Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
Free technology white papers »
These are only the most recent releases from our complete list of free technology white papers. To stay informed, subscribe to the RSS feed, bookmark this page, or follow Geekzone on Twitter.

Enter your email address below to subscribe to a daily email with links to new free technology white papers:


5 Ways To Prepare Your Infrastructure For Disaster


While it’s great to know how to recover when disaster strikes, wouldn’t you rather prevent it from happening in the first place?

Of course, there are no guarantees when it comes to preventing outages and downtime, but if you follow these key areas of preparation, you can greatly reduce your risk.



Request Free!


A Guide On Moving Email Delivery to the Cloud


Email delivery is a full-time job for a team of IT specialists. Implementing and maintaining a highly scalable email delivery solution is a costly undertaking that diverts key resources from other business-critical initiatives.



Request Free!


Beyond BOM 101: Next Generation of Bill Materials Management


In the world of product design and manufacturing, the bill of materials (BOMs) is a critical product information record for both the engineering and manufacturing teams. Managing BOMs with the wrong tools can cause product errors, delays and compliance failures.

In this whitepaper, we outline the problems with manual BOM management tools like spreadsheets and email and compare them to a dedicated BOM management system.

Bill of Material (BOM) Management topics covered:

  • BOM management challenges such as change, revision and compliance management
  • Communication issues with project teams, suppliers and contract manufacturers
  • Comparison of manual vs. automated BOM management tools


Request Free!


Context-Aware Collaboration: Turning Field Service Workers into Knowledge Workers


Many enterprises, however, have yet to use these services to improve internal operations, such as field service, and other elements of their workforce management solutions. Integrating context-aware services with modern collaboration capabilities can help organizations improve the way they share ideas, resolve issues and improve customer service.

Request Free!


Email Security For IT: How To Keep Your Brand Safe


Not only can phishers hurt your company and customers, but your brand can take a beating, too. Find out what you should be implementing to keep your brand safe.



Request Free!


Everything You Need To Know About A DDoS Attack


Even if your company isn’t as large as Amazon or eBay, any amount of profit loss due to downtime should be cause for concern. Not only do you miss a potential sale in real time, that customer is less likely to come back and try to purchase from you again in the future.



Request Free!


How to Avoid a Storm in Your Cloud Installation


Finding the right match for growth and success takes time and patience. This eBook brings you tips on cloud implementations according to each business type so that you can avoid the little black clouds of destruction and enjoy the full benefits of a cloud solution.

Request Free!


How to Increase Revenue with WiFi & Retail Presence Analytics


Many WiFi Retail Presence Analytics platforms promise the world, but provide little more than a collection of reports and meaningless data. Fortinet Presence Analytics is different, delivering a platform that helps you better understand customer behavior, engage more closely with your customers and actually influence their purchasing decisions.

Join Koroush Safar, Senior Director of Product Management at Fortinet as he demonstrates how your retail organization can leverage Fortinet's Presence Analytics to increase your revenue.

In this webinar, Koroush will cover:
  • How WiFi Presence Analytics works
  • Social WiFi and its impact on customer engagement
  • Customer privacy concerns and how to address them
  • How you can leverage Presence Analytics to increase sales and revenue


Request Free!


It's Raining, It's Pouring, Are Your Field Techs Snoring?


Mobile Apps will energize your field engineers and give them the practical, timesaving tools and resources that ensure a productive working day.

Download this paper to find out how you can wake up your field techs with mobile apps from ClickSoftware.

Request Free!


The Essentials of the Cloud - Includes the Free Demystifying The Cloud eBook


The Essentials of Cloud, brings together the latest in information, coverage of important developments, and expert commentary to help with your Cloud related decisions.

The following kit contents will help you get the most out of your Cloud research:
  • Demystifying The Cloud
  • Cloud: Build Vs. Buy - 4 Key Considerations
  • Virtualizing Your Infrastructure with a Path to the Cloud: 5 Reasons Why Your IT Infrastructure Should Run on Blade Servers
  • Salesforce.com's CTO on Using a Cloud Platform


Request Free!


Email Security: How To Prevent Spoofing & Phishing


Email security isn't as cut and dry as just marking messages from Nigerian princes as SPAM. Without the right security features in place, phishers, spammers, and attackers can hijack your email to send messages that look like they’re from your company.

This not only hurts your recipients if they end up giving the phishers information, but it can ultimately hurt your brand reputation. In this whitepaper, you’ll learn what you should be implementing in your email backend and how to do it. In no time at all, you can rest easy knowing that your customers and your brand are protected.

In this whitepaper, you'll learn the importance of email security as well as:

  • The secure transmission and reception of an email
  • Authentication of email messages by worldwide receivers
  • How to implement SPF, DKIM, and DMARC


Request Free!


Evaluating The Cost Of A DDoS Attack


Take a look at all that a DDoS attack can cost you (hint: it’s not JUST downtime) and maybe you’ll reconsider your plan of crossing your fingers that no one attacks you.

While no one would want to undergo a DDoS attack and risk downtime, many companies don’t have the proper procedures and equipment in place to successfully prevent or mitigate an attack.

For something that may never happen, many look at DDoS protection as a sunk cost.

The question is, are you willing to risk the cost of a DDoS attack in order to save some money now? Find out just how much you’re putting at stake if you skimp on security.



Request Free!


How to Protect Your Brand in Social Media


The very characteristics that make social media incredibly appealing to consumers are the same ones that make it ripe for scammers seeking to exploit the value and power of established brands. It's not unusual for fans and consumers to be exposed to something new every day, whether a promotion, contest, fan page or enticing content. And, without much history to signal what is genuine and what is not, consumers find themselves at risk of being hoodwinked by brand impersonators, malicious account spoofers and counterfeiters.

This white paper offers best practices for protecting your brand--and brand engagement--in social media channels.

Request Free!


Building Your Brand on the Big 6 Networks


You can't build a strong social brand for your clients without a deep understanding of Facebook, LinkedIn, Google+, Twitter, Instagram, and Pinterest. “6 Blueprints for Social Network Success” puts valuable structure around the best practices for each of these very different networks.

By mining these blueprints, you can help your clients:
  • Gain quick wins on any of the Big 6 networks
  • Understand how content needs and audience expectations vary from network to network
  • Match social strategies and client goals to the right social networks
Download this tip sheet and start building a stronger social framework for your clients.

Request Free!


Forrester Market Overview: Hosted Collaboration Services Providers


Sixty-five percent of IT leaders Forrester recently surveyed said they are interested in or already using software-as-a-service (SaaS) for some portion of their collaboration technology portfolio. But many IT leaders — particularly those at very large organizations — are unsure whether standardized SaaS offerings from Google and Microsoft provide the flexibility they need. These concerns shouldn't prevent CIOs from moving collaboration tools off-premises. We find a burgeoning services sector that can deliver highly customized messaging, teaming, and real-time communication services for the enterprise.

This report provides an overview of the market, giving CIOs a sense of the players, their capabilities, and their offerings.

Request Free!


How the Cloud is Reshaping Virtual Desktops


Discover the benefits of independence from your physical desktop computer infrastructure.

Desktop computing has become an increased cost burden for IT, and a source of frustration for tech-savvy users who expect more flexibility. Cloud-hosted desktops enable companies to mitigate the complexity placed on IT while reducing the risks associated with lost or stolen devices, all at a reduced TCO.

Request Free!


Learn 7 Tips from Virgin America for Building a Mobile Social Intranet on Salesforce1 Platform


In this recorded on-demand webinar, see how Virgin America uses a mobile social intranet to connect its teammates and how they make it easy to use.

Request Free!


Spotlight on Cloud Security


While the cloud is becoming an underlying assumption of computing, often public cloud services present problems for IT that business managers fail to think through, especially security implications. This paper covers:
  • Cloud security liabilities
  • Identity management
  • Data encryption
Today, nearly all businesses have one foot in the cloud whether they realize it or not. This paper will enable IT to assess their organization's exposure and reap the benefit of public cloud services without creating worry or unnecessary risk.

Request Free!


The Social Hunger: Why Your Audience Feasts on Social Integration


Your audience craves social media. How do we know? We asked hundreds of people about their attitudes, opinions, and beliefs when it comes to brands integrating social media into their marketing efforts. Universally, the data supports what we've already seen in action: consumers want to engage with brands that integrate social media, and they prefer to do business with social brands. How can your brand satisfy this insatiable appetite? Download The Social Hunger to learn:
  • The principles you can use today to build your social media strategy.
  • What you can do to increase customer engagement as well as improve amplification and reach.
  • How social media increases purchase intent and strengthens consumer preference.


Request Free!


The State of Enterprise Social Marketing Report


Marketing on social media is now an imperative for companies seeking to stay relevant to consumers and potential customers. But little research has been conducted to learn how the most profitable brands and companies approach, execute and measure social marketing.

In Q1 2014, Spredfast commissioned research from Forrester Consulting to uncover insights on the state of enterprise social marketing programs at the biggest companies across the U.S. and Western Europe. With input from 160 Director-level or above leaders in companies with $1 Billion or above in revenue, this first-of-its-kind research report surfaced corporate social marketing trends and insightful benchmarks for consideration in 2014 planning and beyond. The 25-page research report reveals insights into:
  • Executive-level oversight and priority of social marketing efforts
  • The business value of social marketing across different social networks and tactics
  • Enterprise companies' top business goals and objectives for social marketing
  • How and what companies are measuring to determine the impact of social marketing
  • The integration of social marketing across broader (non-social) marketing efforts and owned sites
Use these new insights and 30+ data points to fine-tune your social planning for the upcoming months, and beyond.

Request Free!


Don't Just Produce Content - Deliver Results


When it comes to content, rich media is having a greater effect on search engine rankings than ever before. Rich media has also flattened the traditional text-based click distribution curve on SERPs, delivering a higher CTR for listings lower on the page. Ask yourself, is SEO your primary content channel? It should be because organic traffic captures 40% of revenue. Download now to find out how.

Request Free!


Effective Communications - Developing Your Communication Skills


You will learn how to:

  • Determine your own preferred communication style.
  • Use this information to develop and enhance your communication skills.
  • Identify and respond appropriately to other people’s emotions.
  • Apply the six components of the RESULT communications principle.
  • Overcome the most common barriers to successful communication.

 
Chapter 1 - Effective Communication in the Workplace

Chapter 2 - Workplace Communication Styles

Chapter 3 - Recognizing Workplace Communication Styles

Chapter 4 - Perceptual Preferences

Chapter 5 - Attitudes to Communications

Chapter 6 - Communication Research

Chapter 7 - Using the RESULT Principle

Chapter 8 - Barriers to Communication



Request Free!


Survey Highlights: Data Backup and Recovery Benchmark Report


Where does your data management plan stand in relationship to other systems in the industry? Is there room for improvement? Iron Mountain sets out to help you answer these questions with an in-depth review of practices used by 1,200 IT professionals. Discover the trials and triumphs of data management personnel and find out where your organization fits in on the information governance spectrum. Topics discussed include:
  • Time-sensitive backup planning
  • Onsite vs. offsite storage
  • A triaged list of the most important data management issues faced by IT professionals
  • Safe, effective, compliant data disposal
Explore the state of data management today and learn how to stay ahead of the information curve as your business and your data expand.

© 2014 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks are the property of their respective owners.

Request Free!


The Cost of Inertia: Insight from Data Protection Predictors


This comprehensive study report follows the observations of IT professionals across several fields of industry as they consider the current state of data management. The study examines the roadblocks that many organizations will face in the coming years as data continues to expand, but also helps readers map their way toward a more secure, more efficient data protection plan. Topics discussed in the study include:
  • Assessing the problems of implementing and maintaining a data safety plan
  • Creating safeguards against lawsuits, damages to reputation, and other disasters
  • Fortifying the infrastructure of your data protection system
  • Choosing the best technological backup tools according to the needs of your company
Hear from business peers as they take a powerful look at where data management stands today and where it will stand going forward. Download the report to take advantage of the study and turn yesterday's experiences into tomorrow's successes.

© 2014 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks are the property of their respective owners.

Request Free!


The Future of Backup as a Data Protection Strategy


With so many technologies and security solutions available, it's difficult for a data manager to know where to begin when it comes to building a safety plan. Iron Mountain offers guidance in the form of five questions any data management professional must ask before getting a backup security system off the ground. The questions reveal advice on:
  • Cataloguing data according to its level of business importance
  • Locating and properly assessing your current data backups
  • Finding the right combination of security services that cater to your needs
  • Weighing the cost of various backup systems
  • Creating the best and most cost-effective tests for a data protection plan
Get a detailed picture of how to begin safeguarding your data against harm, theft, and corruption. Read Iron Mountain's article today.

© 2014 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks are the property of their respective owners.

Request Free!


What To Look For In A New Phone System For Your Business


There are many different types of telephone systems, and each type will offer different advantages for varying sizes of businesses; therefore, it's important to ensure that all aspects of the phone system will be met before making a final decision.

Before considering a specific type of Business Telephone System (BTS), it's important to understand exactly what employees and clients need. In this guide, we will review all the systems and their features and help you determine which would best fit your needs now and into the future as your business grows. Plus, we'll also include several no-obligation complimentary price quotes from reputable Phone Systems providers to get you started.

Request Free!


The Essentials of IT Security - Free Kit


The Essentials of IT Security, brings together the latest in information, coverage of important developments, and expert commentary to help with your IT Security related decisions.

The following kit contents will help you get the most out of your IT Security research:
  • Citrix NetScaler: A Powerful Defense against Denial of Service Attacks
  • Magic Quadrant for Identity and Access Management as a Service
  • Adapting Security to the Cloud
  • Advanced Persistent Threat Protection for Dummies (SPECIAL EDITION)


Request Free!


The Essentials of Virtualization - Free Kit


The Essentials of Virtualization, brings together the latest in information, coverage of important developments, and expert commentary to help with your Virtualization related decisions.

The following kit contents will help you get the most out of your Virtualization research:
  • Virtual Desktop Acquisition Cost Analysis
  • Why Hybrid IT Strategy is a Bridge Between Today's Environment and Tomorrow's Technology
  • Virtualizing Your Infrastructure with a Path to the Cloud: 5 Reasons Why Your IT Infrastructure Should Run on Blade Servers
  • Seven Virtualization DR Myths


Request Free!


iPad CTO Kit - including the iPad Tips and Tricks Guide for IT Executives and Managers


The iPad CTO Kit brings together the latest in information, coverage of important developments, and expert commentary to help with your IT Management related decisions.

The following kit contents will help you get the most out of your IT Management research:
  • iPad Tips and Tricks - A Guide for Executives and Managers
  • Application Release Automation with Zero-Touch Deployment
  • Taking Your Enterprise Mobile: An Executive Checklist
  • The Mobile Strategy Video Series The Impact of Mobile on Business and IT


Request Free!


The Essentials of Information Security Kit: Includes a Free PC Security Handbook - 2nd Edition eBook


The Essentials of Information Security brings together the latest in information, coverage of important developments, and expert commentary to help with your Information Security related decisions.

The following kit contents will help you get the most out of your Information Security research:
  • Citrix NetScaler: A Powerful Defense against Denial of Service Attacks
  • PC Security Handbook - 2nd Edition
  • Magic Quadrant for Identity and Access Management as a Service
  • Adapting Security to the Cloud


Request Free!


5 Proven Ways to Motivate and Retain Your Technology Team


Staff retention grows harder and harder with every new generation. With the old tried and true system of incentives not nearly as effective as it once was, it's time to start thinking beyond the norm. This guide breaks down five key areas for retaining your tech staff:
  1. The work environment
  2. Education
  3. Hardware/software programs
  4. Perks of hard work
  5. Recognition
When your staff understands the extent at which you are willing to go to keep them around, they will repay you with hard work and loyalty.

Request Free!


Considerations for Embracing Wireless Management


This paper details three critical steps to stay ahead of employee demand for wireless access, including:
  • Measuring how many devices are currently accessing the network, when and for what
  • Leveraging that data to create wireless policies – vs. guesstimating
  • Rethinking network design to accommodate this new normal
Change your strategy before it's too late: According to Gartner, as wireless networks migrate from networks of convenience to primary user networks, 80% of network designs will be obsolete by 2015.

Request Free!


Important versus Vital Records: The Magic 5% You Can't Live Without


There are 2 key factors that determine the useful life of vital records—where they are stored and their identification. Do you know the measures that need to be taken to ensure the life of your vital records?

Consult the following white paper to learn:
  • the steps it takes to properly identify and protect your vital records
  • a deeper understanding of the risks associated with inadequate preservation
  • how to evaluate storage options, and more
© 2014 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks are the property of their respective owners.

Request Free!


Information Governance Benchmark Survey Report


Records and Information Management (RIM) as you know it today is changing, especially in light of all of the attention being given to Information Governance. The Information Governance Survey Benchmarking Report provides you with the opportunity to compare the state of your RIM program to that of others. It can help you further establish business value in your RIM program and provides insight such as:
  • 87% of organizations surveyed have a RIM program in place
  • 8% measure compliance
  • 64% cannot get employees to “let go” of information for disposition
Download the report to discover how your peers in the industry are dealing with this evolving information lifecycle management environment.

© 2014 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks are the property of their respective owners.

Request Free!


Mobile Center of Excellence: Taming the Wild, Wild West of Enterprise Mobility


The world of mobile is still so new, and changes so rapidly, that many companies are hard-pressed and ill-prepared to keep up. For success, it's imperative to have a cohesive innovation strategy, and for all areas of the organization to work together on mobility initiatives. A highly effective way to deal with the problem of a fragmented approach to mobile is to establish a Mobile Center of Excellence (MCoE).

In this paper you'll learn:
  • Why you should create an MCoE
  • A mobile operating framework made possible through an MCoE
  • 5 steps for getting started on an MCoE
Download this white paper to understand how to develop core competencies and a standardized framework for more efficient use of resources to support mobile initiatives.

Request Free!


Optimize IT Performance & Availability: Four Steps to Establish Effective IT Management Baselines


This puts immense pressure on IT managers to keep networks and business-critical applications running smoothly.

To effectively optimize for performance, IT should start with a baseline that shows:
  • How the network, applications and infrastructure perform
  • Where and why performance comes up short
The baseline becomes a vital measuring stick that can be leveraged in real-time to enhance network performance and availability.

To learn more, download this how-to report on establishing IT baselines.

Request Free!


Records Management Best Practices Guide


Compliance with the regulations governing records management is not only necessary to avoid punishment, it is increasingly important for your organizations to be able to provide evidence of business transactions, decisions and satisfaction of legal obligations. Building a defensible program takes time, but we've created this best practices guide to help get you started.

The best practices initiative is a direct response to requests for guidance on:
  • Best-in-class compliant Records and Information Management (RIM) practices
  • Continual program improvement ideas
  • Government regulations that impact RIM
A compliant RIM program is necessary for organizations to proactively and progressively manage all business record content, regardless of its format or location. Review this guide to learn more.

© 2014 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks are the property of their respective owners.

Request Free!


Video Killed The Web-Conferencing Star


Blue Jeans reveals national survey data demonstrating the power of video-centric meetings. According to the survey, the majority of professionals prefer all of their online or remote meetings to include face-to-face video of meeting participants. Download the infographic for the full list of stats.

Request Free!


When Time Isn't on Your Side: Options for Tackling Event Based Retention Rules


If you are like most organizations, you continue to struggle with an effective way to flip the switch that begins the destruction eligibility count down.

Download this paper and discover some potential options for tackling the event-based retention conundrum. As you read through them, you will need to consider your organizations:
  • risk profile
  • ability to commit resources
  • and attitude towards “keeping everything”
This will help determine which options are most applicable to you.

© 2014 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks are the property of their respective owners.

Request Free!


3G/4G Digital Signage Guide


Combined with cloud-enabled network management and content delivery systems, 3G and 4G wireless broadband networks are propelling digital signage deployments at an accelerated pace. In countless venues, digital signage networked via wireless broadband cellular signal penetrates hard-to-reach locations and new markets, and can achieve a faster return on investment.

Request Free!


Don't Let Competitors Hijack Your Mobile Traffic


Tablets and smartphones already make up 35% of organic search traffic and very soon the majority of search traffic will be mobile. Start turning the tables on your competitors today by discovering common mobile errors, implementing clear cut mobile SEO techniques, and understanding why mobile configuration is not a one-size-fits-all solution for Marketers.

Request Free!


Don't Let Secure Search Leave You Out in the Cold


The Secure Search paradigm shift forces SEO professionals to use an entirely different approach to SEO management. Adapting to this revolutionary change is mandatory. This Secure Search white paper unlocks the door to SEO success.

Request Free!


Enterprises in Motion: In-Vehicle Networks


Businesses, organizations, and public agencies with vehicle fleets find productivity gains and improved fleet management by deploying dependable mobile connectivity in vehicles. Additionally, travelers and mass transit commuters now expect constant connectivity through passenger WiFi and other customer engagement platforms.

Request Free!


Mitigating Security Risks at the Network's Edge


With locations that typically process credit cards, distributed enterprises are at a particularly high risk of suffering data breaches. This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.

Request Free!


PCI 3.0 Compliance Guide


Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI-DSS 3.0. Enabling features of CradlePoint solutions include network segmentation (Ethernet ports, SSIDs and VLANs), stateful firewall, MAC/IP/URL filtering, authentication, encryption, event logging, event alerts, time synchronization, and configuration management from CradlePoint Enterprise Cloud Manager.

Request Free!


Trends in Pop-up Retail: Innovative Merchandising Driven by Flexible, Dependable Mobile Connectivity


The first part of the paper will address the business case for pursuing a pop-up strategy; the second part will consider technology implementation strategies that enable a rich and secure pop-up retail experience.

Request Free!


Uninterrupted Internet: Maximizing Revenue and Minimizing Business Risk with 3G/4G Failover


With CradlePoint as your Internet backup solution, you're ensured more uptime for your POS transactions and cloud-based services while gaining significant financial and operational benefits over wired backup solutions including: better reliability, lower operating costs, greater ease of use and management, and quicker speed to deployment.

Request Free!


Vehicles Best Practices Installation Guide


Power in automotive systems is not stable and is often subject to fluctuations and noise. Proper installation of the power conditioning devices in relation to the hardware you are trying to protect is important. With the Vehicle Best Practices Installation Guide you will learn the background on the problems and solutions as well as guidance for the installation of in-vehicle networks as well as guidance to overcome these obstacles.

Request Free!


Essential Security Trends, Predictions and Recommendations from Fortinet's FortiGuard Labs


Join FortiGuard Labs', Senior Security Strategist, Richard Henderson as he discusses topics like:
  • Which threat classes are on the rise, and which on the wane
  • The latest botnet/command & control channels to be sure are on your block list
  • Early indications of what and where Cybercriminals may focus on next
Richard provides additional color behind key findings from the midyear report as well as best practice recommendations to be sure are in place. Request now to hear directly from FortiGuard Labs.

Request Free!


Webinar: Extending Active Directory to Office 365


Since its launch in 2011, Microsoft's Office 365 has quickly become the collaboration software of choice for many organizations. While some are choosing Microsoft for the first time, most Office 365 customers have a history with Microsoft Exchange running on top of a Microsoft infrastructure which includes Active Directory as the main identity store serving as the Exchange server backend. The top concern for many adopters is federating access with Active Directory.

This webinar will discuss delivering:
  • Federated single sign-on
  • User on-boarding and synchronization
  • Microsoft's offering - pros & cons
  • Office 365 with Okta


Request Free!


Why Learning with Analytics Bridges the Gaps in Your Workforce's Capabilities, Improves Performance, and Delivers a Quantifiable ROI


All too often, training is managed without the tools to deliver the right training or measure its impact on the business. How do you know if your training programs are effective? How do you know if they deliver a real ROI for your business? Only when you use business metrics and analytics to support your training programs will you start to see the impact across the business.

Find out what analytics shows you and what real results you can gain.

Request Free!


Office 365 Single Sign-On: High Availability without High Complexity


For most organizations, the move to Office 365 (O365) is a leap forward in user experience, productivity, IT simplification, and savings. But organizations that fail to implement Single Sign-On (SSO) reliably will expectedly experience an increase in risk and a decline in productivity.

This technology brief will explain why highly reliable SSO between your on-premise network and O365 is crucial, and why that implementation is surprisingly difficult to achieve using the accessory tools provided with O365.

Request Free!


Stop Password Sprawl with SaaS Single Sign-On via Active Directory


As mobile devices have pushed their way into the enterprise, they have brought cloud apps along with them. This app explosion means account passwords are multiplying, which exposes corporate data and leads to help desk calls from frustrated users.

Download this white paper to learn:
  • How you can leverage your existing AD to manage app access.
  • Key capabilities to consider when implementing Single Sign-On (SSO).
  • How SSO can boost IT satisfaction and improve security.


Request Free!


Windows Least Privilege Management and Beyond


Devising an enterprise-wide privilege access scheme for Windows systems can be complex. For example, each Window system object has its own access control list and the myriad of OS level rights and integrity levels which can vary by Windows version. For Windows environments it is critical that organizations can delegate administration and establish granular privileges quickly and efficiently. By doing so, IT can restrict administrators so that they can access the servers and resources required to perform their job, and only during the approved times to perform specific tasks.

This white paper examines the security, compliance and efficiency issues surrounding least privilege management for Windows servers, and explains where native Windows tools fall short.

Request Free!


Google BigQuery Analytics -- Free Sample Chapter


Google BigQuery Analytics is the perfect guide for business and data analysts who want the latest tips on running complex queries and writing code to communicate with the BigQuery API. The book uses real-world examples to demonstrate current best practices and techniques, and also explains and demonstrates streaming ingestion, transformation via Hadoop in Google Compute engine, AppEngine datastore integration, and using GViz with Tableau to generate charts of query results. In addition to the mechanics of BigQuery, the book also covers the architecture of the underlying Dremel query engine, providing a thorough understanding that leads to better query results.

  • Features a companion website that includes all code and data sets from the book
  • Uses real-world examples to explain everything analysts need to know to effectively use BigQuery
  • Includes web application examples coded in Python


Request Free!


Hadoop For Dummies -- Free Sample Chapter


Big data has become big business, and companies and organizations of all sizes are struggling to find ways to retrieve valuable information from their massive data sets with becoming overwhelmed. Enter Hadoop and this easy-to-understand For Dummies guide. Hadoop For Dummies helps readers understand the value of big data, make a business case for using Hadoop, navigate the Hadoop ecosystem, and build and manage Hadoop applications and clusters.

  • Explains the origins of Hadoop, its economic benefits, and its functionality and practical applications
  • Helps you find your way around the Hadoop ecosystem, program MapReduce, utilize design patterns, and get your Hadoop cluster up and running quickly and easily
  • Details how to use Hadoop applications for data mining, web analytics and personalization, large-scale text processing, data science, and problem-solving
  • Shows you how to improve the value of your Hadoop cluster, maximize your investment in Hadoop, and avoid common pitfalls when building your Hadoop cluster

From programmers challenged with building and maintaining affordable, scalable data systems to administrators who must deal with huge volumes of information effectively and efficiently, this how-to has something to help you with Hadoop.



Request Free!


Opportunity From Uncertainty: Choosing the Right Strategic Partner for Your Data Center


You'll learn how HP BladeSystem with HP OneView can help you unify tools and processes, cut data center costs, and deliver IT rapidly.

Sponsored by: HP BladeSystem c7000 Platinum enclosure powered by the Intel®Xeon® processor E5-2600 v2 series

Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.

Request Free!


Enabling an 'Always On' Global Trading Partner Network


Watch this webcast on advanced communications from IBM to learn about the innovative solutions that can improve relationships with customers and trading partners by enabling “always on” communications.

You will learn:
  • Innovative ways your organization can synchronize critical information flows with partners, suppliers and customers
  • About the benefits of AS4 and AS2 exchange profiles, and which one would provide the most benefits for your business
  • How to minimize disruptions, remove barriers, and ensure compliance with rapidly evolving protocol standards


Request Free!


Creating Mobile Apps with jQuery Mobile--Free 30 Page Excerpt


The development focuses on creating a framework compatible with a wide variety of smartphones and tablet computers made necessary by the growing but heterogeneous tablet and smartphone market. The jQuery Mobile framework is compatible with other mobile app frameworks and platforms such as PhoneGap, Worklight, and more.

Creating Mobile Apps with jQuery Mobile reflects the author’s years of experience and exposes every hidden secret which will ease your mobile app development. With just a smattering of design and user experience thrown in, going through this book will allow you to confidently say, “yes, I can do that.”

We’ll start out with effective mobile prototyping and then move directly to the core of what every one of your mobile sites will need. Then, we’ll move on to the fancy stuff.

After creating some basic business templates and a universal JavaScript, we will move into the more interesting side of mobile development but we always try to keep an eye on progressive enhancement. jQuery Mobile is all about reaching everyone. So is this book.

"Creating Mobile Apps with jQuery Mobile" will take your basic mobile knowledge and help you make versatile, unique sites quickly and easily.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Dreamweaver CS6 Mobile and Web Development with HTML5, CSS3, and jQuery Mobile--Free 26 Page Excerpt


These technologies have radically reconfigured the process of designing web content and function in the widest possible range of browsing environments, ranging from desktops to mobile devices.

"Dreamweaver CS6 Mobile and Web Development with HTML5, CSS3, and jQuery Mobile" is essentially three books in one: an introduction to building websites; Dreamweaver CS6: HTML5, CSS3, Responsive Design; and an in-depth explanation of how to build inviting, accessible mobile sites with Dreamweaver CS6, responsive design, and jQuery Mobile.

This book serves both as the essential reference for Dreamweaver CS6, and a valuable addition to even the most extensive set of resources for modern web design, with or without Dreamweaver.

The book starts off by teaching you to create sites and pages with Dreamweaver CS6 and how to use HTML5 for page structure. Then we will learn some cutting-edge design and animation with CSS3.

The book also shows how to create and enhance mobile sites with jQuery Mobile. You will also learn to customize themes with ThemeRoller.

"Dreamweaver CS6 Mobile and Web Development with HTML5, CSS3, and jQuery Mobile Mobile" covers the entire spectrum of web design with Dreamweaver, with an emphasis on multi-media (full screen and mobile) design and jQuery Mobile.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


HTML5 iPhone Web Application Development--Free 41 Page Excerpt


Work through real world examples with references, and in-depth discussions on the approach; including its benefits and drawbacks.

"HTML5 iPhone Web Application Development" strives to teach all levels of developers, beginners and professionals, the process of creating web applications for iOS Safari. Utilizing current industry standards for frontend development, learn to take advantage of HTML5, CSS3 and JavaScript to create compelling software.

Start with reviewing current industry standards for frontend development, and end with creating a native application using the same codebase.

Your journey will begin with an overview of current industry standards for frontend technology, quickly moving to solve real world issues; from creating a resizable or responsive gallery, to creating a single page application that utilizes the popular Backbone.js framework.

"HTML5 iPhone Web Application Development" aims to make you an expert in developing web applications for the iOS Safari platform.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Joomla! 3 Beginner's Guide--Free 34 Page Excerpt


It’s a free, fun, and feature-rich tool for anyone who wants to create dynamic, interactive websites. Even beginners can deploy Joomla to build professional websites. Even though it can be challenging to get beyond the basics and build the site that meets your needs perfectly, this book will guide you through it all.

Completely updated for Joomla! 3, this practical guide helps you to create professional and good-looking websites with Joomla!, whether you want to build a personal blog site or a full-featured company or club website.

The Joomla! 3 Beginner’s Guide will help you to get started with Joomla! quickly. It’s presented in an organized, easy-to-read manner. The book doesn’t focus on what Joomla! can do – it focuses on what you can do using Joomla!.

You learn how to get Joomla! up and running, how to organize content, add new menus, add new features, change the design and much more. Real-life examples and tutorials will spark your imagination and show you what kind of professional, feature-rich websites any web builder can achieve with Joomla!. The focus is on clear instructions and easy-to-understand tutorials, with minimal jargon.

Using the "Joomla! 3 Beginner’s Guide" you’ll quickly gain the knowledge needed to build your own site, perfectly tailored to your specific needs.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Learning JavaScriptMVC -- Free 14 Page Excerpt


As it does not depend on server components, it can be combined with any web service interface and server-side language.

"Learning JavaScriptMVC" will guide you through all the framework aspects and show you how to build small- to mid-size well-structured and documented client-side applications you will love to work on.

This book starts from JavaScriptMVC installation and all its components are explained with practical examples. It finishes with an example of building a web application. You will learn what the JavaScriptMVC framework is, how to install it, and how to use it efficiently.

This book will guide you on how to build a sample application from scratch, test its codebase using unit testing, as well as test the whole application using functional testing, document it, and deploy the same. After reading Learning JavaScriptMVC you will learn how to install the framework and create a well-structured, documented and maintainable client-side application.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Responsive Web Design by Example--Free 33 Page Excerpt


You can now create your very own responsive website quickly and efficiently, allowing you to showcase your content in a format that will work on any device with an Internet browser.

By following our detailed step-by-step instructions in this structured reference guide, you will learn how you can build engaging responsive websites. With coverage of Bootstrap, Skeleton, and Zurb Foundation you'll learn about three of the most powerful responsive frameworks available today.

Leading you through by practical example, you'll find that this essential reference develops your understanding by actually helping you create beautiful websites step by step in front of your very eyes. After going over the basics, you'll be able to choose between creating your own responsive portfolio page with Skeleton, building a stunning product page with Bootstrap, or setting up your own professional business website with Zurb Foundation. Ultimately you'll learn how to decide which framework is right for you, and how you can deploy and customize it to your exact specifications!

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


The Professional ScrumMaster's Handbook--Free 30 Page Excerpt


A professional ScrumMaster relaxes this tension using the Scrum framework so that the team arrives at the best possible outcome.

"The Professional ScrumMaster’s Handbook" is a practical, no-nonsense guide to helping you become an inspiring and effective ScrumMaster known for getting results.

This book goes into great detail about why it seems like you’re fighting traditional management culture every step of the way. You will explore the three roles of Scrum and how, working in harmony, they can deliver a product in the leanest way possible. You’ll understand that even though there is no room for a project manager in Scrum, there are certain “management” aspects you should be familiar with to help you along the way. Getting a team to manage itself and take responsibility is no easy feat; this book will show you how to earn trust by displaying it and inspiring courage in a team every day.

"The Professional ScrumMaster’s Handbook" will challenge you to dig deep within yourself to improve your mindset, practices, and values in order to build and support the very best agile teams.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


jQuery Hotshot -- Free 32 Page Excerpt


It has become the standard tool for web developers and designers to add dynamic, interactive elements to their sites, smoothing out browser inconsistencies and reducing costly development time.

jQuery Hotshot walks you step by step through 10 projects designed to familiarise you with the jQuery library and related technologies. Each project focuses on a particular subject or section of the API, but also looks at something related, like jQuery's official templates, or an HTML5 feature like localStorage. Build your knowledge of jQuery and related technologies.

Learn a large swathe of the API, up to and including jQuery 1.9, by completing the ten individual projects covered in the book.

Some of the projects that we'll work through over the course of this book include a drag-and-drop puzzle game, a browser extension, a multi-file drag-and-drop uploader, an infinite scroller, a sortable table, and a heat map.

Learn which jQuery methods and techniques to use in which situations with jQuery Hotshots.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Achieving Best Practices for Virtual Machine Backup and Recovery


This Lab Validation report from ESG provides you with best practices to create an environment that offers you simple unified data protection across physical and virtual landscapes, maximum protection and data availability, and reduced storage needs and operational costs.

Request Free!


Conquering the Top 5 Enterprise Data Protection Challenges


How are savvy CIO's conquering these types of challenges? Find out how in this white paper by vExpert, David Davis.

Request Free!


2014 Application & Service Delivery Handbook Part 1


This is the eight edition of what had previously been called the Application Delivery Handbook. When the first edition was published in 2007 one of the primary goals of the handbook was to help IT organizations understand that successful application delivery involves a combination of optimization, management and security. Interestingly enough, many of the service delivery challenges that we identified in 2007 are still of concern to the majority of IT organizations. However, as described in this year's handbook, driven largely by the broad adoption of BYOD, virtualization and cloud computing, IT organizations are now facing a new wave of challenges - many of which are far more daunting than anything we have seen before.

Request Free!


Data Centers in the Crosshairs: Today's Most Dangerous Threats


Comprising the most valuable assets in your organization – your web, DNS, database, and email servers - data centers have become the number one target of cyber criminals, hacktivists and state-sponsored attackers. This paper analyzes the top five most dangerous threats to your data center. It also describes the impact of these threats and it reveals the latest methods, tools and techniques used by attackers to exploit data center resources.

Request Free!


Information Storage and Management--Free Sample Chapter


This new edition of the unparalleled bestseller serves as a full training course all in one and as the world's largest data storage company, EMC is the ideal author for such a critical resource. They cover the components of a storage system and the different storage system models while also offering essential new material that explores the advances in existing technologies and the emergence of the "Cloud" as well as updates and vital information on new technologies.

  • Features a separate section on emerging area of cloud computing
  • Covers new technologies such as: data de-duplication, unified storage, continuous data protection technology, virtual provisioning, FCoE, flash drives, storage tiering, big data, and more
  • Details storage models such as Network Attached Storage (NAS), Storage Area Network (SAN), Object Based Storage along with virtualization at various infrastructure components
  • Explores Business Continuity and Security in physical and virtualized environment
  • Includes an enhanced Appendix for additional information

This authoritative guide is essential for getting up to speed on the newest advances in information storage and management.



Request Free!


You can find other free technology white papers here.