Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 4
      Page 1 of 4
    • Page 1 of 1
      • The small business cloud atlas

        For as long as smaller companies have been using Gmail and Google Drive, businesses have successfully (and unsuccessfully) adapted to the cloud landscape. But “good enough” isn’t safe or smart, and with omnipresent privacy concerns, it’s crucial that SMBs get a handle on just how much of their sensitive and proprietary data is floating around the Internet.

        In the first piece in this SMB Cloud handbook from SearchCIO-Midmarket, author Christine Parizo looks at how the “bring your own cloud” movement is creating security and compliance headaches for IT, and offers suggestions for reining in these rogue environments. In our second piece, Senior Features Writer Karen Goulart talks to boots-on-the-ground CIOs about their cloud adoption strategies and the benefits they’ve reaped. In our third piece, contributor Vanessa James discusses the advantages cloud computing offers nonprofit organizations.

        View E-Handbook
      • Small business mobility meets big business needs

        Mobility innovations are flying high in the SMB space. In many ways, the BYOD revolution started in small business mobility. When it comes to mobile, bigger is not necessarily better. Learn how SMB movers and shakers are using BYOD and mobile applications to conduct business at light speed while keeping costs in check.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • CIOs discover effective business continuity and disaster recovery strategies

        April 2011 Volume 7

        Includes:
        • Cloud solutions can make disaster recovery, business continuity easier
        • The next frontier in IT disaster recovery plans: Mobile devices
        • IT execs piggyback disaster recovery onto virtualization
        View E-Zine
      • Risk and rewards of cloud business continuity

        Enterprises are intrigued with the idea of passing the burden of business continuity to a service provider, but such an undertaking is more than most are willing to risk. Read this e-book now to discover the benefits and drawbacks of cloud business continuity, learn why BC on-demand is daunting to many organizations and why some companies are exploring the option of moving application backup and recovery in the cloud, one application at a time. Read a case study from USGA about how they are using storage in the cloud for faster recovery times -- and much more.

        View E-Book
      Page 1 of 1
    • Page 1 of 3
      • Prescriptive analytics: Conquer the next business frontier

        April 2014, Vol. 31

        Includes:
        • Revlon CIO ushers in corporate cloud and sweeping culture changes for IT
        • SaaS successes propel cloud-first philosophy at University of Miami
        • Allstate's tech leader on communicating vision, honing leadership skills
        View E-Zine
      • Big data in motion

        Organizations of all shapes and sizes are finding that moving large data sets around presents a number of network challenges. So what are the problems, the solutions and the workarounds? In this SearchCIO handbook, we confront the obstacles posed by big data in motion. In our cover story, SearchCIO Senior News Writer Nicole Laskowski dives into the gigantic data sets in the biomedical research field, uncovering how top-level IT executives derive value from information on the move while vanquishing data bottlenecks.

        Also in this handbook, Executive Editor Linda Tucci profiles Penn Medicine and its governance-heavy approach to managing big data and high-performance computing. Laskowski also delivers a report from the recent Strata Conference + Hadoop World, looking at Facebook's relational database and sharing the thoughts of big data leaders on the future of analytics.

        View E-Handbook
      Page 1 of 3
    • Page 1 of 1
      • Establishing an effective BYOD security policy

        October 2012 Volume 16

        Includes:
        • Data security measures for cloud and mobile that don't put users off
        • CIOs: Align technology and marketing strategy to meet customer needs
        • CIOs giving business a competitive edge with Agile practices
        View E-Zine
      • Taking a holistic approach to data protection methods

        In this e-book, the SearchCIO.com team explores how data protection encompasses a host of technologies, business processes and best practices. Government regulations threaten dire consequences for noncompliance, and compromised data quickly becomes a public relations and customer retention issue. Learn seven tips to better data protection methods and find out about important do's and don'ts of network access control.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Tiered storage strategies for a data-driven world

        Some experts believe that tiered storage strategies improve enterprise CIOs' ability to meet business goals, maximize data storage and contain the associated costs. Others argue that tiered storage may not be the right approach in today's data-driven world due to additional costs and complexities. In this SearchCIO handbook, we examine all sides of the tiered storage equation. In our first piece, storage expert Jon Toigo looks at why tiered storage strategies are experiencing a renaissance in a performance-hungry business setting. In our second piece, Toigo delves into the practical challenges of tiered storage – namely, how to accommodate burgeoning big data sets through storage tiering, reclamation and virtualization efforts. In our third piece, consultant Benjamin S. Woo asks how many tiers modern organizations need -- and the answer may be fewer than you think.

        View E-Handbook
      • Effective data management strategies for the CIO

        CIOs are turning to emerging forms of data management, including predictive business intelligence and information architectures, to harness the power of their data. Inside this expert e-book, gain insight on top data management strategies and topics such as storage and retention policies, data protection and lifecycle management.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Enterprise cybersecurity is every CIO's problem

        As household names like Target make headlines due to security breaches, many organizations are realizing that a sound enterprise cybersecurity program can be a competitive advantage -- and not only in the eyes of consumers. A dedicated cybersecurity strategy, properly explained to potential partners, can serve as a competitive differentiator that allows the CIO to bring more business back to the enterprise.

        In this SearchCIO handbook, find out how organizations such as the Federal Communications Commission are building enterprise cybersecurity into their business plans and the benefits they reap. In addition, a former White House cyberadvisor explains how to overcome next-generation security threats, and we provide some tips on staying secure in a cloud-first environment culled from a recent seminar on securing data, availability and reputation in the cloud.

        View E-Handbook
      • Extending the reach of enterprise security management

        In today's extended enterprise, cloud computing is redefining traditional supply chains, data is a currency as well as a risk point and the bring-your-own movement around applications, services and devices is muddying the dividing line between "home" and "office." How can CIOs protect their organizations while also maintaining the flexibility their employees crave? In this SearchCIO handbook, Editorial Director Christina Torode interviews CIOs and analysts for their advice on securing the extended enterprise in its myriad shapes, sizes and technological maturity levels. In addition, CIO Niel Nickolaisen shares his experiences with extending the reach of enterprise security management initiatives while also guaranteeing ease of use. Finally, Forrester analyst Andrew Rose discusses the importance of building a "human firewall" to ensure that everybody has a stake in keeping the enterprise safe.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Managing IT services at breakneck speed

        Managing IT services has always required meeting users where they want those services. But in the age of cloud, mobile and self-service IT, enterprise CIOs have little choice but to re-examine and, in many cases, completely revamp their IT service management (ITSM) strategies to accommodate the breakneck speed at which business, and the technology that supports it, now moves.

        In this SearchCIO handbook, CIO contributor Harvey Koeppel tells us why it's time to put traditional ITSM principles in the museum where they belong and usher in some fresh service management ideas in their place. Our CIO Innovator profile features CIO/CTO Bart Murphy, who explains how he made the creation of an ITSM program not only effective, but fun for his staff. In our last piece, CIO columnist Niel Nickolaisen reveals how a new view on managing IT services can free up staff to pursue strategic endeavors.

        View E-Handbook
      • Architecting the agile enterprise

        Sept. 2013, Vol. 25

        Includes:
        • Running a lean IT organization keeps CIO on budget, primed for growth
        • CIO designs an iPad analytics app that mirrors work, speeds decisions
        • Agile principles, for IT and across the enterprise
        View E-Zine
      • IT service management and delivery for the CIO

        In the age of self-provisioning, some CIOs may wonder whether their role is about to go the way of the dinosaur. But the CIOs and experts we spoke to for this SearchCIO handbook on IT service management delivery say otherwise -- in fact, they argue, the movement toward self-service IT makes the CIO more relevant than ever. In our first piece, SearchCIO Executive Editor Linda Tucci speaks to professionals steeped in IT service management and delivery and concludes that, if your ITSM strategy isn't making money for the business, then it's time to go back to the drawing board. In our second piece, expert Harvey Koeppel illustrates the exponential effect that a flood of new tools is having upon IT service management and delivery. In our third piece, CIO Niel Nickolaisen explains why CIOs are in prime position to deliver on the IT service levels that today's hybridized user-consumers expect.

        View E-Handbook
      • Lean ITIL strategy in lean times

        As IT shops continue to look for ways to cut costs, increase efficiency and improve service, many turn to IT Service Management (ITSM) frameworks for guidance. Learn how to adopt or advance your ITSM strategy to streamline IT and build an efficient, service-oriented organization. In this e-book, you'll find advice on implementing ITIL with other technologies, read case studies about how effective organizations are using ITIL, learn how to overcome common challenges with ITIL and design a forward-thinking ITIL strategy.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Rogue technology: What lies beneath

        Mar. 2014, Vol. 30

        Includes:
        • CIO advice for wrangling rogue IT in the consumerization age
        • Out of the shadows: Rogue IT is becoming CIO business as usual
        • CIO's Agile practices during infrastructure overhaul save time and money
        View E-Zine
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • How to make your data center more energy efficient

        February 2011 Volume 6

        Includes:
        • Green-energy technologies a priority across all IT operations
        • Virtualization: Panacea and Pandora’s Box
        • Virtualization without virtualization management cancels out benefits
        View E-Zine
      • Data center power management of the future

        Enterprise CIOs are adopting green IT and other new technologies to improve data center efficiencies. In this e-book learn more about how IT organizations are using green IT, virtualization, storage capacity planning and even cloud computing to realize energy savings and lower hardware and power costs in the data center. Knowing that the power demands of future data centers aren't likely to decrease, learn how forward-thinking CIOs are taking steps now to address data center power management -- and how you can, too.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Personalizing your customer experience strategy

        In our evolved markets, a CIO should be concerned with every customer's experience – because with the availability and always-on nature of business today, turning to another retailer or service provider is as easy as searching Google for someone who can provide the service your customers expect. Access this exclusive, expert handbook to learn how CIOs can design a unique customer experience strategy to make certain that every customer’s experience feels unique and custom-tailored to their individual needs.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • PPM: Validating the Value of IT

        April 2013

        Includes:
        • CIO's cloud solutions meet collaboration needs and speed up innovation
        • Powering past mistakes, Electrolux builds a model social enterprise
        • CIO's mastery of M&A puts her at center of Dell's turnaround strategy
        View E-Zine
      • Tips for architecting an Agile enterprise

        In order to stay competitive in today’s dynamic business environment, organizations must adopt Agile practices that allow them to recognize project flaws and make changes on a dime. And when you consider the pervasiveness of consumer mobile computing, running an Agile enterprise is more important than ever. This handbook takes an in-depth look at the relationship between Agile business practices and mobile computing. Inside, learn more about the balancing act that many modern businesses face when trying to provide a quick turnaround for mobile applications on a limited budget.

        View E-Handbook
      • Tried and true Agile project management methodologies

        December 2011 Volume 11

        Includes:
        • Agile project management helps overcome IT obstacles
        • Services-oriented architecture helps CIO spur business growth
        • Agile project management leaders need to define 'sustainable pace'
        View E-Zine
      • Project and portfolio management best practices: From efficiency to alignment

        Following project and portfolio management methodologies can help you keep a handle on costs and pursue the projects with the greatest value to the business. As a CIO, your goal is to look for change management strategies and methods that can help IT projects be successful. This e-book will explore project and portfolio management best practices and how CIOs can use these methods to pave the way for success.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • New tactics for managing lean IT budgets

        April 2010 Volume 1

        Includes:
        • CIO technology spending focused on reducing risk, boosting efficiency
        • Vendor contract management key to cutting costs through renegotiation
        • The road to agile IT runs through IT services management and PPM
        View E-Zine
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 2
      • The mobile customer experience comes first

        May 2014, Vol. 32

        Includes:
        • A CTO who has 'seen it all' shares top tips for effective disaster recovery
        • Mobility trend: For this IT leader, connected car is both zest and threat
        • CIO's focus on people, innovative thinking leads to revenue-generating idea
        View E-Zine
      • Enabling workforce mobility

        Enabling workforce mobility goes beyond purchasing smartphones and tablets for enterprise staff or initiating bring your own device (BYOD) programs. The task at hand for progress-minded CIOs is enabling digital business through the use of these new technologies.

        In this SearchCIO handbook, expert contributor Harvey Koeppel explains that workforce mobility has existed since the word "peddler" was coined, but CIOs must embrace new strategies in order to aim these devices at business needs. We also share results from our recent IT Salary and Careers Survey, which indicate that BYOD will continue to be a big deal on the enterprise agenda in 2014. Forrester Research analyst Nigel Fenwick takes us home with his column on digital transformation, discerning the role that CIOs must play to ensure that organizations are playing to their digital strengths while minimizing their weaknesses.

        View E-Handbook
      • Mobilizing the enterprise

        Organizations are striving to find new ways to accommodate bring-your-own-device programs -- but mobilizing the enterprise is about more than servicing the latest smartphone or tablet employees crave. In this SearchCIO handbook, we examine how mobile-minded enterprises are tackling customer engagement, productivity and business processes. In our first piece, Executive Editor Linda Tucci spotlights Michael Relich, CIO at fashion retailer Guess?, whose new app provides buyers and merchandising teams with real-time access to powerful analytics. Features Writer Karen Goulart checks in with analyst Jack Gold and gets his six recommendations for establishing a bring-your-own-application program. Finally, Forrester Research Inc. analysts Simon Yates and Clay Richardson examine how mobilizing the enterprise can dovetail with much-needed business process reengineering.

        View E-Handbook
      • How Mobile IT is Revamping Network Strategies

        November 2012, Vol. 17

        Includes:
        • Building an enterprise social network for the 'extended' brain trust
        • PayPal chief scientist on cracking the code for big data analytics
        • A CIO blueprint for cloud migration
        View E-Zine
      Page 1 of 2
    • Page 1 of 1
      • A CIO’s guide to outsourcing

        Access this e-book and learn outsourcing contract danger signs, how to tell if changing vendors is worth the risk, the importance of encouraging innovation and flexibility from providers, and more! As a CIO, you may be tasked with reexamining your organization's outsourcing and vendor agreements to cut costs and build innovative, flexible contracts in today's economy. This e-book will discuss the most important considerations for a CIO to minimize risk and maximize savings.

        View E-Book
      • Unlock the true benefits of outsourcing

        The key to unlocking outsourcing potential lies in targeting the right projects, choosing your suppliers wisely and then managing them with an eye on economic conditions at that global site. Here's a step-by-step plan for optimizing savings with outsourcing, including how to design an outsourcing contract, manage training, process and procedural specifics successfully and reduce risks. Experts believe that ongoing maintenance and management of supplier relationships are the true success factors in achieving long-term benefits of outsourcing. Check out these do's and don'ts to learn how to manage suppliers closely and effectively to achieve the best results.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Effective techniques for small business security

        Think your company is too small to be hacked? Think again. SMBs are just as exposed to risk as the enterprise when it comes to today’s top security threats. Explore this expert handbook that discloses big security strategies uniquely designed for SMBs and learn why lackluster small business security strategies have left small business suffering from serious data loss consequences.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Deploying virtual desktops

        October 2011 Volume 10

        Includes:
        • Making virtual desktop infrastructure efforts pay dividends at last
        • Desktop virtualization deployment strategies and challenges
        • CIOs sell enterprise desktop virtualization with mobility
        View E-Zine
      • How to design a smart virtualization strategy

        This e-book provides a roadmap to virtualization success for CIOs and strategic IT. Topics include: how to align virtualization with business priorities, virtualization beyond the server has its rewards, maintaining compliance in virtual environments, and preparing for the future with your virtualization strategy.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Social networks in the enterprise: Collaborate seamlessly

        CIOs have swung from dismissing social networks in the enterprise to applauding and seizing on their potential to boost business productivity and creativity. In this SearchCIO handbook, we examine the latest trends in enterprise social networking, the tools that enhance collaboration and the role of CIOs in this communications revolution.

        In our first piece, business writer Christine Parizo finds out how the San Jose Sharks and other organizations are using enterprise social networking tools in a seamless, engaging and effective manner. In our second piece, expert contributor Harvey Koeppel introduces the acronym SMAC into his analysis of how social media technologies, as well as mobile, cloud and analytics, have transformed business communications. In our third piece, CTO Niel Nickolaisen dubs social networks in the enterprise the new email, and explicates how IT should handle these new tools.

        View E-Handbook
      • Putting a social layer into every business app

        August 2013, Vol. 24

        Includes:
        • Building a social enterprise means putting 'social' into the workflow
        • Real-time data analytics drops a beat on the online music industry
        • Building a social workflow process for today's enterprise no easy task
        View E-Zine
      Page 1 of 1

Featured E-ZINES on searchCIO.comView all >>

  • CIO Decisions

    Enterprise CIO Decisions Ezine offers IT and business strategies and insights on the latest technologies making waves in the modern IT organization.

  • Pulse

    SearchHealthIT's Pulse e-zine for health IT leaders features premium content and hard hitting strategies for the health care industry, delivering in-depth news and analysis on a wide range of mission-critical topics impacting decision makers.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchCIO.comView all >>

  • Enterprise Hadoop: Ready for prime time?

    Many vendors are pitching Hadoop as the foundation for enterprise data management environments that delivers information and insights to business users and serves as a hub for other data systems and applications. In the era of big data, the case for Hadoop is strong: Hadoop provides a cost-effective way to ingest, store and process large volumes of multi-structured data. With Hadoop, organizations can store all data in its original format and provide a system of record for the enterprise. Even more, they can bring the applications to Hadoop and process the data in place.

    But does reality square with the promise today? Are companies willing to trust their enterprise data to Hadoop? The big question is whether Hadoop is ready to support enterprise-scale, production environments where data can't be corrupted or inconsistent. Does Hadoop have adequate management, monitoring, backup, recovery and security features? What are the major gaps today and what are vendors doing to plug the holes? At what point can companies trust production computing environments to Hadoop? This report, based on a comprehensive survey of business intelligence professionals and interviews with experts in the field, addresses these questions.

  • Overcome today's disaster recovery challenges

    The use of devices not connected to a local network is a challenge for IT staffs tasked with protecting data on those devices. Completing backups within a reasonable timeframe has become an issue for organizations. Some organizations are opting for alternatives to traditional backup to address these challenges. The cloud has been pushed as an alternative to tape for offsite storage for disaster recovery. However, there are challenges with this approach and with protecting applications running in the cloud.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchCIO.comView all >>

OTHER FEATURED E-HANDBOOKS