Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
Free technology white papers »
These are only the most recent releases from our complete list of free technology white papers. To stay informed, subscribe to the RSS feed, bookmark this page, or follow Geekzone on Twitter.

Enter your email address below to subscribe to a daily email with links to new free technology white papers:


2014 CMS Software Matrix


Business software, especially the CMS powering your website, can lead to tremendous growth for a company or long-term headaches. Given that range of results, your selection process is critical.  

In the 2014 CMS Matrix, you'll get information on:

  • A visual leader board of each vendor's software

  • Insight into cost & agreement structure

  • Questions to ask potential CMS partners
  • Knowledge about overlooked components of any CMS implementation



Request Free!


Android Application Security Essentials: Chapter 5 - Respect Your Users


"Android Application Security Essentials" will show you how to secure your Android applications and data. It will equip you with tricks and tips that will come in handy as you develop your applications.
We will start by learning the overall security architecture of the Android stack. Securing components with permissions, defining security in a manifest file, cryptographic algorithms and protocols on the Android stack, secure storage, security focused testing, and protecting enterprise data on your device is then also discussed in detail. You will also learn how to be security-aware when integrating newer technologies like NFC and mobile payments into your Android applications.

At the end of this book, you will understand Android security at the system level all the way to the nitty-gritty details of application security for securing your Android applications.

This book will help you:

  • Understand Android security from kernel to the application layer
  • Protect components using permissions
  • Safeguard user and corporate data from prying eyes
  • Understand the security implications of mobile payments, NFC, and more


Request Free!


Creating Mobile Apps with jQuery Mobile--Free 30 Page Excerpt


The development focuses on creating a framework compatible with a wide variety of smartphones and tablet computers made necessary by the growing but heterogeneous tablet and smartphone market. The jQuery Mobile framework is compatible with other mobile app frameworks and platforms such as PhoneGap, Worklight, and more.

Creating Mobile Apps with jQuery Mobile reflects the author’s years of experience and exposes every hidden secret which will ease your mobile app development. With just a smattering of design and user experience thrown in, going through this book will allow you to confidently say, “yes, I can do that.”

We’ll start out with effective mobile prototyping and then move directly to the core of what every one of your mobile sites will need. Then, we’ll move on to the fancy stuff.

After creating some basic business templates and a universal JavaScript, we will move into the more interesting side of mobile development but we always try to keep an eye on progressive enhancement. jQuery Mobile is all about reaching everyone. So is this book.

"Creating Mobile Apps with jQuery Mobile" will take your basic mobile knowledge and help you make versatile, unique sites quickly and easily.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Dreamweaver CS6 Mobile and Web Development with HTML5, CSS3, and jQuery Mobile--Free 26 Page Excerpt


These technologies have radically reconfigured the process of designing web content and function in the widest possible range of browsing environments, ranging from desktops to mobile devices.

"Dreamweaver CS6 Mobile and Web Development with HTML5, CSS3, and jQuery Mobile" is essentially three books in one: an introduction to building websites; Dreamweaver CS6: HTML5, CSS3, Responsive Design; and an in-depth explanation of how to build inviting, accessible mobile sites with Dreamweaver CS6, responsive design, and jQuery Mobile.

This book serves both as the essential reference for Dreamweaver CS6, and a valuable addition to even the most extensive set of resources for modern web design, with or without Dreamweaver.

The book starts off by teaching you to create sites and pages with Dreamweaver CS6 and how to use HTML5 for page structure. Then we will learn some cutting-edge design and animation with CSS3.

The book also shows how to create and enhance mobile sites with jQuery Mobile. You will also learn to customize themes with ThemeRoller.

"Dreamweaver CS6 Mobile and Web Development with HTML5, CSS3, and jQuery Mobile Mobile" covers the entire spectrum of web design with Dreamweaver, with an emphasis on multi-media (full screen and mobile) design and jQuery Mobile.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Google BigQuery Analytics -- Free Sample Chapter


Google BigQuery Analytics is the perfect guide for business and data analysts who want the latest tips on running complex queries and writing code to communicate with the BigQuery API. The book uses real-world examples to demonstrate current best practices and techniques, and also explains and demonstrates streaming ingestion, transformation via Hadoop in Google Compute engine, AppEngine datastore integration, and using GViz with Tableau to generate charts of query results. In addition to the mechanics of BigQuery, the book also covers the architecture of the underlying Dremel query engine, providing a thorough understanding that leads to better query results.

  • Features a companion website that includes all code and data sets from the book
  • Uses real-world examples to explain everything analysts need to know to effectively use BigQuery
  • Includes web application examples coded in Python


Request Free!


HTML5 iPhone Web Application Development--Free 41 Page Excerpt


Work through real world examples with references, and in-depth discussions on the approach; including its benefits and drawbacks.

"HTML5 iPhone Web Application Development" strives to teach all levels of developers, beginners and professionals, the process of creating web applications for iOS Safari. Utilizing current industry standards for frontend development, learn to take advantage of HTML5, CSS3 and JavaScript to create compelling software.

Start with reviewing current industry standards for frontend development, and end with creating a native application using the same codebase.

Your journey will begin with an overview of current industry standards for frontend technology, quickly moving to solve real world issues; from creating a resizable or responsive gallery, to creating a single page application that utilizes the popular Backbone.js framework.

"HTML5 iPhone Web Application Development" aims to make you an expert in developing web applications for the iOS Safari platform.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Hadoop For Dummies -- Free Sample Chapter


Big data has become big business, and companies and organizations of all sizes are struggling to find ways to retrieve valuable information from their massive data sets with becoming overwhelmed. Enter Hadoop and this easy-to-understand For Dummies guide. Hadoop For Dummies helps readers understand the value of big data, make a business case for using Hadoop, navigate the Hadoop ecosystem, and build and manage Hadoop applications and clusters.

  • Explains the origins of Hadoop, its economic benefits, and its functionality and practical applications
  • Helps you find your way around the Hadoop ecosystem, program MapReduce, utilize design patterns, and get your Hadoop cluster up and running quickly and easily
  • Details how to use Hadoop applications for data mining, web analytics and personalization, large-scale text processing, data science, and problem-solving
  • Shows you how to improve the value of your Hadoop cluster, maximize your investment in Hadoop, and avoid common pitfalls when building your Hadoop cluster

From programmers challenged with building and maintaining affordable, scalable data systems to administrators who must deal with huge volumes of information effectively and efficiently, this how-to has something to help you with Hadoop.



Request Free!


Joomla! 3 Beginner's Guide--Free 34 Page Excerpt


It’s a free, fun, and feature-rich tool for anyone who wants to create dynamic, interactive websites. Even beginners can deploy Joomla to build professional websites. Even though it can be challenging to get beyond the basics and build the site that meets your needs perfectly, this book will guide you through it all.

Completely updated for Joomla! 3, this practical guide helps you to create professional and good-looking websites with Joomla!, whether you want to build a personal blog site or a full-featured company or club website.

The Joomla! 3 Beginner’s Guide will help you to get started with Joomla! quickly. It’s presented in an organized, easy-to-read manner. The book doesn’t focus on what Joomla! can do – it focuses on what you can do using Joomla!.

You learn how to get Joomla! up and running, how to organize content, add new menus, add new features, change the design and much more. Real-life examples and tutorials will spark your imagination and show you what kind of professional, feature-rich websites any web builder can achieve with Joomla!. The focus is on clear instructions and easy-to-understand tutorials, with minimal jargon.

Using the "Joomla! 3 Beginner’s Guide" you’ll quickly gain the knowledge needed to build your own site, perfectly tailored to your specific needs.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Learning JavaScriptMVC--Free 14 Page Excerpt


As it does not depend on server components, it can be combined with any web service interface and server-side language.

"Learning JavaScriptMVC" will guide you through all the framework aspects and show you how to build small- to mid-size well-structured and documented client-side applications you will love to work on.

This book starts from JavaScriptMVC installation and all its components are explained with practical examples. It finishes with an example of building a web application. You will learn what the JavaScriptMVC framework is, how to install it, and how to use it efficiently.

This book will guide you on how to build a sample application from scratch, test its codebase using unit testing, as well as test the whole application using functional testing, document it, and deploy the same. After reading Learning JavaScriptMVC you will learn how to install the framework and create a well-structured, documented and maintainable client-side application.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Linux Shell Scripting Cookbook, Second Edition--Free 40 Page Excerpt


Using a combination of simple commands, we will see how to solve complex problems in day to day computer usage.

Linux Shell Scripting Cookbook, Second Edition will take you through useful real-world recipes designed to make your daily life easy when working with the shell. The book shows the reader how to effectively use the shell to accomplish complex tasks with ease.

The book discusses basics of using the shell, general commands and proceeds to show the reader how to use them to perform complex tasks with ease.

Starting with the basics of the shell, we will learn simple commands with their usages allowing us to perform operations on files of different kind. The book then proceeds to explain text processing, web interaction and concludes with backups, monitoring and other sysadmin tasks.

Linux Shell Scripting Cookbook, Second Edition serves as an excellent guide to solving day to day problems using the shell and few powerful commands together to create solutions.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Microsoft Exchange Server 2013 PowerShell Cookbook: Second Edition--Free 34 Page Excerpt


Windows PowerShell 3 can be used in conjunction with Exchange Server 2013 to automate and manage routine and complex tasks to save time, money, and eliminate errors.

Microsoft Exchange Server 2013 PowerShell Cookbook: Second Edition offers more than 120 recipes and solutions to everyday problems and tasks encountered in the management and administration of Exchange Server. If you want to write scripts that help you create mailboxes, monitor server resources, and generate detailed reports, then this Cookbook is for you.

This practical guide to Powershell and Exchange Server 2013 will help you automate and manage time-consuming and reoccurring tasks quickly and efficiently. Starting by going through key PowerShell concepts and the Exchange Management Shell, this book will get you automating tasks that used to take hours in no time.

With practical recipes on the management of recipients and mailboxes as well as distribution groups and address lists, this book will save you countless hours on repetitive tasks. Diving deeper, you will then manage your mailbox database, client access, and your transport servers with simple but effective scripts.

This book finishes with advanced recipes on Exchange Server problems such as server monitoring as well as maintaining high availability and security. If you want to control every aspect of Exchange Server 2013 and learn how to save time with PowerShell, then this cookbook is for you.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Mobile First Bootstrap: Chapter 2 - Designing Stylesheet in Bootstrap 3


Bootstrap changes the way we develop websites in the frontend, and mobile web development has grown incredibly over the past few years. There are over 1.2 billion mobile web users in the world, and 25% of those mobile web users are exclusively mobile. Now, Bootstrap has also gone mobile-first. The mobile-first version of Bootstrap lets you first think about the mobile site and then think about how it expands to larger screens. To build websites for mobile devices that improve the overall experience of your customers, you need to be skilled at using the mobile-first feature of Bootstrap.

Mobile First Bootstrap covers the new features in Bootstrap 3 and focuses on how they affect development from a mobile-first perspective. It will show you how to use Bootstrap 3 for developing websites for mobile and how to use that knowledge for your own development projects.

Overview:

  • Get to grips with the essentials of mobile-first development with Bootstrap
  • Understand the entire process of building a mobile-first website with Bootstrap from scratch
  • Packed with screenshots that help guide you through how to build an appealing website from a mobile-first perspective with the help of a real-world example


Request Free!


Mobile Security: How to Secure, Privatize, and Recover Your Devices: Chapter 3 - Privacy - Small Word, Big Consequences


In this guide you will discover just how vulnerable unsecured devices can be, and explore effective methods of mobile device management and identity protection to ensure your data's security. There will be special sections detailing extra precautions to ensure the safety of family members and how to secure your device for use at work.

What you will learn from this book:

  • Learn how mobile devices are monitored and the impact of cloud computing
  • Understand the attacks hackers use and how to prevent them
  • Keep yourself and your loved ones safe online


Request Free!


Responsive Web Design by Example--Free 33 Page Excerpt


You can now create your very own responsive website quickly and efficiently, allowing you to showcase your content in a format that will work on any device with an Internet browser.

By following our detailed step-by-step instructions in this structured reference guide, you will learn how you can build engaging responsive websites. With coverage of Bootstrap, Skeleton, and Zurb Foundation you'll learn about three of the most powerful responsive frameworks available today.

Leading you through by practical example, you'll find that this essential reference develops your understanding by actually helping you create beautiful websites step by step in front of your very eyes. After going over the basics, you'll be able to choose between creating your own responsive portfolio page with Skeleton, building a stunning product page with Bootstrap, or setting up your own professional business website with Zurb Foundation. Ultimately you'll learn how to decide which framework is right for you, and how you can deploy and customize it to your exact specifications!

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


The Professional ScrumMaster's Handbook--Free 30 Page Excerpt


A professional ScrumMaster relaxes this tension using the Scrum framework so that the team arrives at the best possible outcome.

"The Professional ScrumMaster’s Handbook" is a practical, no-nonsense guide to helping you become an inspiring and effective ScrumMaster known for getting results.

This book goes into great detail about why it seems like you’re fighting traditional management culture every step of the way. You will explore the three roles of Scrum and how, working in harmony, they can deliver a product in the leanest way possible. You’ll understand that even though there is no room for a project manager in Scrum, there are certain “management” aspects you should be familiar with to help you along the way. Getting a team to manage itself and take responsibility is no easy feat; this book will show you how to earn trust by displaying it and inspiring courage in a team every day.

"The Professional ScrumMaster’s Handbook" will challenge you to dig deep within yourself to improve your mindset, practices, and values in order to build and support the very best agile teams.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Wiley's Hadoop Book Bundle -- A Free 113 Page Sampler


This Wiley e-book bundle includes selected materials from 5 recently published titles in Wiley's expansive catalog of titles. The material that is included for each selection is the book's full Table of Contents as well as a full sample chapter for your enjoyment.

Titles Include:

  • Hadoop For Dummies
  • Google BigQuery Analytics
  • Professional Hadoop Solutions
  • Professional NoSQL
  • Hybrid Cloud For Dummies

Whether you're a seasoned veteran of Hadoop or a newcomer, there are valuable lessons and advice in these pages for you. Download today and receive your FREE sampler filled with thought provoking insights from today's leading authors.
 



Request Free!


iOS and OS X Network Programming Cookbook: Chapter 6 - Bonjour


A lot of developers do not realize that iOS is a full UNIX-based operating system that contains a full set of networking APIs. These APIs can be used to create both client- and server-based applications in the iOS environment as well as OS X. Using the Apple’s Bonjour library you will learn how to publish, find, and connect the services together without hardcoding the connection information. There are also a number of third-party APIs that can be used to easily connect iOS and OS X applications to web-based services. Finally this book will cover several low level libraries like LibNET and LibPCAP on the OS X environment.

Overview:

  • Use several Apple and third-party APIs to develop both server and client networked applications
  • Shows you how to integrate all of the third-party libraries and APIs with your applications
  • Includes sample projects for both iOS and OS X environments


Request Free!


jQuery Hotshot--Free 32 Page Excerpt


It has become the standard tool for web developers and designers to add dynamic, interactive elements to their sites, smoothing out browser inconsistencies and reducing costly development time.

jQuery Hotshot walks you step by step through 10 projects designed to familiarise you with the jQuery library and related technologies. Each project focuses on a particular subject or section of the API, but also looks at something related, like jQuery's official templates, or an HTML5 feature like localStorage. Build your knowledge of jQuery and related technologies.

Learn a large swathe of the API, up to and including jQuery 1.9, by completing the ten individual projects covered in the book.

Some of the projects that we'll work through over the course of this book include a drag-and-drop puzzle game, a browser extension, a multi-file drag-and-drop uploader, an infinite scroller, a sortable table, and a heat map.

Learn which jQuery methods and techniques to use in which situations with jQuery Hotshots.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


5 DNS Security Risks That Keep You Up At Night


In this whitepaper, we discuss 5 common and treacherous security threats that can completely debilitate your DNS, and subsequently, your online business. From DNS Amplification Attacks to Registrar Hijacking, we explain exactly what goes on during these attacks, what threat do they pose to you, and how you can prevent becoming a target yourself.

Don’t let your DNS fend for itself; give it the protection it needs to hide from the Internet monsters.



Request Free!


Protecting Your Brand & Reputation: A Guide To Email Security For IT


This document provides an overview of a few of the things you can do to help protect yourself from these attacks.

There are two major areas of protection this paper will discuss:

  1. Secure transmission and reception of an email
  2. Authentication of email messages by worldwide receivers


Request Free!


2014 Application & Service Delivery Handbook Part 1


This is the eight edition of what had previously been called the Application Delivery Handbook. When the first edition was published in 2007 one of the primary goals of the handbook was to help IT organizations understand that successful application delivery involves a combination of optimization, management and security. Interestingly enough, many of the service delivery challenges that we identified in 2007 are still of concern to the majority of IT organizations. However, as described in this year's handbook, driven largely by the broad adoption of BYOD, virtualization and cloud computing, IT organizations are now facing a new wave of challenges - many of which are far more daunting than anything we have seen before.

Request Free!


Data Centers in the Crosshairs: Today's Most Dangerous Threats


Comprising the most valuable assets in your organization – your web, DNS, database, and email servers - data centers have become the number one target of cyber criminals, hacktivists and state-sponsored attackers. This paper analyzes the top five most dangerous threats to your data center. It also describes the impact of these threats and it reveals the latest methods, tools and techniques used by attackers to exploit data center resources.

Request Free!


How Fleet Telematics Systems Are Helping Businesses Monitor Their Fleet's Status


But today, the most sophisticated telematics systems can be used to intervene when a truck driver is going too fast, following too closely, or falling asleep behind the wheel. Deploying wireless telematics systems can lead to increased productivity, improved customer service, higher levels of safety, and more efficient use of company assets.

Thanks to integrating telematics into their fleets, companies are seeing a 15 percent increase in productivity per truck. Managers of even small fleets can now optimize the maintenance and performance of their vehicles while also improving driver performance and overall safety.

Download this guide now and learn how telematics systems optimize fleet performance and safety and what you can track with it. Plus, we'll also include several no-obligation complimentary price quotes from reputable GPS Systems providers to get you started.

Request Free!


The Future of Business Phone Systems: What Features to Look For in 2015


Rapid enhancements are taking place in phone technology overall, leading to innovations that will help SMBs improve their performance and productivity. Technology advancements are making systems easily adaptable and responsive to other business applications within SMBs.

Phone systems of the future will eliminate the need for complex and expensive phone hardware and software. These systems are easy to use, manage, and monitor, and come with more advanced features and functions than copper - wire - based systems. They also help reduce overall telecommunication costs by using Web, video and other developed collaborative tools. Additionally, they ensure stable and reliable communication, and help businesses realize valuable productivity improvements with personalization and third - party software - integration options. Finally, a significant number of vendors are already offering services to support these new phone systems, which means the future is nearly here.

In this white paper, we will review all the features the new phone systems offer and help you determine which would best fit your needs now and into the future as your business grows. Plus, we'll also include several no-obligation complimentary price quotes from reputable Phone Systems providers to get you started.

Request Free!


Answers for Today's K-12 Network


The Internet plays a vital part of daily activity in today's K-12 network. Students, teachers and administrators are using this tool as a means of expanding the classroom experience. Network administrators are facing increasing pressure from federal, state, and local regulators to ensure it can meet ever growing demands. Limitations in access to the Internet and other wide area network resources can affect an institutions ability to meet these directives.

Request Free!


Designing the Perfect WAN: Business Continuity via WAN Redundancy


The network plays a vital part in business activity in today's market. Companies require viable Internet/WAN connectivity in order to succeed in an increasingly competitive and global business landscape and to insure that business is not interrupted. This paper explores how companies use the network to conduct day-to-day functions that help employees, customers, partners, suppliers and investors.

Request Free!


Public Cloud Flexibility, Private Cloud Security


The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving to the cloud is how to secure and control access to data saved in cloud applications.

Request Free!


Top Pitfalls to Avoid When Implementing Cloud Computing


Cloud computing is one of the most captivating technology in today's IT world. Cloud computing, with the revolutionary promise of computing as a utility, has transformed how IT services are delivered and managed. The demand for cloud computing solutions is growing exponentially. This white paper will identify the pitfalls to watch out for when implementing the technology, and stress the importance of WAN redundancy and reliability.

Request Free!


Enterprise Mobility Management Going from Good to Great


EMM must not forget BYOD but also go beyond it into Mobile App Management (MAM) and find ways to keep users personal information and employers information separated and find a way to embrace the Internet of Things.

Request Free!


Enterprise Mobility Management Suite from CA Technologies


The EMM suite will drive cost savings, enable mobile productivity and secure enterprise infrastructure simply and effectively. The suite is modular in nature so apps can be implemented together or as stand-alone. In addition, the EMM Suite is leveraging CA Technologies leading product portfolio to create strategic integration with other products.

Request Free!


Going Mobile Video


In today's fragmented landscape, proactive management of mobility is not an option? it's a strategic imperative.

Request Free!


Rethinking Enterprise Mobility - The Way It Should Be


This means going beyond BYOD and MDM, and embracing MAM, MEM, MCM, and IoT. For many companies, finding the balance between employers and users privacy and security has been a problematic issue.

Request Free!


Seven Ways to Create an Unbeatable Enterprise Mobility Strategy


Today's cutting-edge organizations are adopting mobile strategies that balance seamless connections for employees and customers while maintaining a secure, flexible supporting infrastructure. Even if you can't anticipate all the ways mobility will transform your business three, five, or 10 years out, there are seven ways you can get started today to develop an enterprise mobility strategy that will accelerate your mobility transformation and ensure you are prepared for what the future has in store.

Request Free!


Smart Enterprise Mobility Solutions are Powered by Smart Containerization


Smart Containerization by CA Technologies is unique in delivering the best user interface experience that end users insist on and provides advanced security features such as support for the latest platform security features, complete management benefits, as well as being borderless and multi-channel— supporting mobile and non-mobile, devices.

Request Free!


VDI Your Users Will Love


With Citrix XenDesktop, you can provide access to virtualized apps and desktops from anywhere, on any device, with a great experience in any scenario.

Request Free!


Preparing Sales Teams for the Best Business Outcomes


Developing competencies of the sales team and improving sales potential is possible through the use of emerging social collaboration technology. Social collaboration tools can enable team members to find experts and share knowledge to improve performance and find useful information residing anywhere in the organization.

Watch this On-Demand webcast to learn how your organization can use social collaboration to deliver competitive differentiation in the market.

Speaker:

Stephan Millard, VP & Research Director - Human Capital Management, Ventana Research

Request Free!


The Essentials of Information Security Kit: Includes a Free PC Security Handbook - 2nd Edition eBook


The Essentials of Information Security brings together the latest in information, coverage of important developments, and expert commentary to help with your Information Security related decisions.

The following kit contents will help you get the most out of your Information Security research:
  • Citrix NetScaler: A Powerful Defense against Denial of Service Attacks
  • PC Security Handbook - 2nd Edition
  • Virtual Patching: Lower Security Risks and Costs
  • Practical Guide to Secure File Transfers


Request Free!


The Essentials of Virtualization - Free Kit


The Essentials of Virtualization, brings together the latest in information, coverage of important developments, and expert commentary to help with your Virtualization related decisions.

The following kit contents will help you get the most out of your Virtualization research:
  • IBM Simplifies IT Management with Virtual Desktop Infrastructure (VDI) on System x Servers
  • Virtual Patching: Lower Security Risks and Costs
  • Virtual Desktop Acquisition Cost Analysis
  • Propel Your Partners into the Cloud


Request Free!


iPad CTO Kit - including the iPad Tips and Tricks Guide for IT Executives and Managers


The iPad CTO Kit brings together the latest in information, coverage of important developments, and expert commentary to help with your IT Management related decisions.

The following kit contents will help you get the most out of your IT Management research:
  • iPad Tips and Tricks - A Guide for Executives and Managers
  • The Value of Big Data
  • Virtual Patching: Lower Security Risks and Costs
  • 5 Practical Ways Apps Can Streamline Your Mobile Business


Request Free!


Data-Leakage, Regulatory Compliance & BYOD


Enabling employees to BYOD (i.e., use their personal smartphones for work) offers significant benefits to businesses in the form of increased productivity and flexibility. However, enabling BYOD carries increased information security risk, violating regulatory compliance. Traditional security solutions are limited in their ability to solve these problems due to inherent architectural challenges, requiring new technology to meet these needs for today's enterprise.

Request Free!


Move Forward With Cloud and Mobile, Securely


Mobile and cloud. Your employees want them. Your company needs them. But how do you secure them while respecting employee privacy? This white paper explores the limitations of existing security solutions on the market and explores an entirely new approach where both IT and employees win. Download this white paper to learn more.

Request Free!


Gartner Report: 2014 Magic Quadrant for Enterprise Mobility Management


After its extensive vendor evaluation, Gartner has recognized Citrix as a Leader, highlighting strengths in its mobile app portfolio that improve the user experience.

Request Free!


How 4 Customers Solved the Enterprise Mobility Challenge


Enterprise Mobility Management (EMM), which encompasses mobile devices, apps and data, is a top priority for most organizations—and it's becoming more challenging than ever. To be productive, employees need on-the-go access to apps and data, even on their personal devices. Although today's mobile workers use native mobile apps, primarily email, they also rely on Windows desktops, SaaS and web apps. Enterprises need a way to deliver these other types of apps on mobile devices now— but IT rarely has either the time or budget to build mobile versions.

Request Free!


SECURITY LEADERSHIP SERIES: Security Strategies for Success


For IT leaders, these security strategies for success are essential reading.

Request Free!


How To Use Your iPhone iOS5: Lesson 1 Beginner


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.  Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This beginner guide hopes to help point these features out (also available for iOS6). This version of the Beginner guide is intended for iOS5 users. If your phone is up-to-date, read MakeUseOf’s iOS6 version instead.



Request Free!


How To Use Your iPhone iOS5: Lesson 2 Intermediate


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.  Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This intermediate guide hopes to help point these features out, and is follow-up to MakeUseOf’s Beginner iPhone guide (also available for iOS6). This version of the Intermediate guide is intended for iOS5 users. If your phone is up-to-date, read MakeUseOf’s  iOS6 version instead.



Request Free!


How To Use Your iPhone iOS5: Lesson 3 Advanced


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This advanced guide hopes to help point these features out, and is follow-up to MakeUseOf’s Intermediate iPhone guide (also available for iOS6). This version of the Advanced guide is intended for iOS5 users. If your phone is up-to-date, read MakeUseOf’s  iOS6 version instead.



Request Free!


How To Use Your iPhone iOS6: Lesson 1 Beginner


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.  Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This beginner guide hopes to help point these features out (also available for iOS5). This version of the Beginner guide is intended for iOS6 users. If your phone is not up-to-date, read MakeUseOf’s iOS5 version instead.



Request Free!


How To Use Your iPhone iOS6: Lesson 2 Intermediate


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.  Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This intermediate guide hopes to help point these features out, and is follow-up to MakeUseOf’s Beginner iPhone guide (also available for iOS5). This version of the Intermediate guide is intended for iOS6 users. If your phone is not up-to-date, read MakeUseOf’s iOS5 version instead.



Request Free!


How To Use Your iPhone iOS6: Lesson 3 Advanced


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.  Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This advanced guide hopes to help point these features out, and is follow-up to MakeUseOf’s Intermediate iPhone guide (also available for iOS5). This version of the Advanced guide is intended for iOS6 users. If your phone is not up-to-date, read MakeUseOf’s iOS5 version instead.



Request Free!


The Password Management Guide


We are all overwhelmed by passwords. Everyone has an account for Google, Facebook, Twitter, LinkedIn, Outlook/Hotmail, Dropbox...the list goes on.  Unfortunately, most of us use either one password or a group of passwords for all of our major accounts. That’s dangerous. It doesn’t matter if the individual password is unique, or if it’s a long mix of numbers and letters; if you only use one password it won’t matter. When one account is compromised, all of your accounts will likely follow. The main reason people reuse passwords is that keeping track of many different logins (username and password as shortly both are called logins) is difficult, in fact it’s potentially impossible. This is where password management applications become crucial, especially in a business environment. You don’t want to use the same password with all of your online accounts, but it is also impossible for you to remember hundreds of passwords. So what should you do?



Request Free!


The CIO Playguide for Secure BYOD


Mobile devices and the ability to work everywhere present a huge opportunity but also pose a challenge for IT in securing corporate data. This ebook provides essential insights for planning and deploying BYOD processes and tools to mitigate security risks and assure proper compliance. Ensure a successful BYOD program today, download the free ebook.



Request Free!


Single Sign-On Saves South Shore Staff 583 Hours a Day


Learn more about how single sign-on saved staff 583 hours a day and helped increase productivity at South Shore Hospital. With single sign-on they were able to reduce roaming sign-on time, increase security and improve their staff's overall workflow. Download this case study to learn how single sign-on saves time and increases user productivity in a regulated industry.

Request Free!


Comparing Costs and Time to Value with Oracle Exadata Database Machine


Check out the new ITG TCO comparison and see how IBM and Oracle stack up.

Request Free!


Comparing Costs and Time to Value with Teradata Data Warehouse Appliance


This analyst written paper compares two of the market leaders, IBM and Teradata, along with their competing products - IBM PureData System for Analytics, powered by Netezza technology and Teradata's Data Warehouse Appliance 2700. The report compares three-year costs of ownership between the respective products.

Request Free!


Simple is Still Better: Embrace Speed & Simplicity for a Competitive Edge


The market offers an array of choices to organizations planning new data warehouses to manage large and varied data sets. Most vendors emphasize the speed of their products, but few address the real need: to increase speed efficiently, which reduces complexity and cost by simplifying data warehousing. Listening to the hundreds of organizations who have transformed their warehouses with IBM PureData System for Analytics, powered by Netezza technology, it becomes apparent that their successes were made possible not by speed alone, but by speed delivered with simplicity.

Request Free!


The Best-in-Class Data Warehouse: Fast, Simple, Impactful


As the pace of business continues to accelerate, organizations are leaning heavily on data warehouses to deliver analytical grist for the mill of daily decisions. This Research Report from Aberdeen Group examines the benefits of data warehouse solutions that offer rapid information delivery while minimizing complexity for users and IT.

Request Free!


The Value of Perfect Forward Secrecy


A solution is to employ Perfect Forward Secrecy, in which unrecoverable temporary session keys are generated, used and discarded. When implemented correctly with Elliptic Curve Cryptography (ECC), Perfect Forward Secrecy is more secure than RSA algorithms and performs better.

Request Free!


Comparing Storage Connectivity: IBM Flex System vs. Cisco UCS


Flash based storage offers efficient and fast access to frequently accessed data but the server and network infrastructure needs to be designed for high performance connectivity.

This paper compares two connectivity options for Flash based storage:
  1. IBM Flex System using 16Gb Fibre Channel
  2. Cisco UCS using FCoE connection
Based on testing conducted by Evaluator Group.

The IBM Flex System solution delivered 4x faster response time with 50% fewer cables compared to the Cisco UCS solution.

Learn more by downloading and reading this paper.

Request Free!


Eliminate Shortcomings in Your Cloud Architecture with Smarter Storage


IBM has a differentiated storage portfolio, including XIV, Scale Out NAS (SONAS), SAN Volume Controller (SVC), Tivoli Storage Manager (TSM), Tivoli Storage Productivity Center (TPC), and SmartCloud solutions.

Request Free!


Six Essential Elements of Web Application Security


Like all competitive businesses, your application developers and operation teams are constantly under pressure to move quickly. Everybody wants their application security efforts to be effective, but only if they don't unduly impede workflow or drive up costs. To balance these potentially-competing objectives, industry-leading organizations often use six elements in their approach to web application security. Download this white paper to learn more!

Request Free!


Best Android Browser: Chrome vs. Firefox vs. Opera vs. Dolphin


Still using the stock Android browser? You’re missing out. Android users can choose from a plethora of browsers, bringing a richer mobile Web experience to your smartphone or tablet. We considered Android’s top third-party browsers, Firefox and Opera, along with relative underdog Dolphin, then tested and compared them to Chrome to see which one deserves to be the default choice on your smartphone.

With this download you will also receive free weekly coverage on the latest technology news and developments from Laptop Magazines eNewsletter.



Request Free!


Best Windows 8.1 Browser: Chrome vs. Firefox vs. Internet Explorer


When it comes to Web browsing on your Windows 8 tablet, chances are you’ve already picked your favorite browser for the job. But you might be missing out. The best browsers can enhance your surfing experience with fast speeds, comprehensive standards support and intuitive navigation. We put the three leading browsers for Windows 8′s “Metro” mode — Google Chrome, Mozilla Firefox and Internet Explorer — to the test to see which one will serve you best.

With this download you will also receive free weekly coverage on the latest technology news and developments from Laptop Magazines eNewsletter.



Request Free!


Future of Networked Commerce: Changing How the World Interacts


The experts speak. Vivek Bapat, SAP: “One does not discover new lands without consenting to lose sight, for a very long time, of the shore” (André Gide). Drew Hofler, SAP: “It is the long history of humankind (and animal kind, too) those who learned to collaborate and improvise most effectively have prevailed” (attributed to Charles Darwin). Reuven Gorsht, SAP: “There are no old roads to new places.” Join us for Future of Networked Commerce: Changing How the World Interacts.

Listen to this Podcast to learn more!!

Request Free!


G2 Crowd's Spring 2014 Grid? for Email Marketing


When it comes to investing in email marketing, there are multiple factors to consider, including an organization's current offering, customer satisfaction and market presence. G2 Crowd evaluated ExactTarget against 12 other vendors in the space, and named ExactTarget a leader. Key findings in this report include:
  • Highest customer satisfaction scores of any vendor
  • Largest market presence across all vendors
  • 90% of users ranked ExactTarget 4 or 5 stars
  • 87% of users would recommend the product to their peers
Learn how the different vendors stack up.

Request Free!


IBM SmartCloud Desktop Infrastructure


This anytime, anywhere “bring-your-own-device” (BYOD) mindset poses a dilemma for organizations. If these challenges sound familiar to you, read this solution brief to learn how IBM® SmartCloud™ Desktop Infrastructure, built on pay-as-you-grow IBM System x® servers and powered by the latest Intel® Xeon® processors, can provide more cost-effective and manageable virtual desktop capabilities to help increase business flexibility and staff productivity while reducing IT complexity and simplifying security and compliance.

Sponsored by IBM and Intel.

Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.

Request Free!


Private Clouds: Easing Deployment and Management


This paper from IDC describes how IBM® System x® cloud solutions, featuring the latest Intel® Xeon® processors, offer a wide range of entry points to each individual customer, from those new to cloud computing and just getting started, to experienced users seeking higher-level capabilities.

Sponsored by IBM and Intel.

Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.

Request Free!


SAN SSL


SSL (FQDN)

Request Free!


Enterprise Social at the Speed of Business


While solutions come in all shapes and sizes, successful social business collaboration solutions must be more than just a mechanism for sharing information. They must integrate with evolving IT environments, protect user privacy and most importantly help companies meet their business objectives.

IDG Research Services conducted a survey to find out how enterprise social collaboration is playing out in the real world. Download the findings to learn about:
  • Business drivers for social collaboration investments.
  • Obstacles to acceptance and adoption of social collaboration software implementation and how to overcome them.
  • How organizations are measuring ROI of social collaboration solutions.


Request Free!


Social Business Collaboration: Five Best Practices, Three Market Trends


Use of consumer grade social media and collaboration technologies has become commonplace in an enterprise context. Much less common is the use of secure and compliant social business solutions, which foster improved teamwork and information sharing that measurably improves business results. Aberdeen's research identifies five best practices that consistently describe the top performers in social business collaboration, and proves insights into three market trends in how the infrastructure supporting collaboration initiatives is being implemented.

Request Free!


Extending Traditional Security to VDI


Organizations have adopted Virtual Desktop Infrastructure (VDI) due to benefits such as increasing overall utilization, reducing management costs, and enhancing security. VDI also supports consumerization and Bring-Your-Own-Device (BYOD) strategies, as endpoint users can access applications and data on their desktops using any mobile device, resulting in better productivity. However, extending traditional security to virtualized environments opens up networks to a plethora of security challenges and threats that can lead to business disruption or, worse, data leakage.

Request Free!


Hacker Monthly -- Elon Musk on Entrepreneurship


In this issue of Hacker Monthly, we’ve pulled together the need-to-know information from hackernews.com to form an eye-catching compilation of the hottest stories on the internet. Elon Musk, business magnate, inventor and investor, graces the cover while divulging secrets of his success within.  As you read on, you’ll enjoy articles on startups, programming and some just for fun.  So kick back, relax, and enjoy the read!  Also included in this issue are the following additional stories:

  • Why You’ll Always Think Your Product Is Shit
  • What Good Is Experience?
  • Coding Tricks of Game Developers
  • That’s Why You Don’t Have Any Friends
  • Plus 10 other topics you don’t want to miss …

Every month, we select from the top voted articles on Hacker News and curate them in magazine format. The submission guidelines for Hacker Monthly state that content can be “anything that gratifies one’s intellectual curiosity.”



Request Free!


Explore How Paul VI Catholic High School Benefited From Fujitsu's Devices and Software


Paul VI Catholic School wanted to develop a laptop program that would equip its students and teachers with the right tools to increase classroom learning, prepare their students for college, and to develop the 21st Century skillsets required by today's employers.

Following a comprehensive selection process, the school chose to provide 1,000 students, and 75 teachers with the Fujitsu LIFEBOOK T732/4 laptop. The school also chose DyKnow's teaching & learning software as part of the overall strategy.

The benefits:
  • Teachers now use the devices, combined with DyKnow software, to provide an engaging, immersive learning experience
  • The Fujitsu LIFEBOOK T732 Laptop, and now the most recent T734 model, is giving students the flexibility to have all their computing needs covered for 4 years in one device
  • By supplying almost half of set textbooks in e-book format, students' families are now saving approximately 50 percent on costs
  • The school's transformation to a more student-centered educational program puts Paul VI at the forefront of the private school educational sector and positions it well in the highly competitive Fairfax County Public School system


Request Free!


Discover the Fast and Low Risk Way to Integrate Enterprise Applications


Discover the low risk, fast time-to-market way to integrate with your mission-critical applications in this white paper. Highlights of this free white paper:
  • Find out how to make enterprise applications compatible with your mobile and web initiatives
  • Discover how to quickly and easily develop web services and APIs from new and legacy enterprise applications and data
  • Gain insight from real-world enterprise integration projects in insurance, financial services, media, and higher education
  • Learn how to rapidly integrate applications with less cost, time, and risk than other methods
Download this free white paper to learn more now!

Request Free!


Make It Modern, Make it Mobile: How to Bring Innovation to Enterprise Systems


These systems don't have the modern interfaces needed to integrate with new and emerging mobile, web, and cloud technologies.

Legacy system replacement has proven to be expensive, time-consuming, and often unsuccessful.

Learn why companies are now trending towards rapidly developed, lightweight mobile and web applications that tie into heavier enterprise transaction environments.

Highlights of this application modernization guide include:
  • The business drivers used to justify application modernization initiatives
  • Best practices that deliver solutions which combine legacy system functionality with mobile, web and cloud technologies
  • How to easily provide business-critical information quickly on mobile and web devices
Download now!

Request Free!


Oracle Magazine


Oracle Magazine contains technology strategy articles, sample code, tips, Oracle and partner news, how to articles for developers and DBAs, and more. Oracle (NASDAQ: ORCL) is the world's largest enterprise software company.

For more information about Oracle, please visit their Web site at http://www.oracle.com. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.

Request Free!


Defend Web Properties From Modern Threats With Citrix NetScaler


Today, defending your organization's web properties means more than just protecting a handful of enterprise web applications from advanced malware.

Request Free!


Your Unofficial Raspberry Pi Manual


You’ve surely heard of the Raspberry Pi: the palm-sized computer with enough power to run servers or media centres complete with retro gaming.  Rasberry Pi has the connectivity to control security systems and enthusiast projects; and with the software tools to encourage the teaching and understanding of programming. Since its launch in 2012 the Raspberry Pi has exceeded expectations, becoming a must-have piece of computer hardware for enthusiasts and tech-heads. For a small project developed to be sold to schools and colleges to teach programming principles, that’s not bad. It’s also just the tip of the iceberg. In this guide you’ll find everything you need to know about the Raspberry Pi computer, its background, purpose, system specs, the software it runs and the amazing things it is capable of.



Request Free!


Information Storage and Management--Free Sample Chapter


This new edition of the unparalleled bestseller serves as a full training course all in one and as the world's largest data storage company, EMC is the ideal author for such a critical resource. They cover the components of a storage system and the different storage system models while also offering essential new material that explores the advances in existing technologies and the emergence of the "Cloud" as well as updates and vital information on new technologies.

  • Features a separate section on emerging area of cloud computing
  • Covers new technologies such as: data de-duplication, unified storage, continuous data protection technology, virtual provisioning, FCoE, flash drives, storage tiering, big data, and more
  • Details storage models such as Network Attached Storage (NAS), Storage Area Network (SAN), Object Based Storage along with virtualization at various infrastructure components
  • Explores Business Continuity and Security in physical and virtualized environment
  • Includes an enhanced Appendix for additional information

This authoritative guide is essential for getting up to speed on the newest advances in information storage and management.



Request Free!


You can find other free technology white papers here.