November 2013, 65% of the respondents said they had no plans to incorporate NoSQL databases into their data warehouse architectures. Don't let that scare you off, though: There are companies successfully putting NoSQL products to work in applications they're suited for.

        In this three-part guide, readers will learn about the different types of NoSQL technologies and their potential uses. First, get details about the four primary NoSQL product categories, with deployment examples from experienced users and advice on how to avoid going down the wrong database path. Next, read about why it's a mistake to force-fit technologies into IT environments -- and why Gartner analyst Merv Adrian says it's a fruitless exercise to compare NoSQL offerings "that are so wildly different in structure and intent." And in our third story, find out why many organizations are creating what consultancy Enterprise Management Associates calls a hybrid data ecosystem -- a blend of old and new technologies, including NoSQL systems -- to support their big data environments.

        View E-Handbook
      • Staying secure, HIPAA compliant with mobile technologies

        The integration of health data systems with phones, tablets, laptops and other mobile devices is one of the biggest challenges facing healthcare IT professionals. That, readers will soon learn, is easier said than done.

        In this three-part guide, we clear away some of the cobweb-ridden concerns around mobile device management. First, readers will take a look at the repercussions of recent U.S. Food and Drug Administration draft guidance. While makers of new mobile personal health apps are rejoicing over news that the FDA will not regulate mobile device data systems (MDDS), it's a potential nightmare for healthcare providers. Experts say the move leaves medical devices with an extremely low barrier for safety -- and no checks and balances to speak of.

        Next, we attempt to understand why -- even with the technology to support it -- adoption of mHealth apps is so low. To that end, health IT consultant Reda Chouffani points to areas where mobile healthcare could serve to enhance the care experience. We close with a look at patient engagement, as mandated in stage 2 meaningful use criteria. Many in healthcare are looking to technology -- electronic communication, primarily -- to involve patients in their care, and the pressure to effectively address patient engagement safety is mounting. Here, we outline the steps hospitals everywhere must take to do just that.

        View E-Handbook
      • Time to get serious about endpoint security

        22 July 2014

        Includes:
        • CIO Interview: Simon Hill, Caravan Club
        • Can UK fintech startups survive outside London?
        View E-Zine
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 2
      • Understanding hosted Exchange options

        Now that more IT admins are getting comfortable with the idea of hosted Exchange, the next challenge is deciding on the best approach to the cloud, and the best provider. In years past, the hosted Exchange market was mostly controlled by third-party vendors, but with Office 365, Microsoft is a strong contender as well. This handbook explores the competition between Microsoft and third-party hosted Exchange vendors, as well as how to make a realistic evaluation of vendors’ offerings based on a company’s specific needs. Other sections cover the pros and cons of fully hosted Office 365 and the potential advantages of opting for a hybrid approach to the cloud. Readers will be able to decide if it’s wise for their company to move everything off-premises or if they need to develop a more gradual strategy to reduce risk and costs.

        View E-Handbook
      • Virtualizing Microsoft Exchange Server

        While virtualizing Exchange Server can reduce operational costs, improve flexibility and consolidate resources, a proper plan is necessary in order to avoid potential complications. One question many shops contemplate is whether to choose Microsoft technology and virtualize with its Hyper-V platform, or to go with VMware’s more established vSphere. Another possibility is Citrix XenServer, which may appeal to smaller IT shops looking for a good price.

        This handbook cuts through biases about the various platforms to help readers make a realistic evaluation of the pros and cons of each, whether they’re using Exchange 2013 or older versions. Readers will learn about specific steps to take and particular trouble spots to avoid on the way to a successful virtualization of one of their organization’s most essential applications.

        View E-Handbook
      • Mastering Exchange virtualization for VMware

        Virtualization is a great way to consolidate resources and save precious capital, but messaging administrators still need to keep a close eye on performance and scalability. Not only is VMware the dominant virtualization platform, but it works very well with Microsoft Exchange Server 2010, so many organizations are considering it over Hyper-V. In this handbook you'll learn about best practices for Exchange virtualization, including admin tips on the best ways to deploy Exchange on a VMware infrastructure, managing storage and troubleshooting performance.

        View E-Handbook
      • Help with Office 365, mobile devices, Exchange security

        November 2011, Vol. 11

        Includes:
        • Six commonly overlooked Exchange security vulnerabilities
        • Exchange Online mobile device support: A comprehensive look
        View E-Zine
      Page 1 of 2
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • The many paths to Exchange 2013

        Exchange 2013 offers features that could benefit administrators and make the idea of hosted Exchange more appealing. We look at how to install and deploy Exchange 2013 and how to address problems that will likely arise in the upgrade process.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Who, what, where? How the cloud complicates identity management

        IT security and regulatory compliance require identity and access management. However, the move to the cloud and the spread of mobile devices has added complexity. This handbook looks at tools and best practices for managing authentication, working with cloud providers and understanding how Active Directory can and cannot help.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Email archiving: Planning, policies and product selection

        Get the fundamentals of email archiving from start to finish in this e-book, “Email archiving: Planning, policies and product selection.” Each chapter guides IT managers through the individual phases of the email-archiving project process.

        Email archiving, like any other IT project, requires a fully developed plan. Chapters feature information on creating an email archiving roadmap, defining email archiving policy, analyzing email archiving features, improving storage management and selecting a product.

        View E-Book
      • Email lifecycle planning for Exchange Server

        April 2009, Vol. 1

        Includes:
        • The importance of lifecycle planning for Exchange email archives
        • Part 1: Exchange Server 2007 requirements
        • Obtaining and verifying SSL certificates in Exchange Server
        View E-Zine
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Who's reading your email?

        July 2011, Vol. 10

        Includes:
        • Five steps to preparing for Exchange virtualization failures
        • Exchange 2010 auditing tools to track admin, end-user behavior
        View E-Zine
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1

Featured E-ZINES on searchExchange.comView all >>

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.

  • Exchange Insider

    SearchExchange.com's Exchange Insider E-Zine gives IT professionals the tools they need to maintain performance, scalability and email storage in Exchange environments – offering a comprehensive look at Exchange Server administration.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchExchange.comView all >>

  • Forging the path to tomorrow's CRM

    Perhaps no two words have more of an effect on business today than "customer experience." Consumers have a wealth of options for buying products and services -- and they're not shy about letting the social media sphere know when they’re not happy. To keep them coming -- and coming back -- organizations need to ensure that the experiences they’re serving up are nothing less than stellar.

    In our e-book series, The Risks and Rewards of Customer Experience Management, readers will get practical advice and real-world insight into strategies that place the focus of organizations' operations and processes on their customers. The first chapter concentrates on automation in the contact center. It will explore the technologies, such as interactive voice response and virtual agents. And it will examine what organizations need to evaluate when deciding which processes to automate and which areas will always need a human touch. The second installment delves into digital marketing, mobile applications and social media. It's no longer enough to send the same message to all customers; messages now must be personalized -- and soon, based on where customers are at any given moment. The chapter will look at location-based automated marketing and the pros and cons -- including the loss of privacy -- associated with such practices. The final chapter digs deep into the role of analytics in customer experience management plans, scrutinizing data harvesting methods and ways to use big data to augment customer experiences. And the chapter will look at times when knowing all about your customer goes horribly wrong.

  • Market trends tell the future of predictive analytics deployments

    Predictive analytics employs statistical or machine-learning models to discover patterns and relationships in data, thereby enabling the prediction of future behavior or activity. Long used by credit card companies, predictive analytics -- and now self-service predictive analytics -- is making inroads in organizations of all sizes. Based on a survey of more than 3,000 IT and business professionals, this report analyzes their responses to provide information on implementation status, maturity of implementations, value and vendors of predictive analytics tools.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchExchange.comView all >>

  • Open Group technical document: IT Specialist Certification Accreditation Policy

    Clearly “book learning” is a critical first step to becoming effective at anything. But the effectiveness, potential, and the degree and value of contribution rise to a new level as relevant skills and experience are gained in a topical area. It is clearly important to “know” a subject, but it is more valuable to have applied that knowledge. It is for this reason that The Open Group IT Specialist Certification (ITSC) program is based on an assessment of people skills, technical skills, and experience, not just tests of knowledge.

  • Determine if NoSQL databases are right for your organization

    NoSQL databases offer more flexible alternatives to mainstream relational software, particularly for big data applications. But NoSQL offerings include a diverse set of technologies that can present prospective users with a bewildering array of choices. And those technologies have yet to secure a place in many organizations. In fact, in a survey of IT and business professionals conducted by The Data Warehousing Institute in November 2013, 65% of the respondents said they had no plans to incorporate NoSQL databases into their data warehouse architectures. Don't let that scare you off, though: There are companies successfully putting NoSQL products to work in applications they're suited for.

    In this three-part guide, readers will learn about the different types of NoSQL technologies and their potential uses. First, get details about the four primary NoSQL product categories, with deployment examples from experienced users and advice on how to avoid going down the wrong database path. Next, read about why it's a mistake to force-fit technologies into IT environments -- and why Gartner analyst Merv Adrian says it's a fruitless exercise to compare NoSQL offerings "that are so wildly different in structure and intent." And in our third story, find out why many organizations are creating what consultancy Enterprise Management Associates calls a hybrid data ecosystem -- a blend of old and new technologies, including NoSQL systems -- to support their big data environments.

OTHER FEATURED E-HANDBOOKS