Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
Free technology white papers »
These are only the most recent releases from our complete list of free technology white papers. To stay informed, subscribe to the RSS feed, bookmark this page, or follow Geekzone on Twitter.

Enter your email address below to subscribe to a daily email with links to new free technology white papers:


Ihre projektbasierte Serviceorganisation: Papierflieger oder Rakete?


Manche Serviceunternehmen sind heute schon Raketen. Das heißt, sie fliegen mit Software, die speziell für das Servicemanagement zugeschnitten sind, raketenartig voraus. Andere, die sich auf Basis verschiedener, unzureichender Softwarelösungen gerade noch so in der Luft halten, segeln unkoordiniert dahin.

In diesem Whitepaper erfahren Sie, was projektbasierte Organisationen zu Raketen macht und in welche Technologien sie investiert haben, damit sie die Kundenanforderungen erfüllen können und gleichzeitig Budgets und Termine einhalten.



Request Free!


100 Gbit/s Line Side Modulation Schemes and Impairments


With customers' exponential need for speed, carriers are already exploring beyond 10G and 40G networks. Are you interested in learning more about 100G networks, but unsure of where to start?

EXFO's 100G reference poster, which provides a quick, yet comprehensive view of 100G line side modulation schemes and impairments. In addition, it can help you quickly grasp 40G/100G Ethernet (IEEE 802.3ba), OTU4/OTU3 (ITU-T G.709) and 40G/100G interfaces.

You can also order a 35 in (89 cm) x 22 in (56 cm) copy, printed on supreme gloss paper, folded, and individually wrapped to ensure they reach their destination in good condition. Order it now.

Request Free!


6 Tips For Creating An Unbreakable Password That You Can Remember


You can lock every door and window of your house, but if you use a skeleton key the odds are pretty good someone is probably going to end up robbing you blind. The same is true of your passwords. If your passwords are not unique and unbreakable, you might as well open the front door and invite the robbers in for lunch. Use these tips for creating strong passwords … ones you will actually remember!



Request Free!


7 Different Uses Of Integrating Google Drive With Gmail


When the number of tools you use is actually making life more complicated, it is time to integrate. Let’s start with Google Drive and Gmail.

Thankfully, there are a number of ways that you can integrate Gmail and Google Drive so that in a way, they act as one single tool that you won’t be able to live without. It’s easy to do! Follow these steps and you’ll be integrated in no time.



Request Free!


How To Use Your iPhone iOS5: Lesson 1 Beginner


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.  Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This beginner guide hopes to help point these features out (also available for iOS6). This version of the Beginner guide is intended for iOS5 users. If your phone is up-to-date, read MakeUseOf’s iOS6 version instead.



Request Free!


How To Use Your iPhone iOS5: Lesson 2 Intermediate


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.  Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This intermediate guide hopes to help point these features out, and is follow-up to MakeUseOf’s Beginner iPhone guide (also available for iOS6). This version of the Intermediate guide is intended for iOS5 users. If your phone is up-to-date, read MakeUseOf’s  iOS6 version instead.



Request Free!


How To Use Your iPhone iOS5: Lesson 3 Advanced


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This advanced guide hopes to help point these features out, and is follow-up to MakeUseOf’s Intermediate iPhone guide (also available for iOS6). This version of the Advanced guide is intended for iOS5 users. If your phone is up-to-date, read MakeUseOf’s  iOS6 version instead.



Request Free!


How To Use Your iPhone iOS6: Lesson 1 Beginner


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.  Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This beginner guide hopes to help point these features out (also available for iOS5). This version of the Beginner guide is intended for iOS6 users. If your phone is not up-to-date, read MakeUseOf’s iOS5 version instead.



Request Free!


How To Use Your iPhone iOS6: Lesson 2 Intermediate


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.  Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This intermediate guide hopes to help point these features out, and is follow-up to MakeUseOf’s Beginner iPhone guide (also available for iOS5). This version of the Intermediate guide is intended for iOS6 users. If your phone is not up-to-date, read MakeUseOf’s iOS5 version instead.



Request Free!


How To Use Your iPhone iOS6: Lesson 3 Advanced


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.  Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This advanced guide hopes to help point these features out, and is follow-up to MakeUseOf’s Intermediate iPhone guide (also available for iOS5). This version of the Advanced guide is intended for iOS6 users. If your phone is not up-to-date, read MakeUseOf’s iOS5 version instead.



Request Free!


LTE Performance through Early Testing and Faster Mean Time to Identify Failure


This white paper looks at ways that both Mobile Network Operators (MNOs) and Network Equipment Manufacturers (NEMs) can boost their LTE performance and achieve high levels of quality, service and support through identification of errors, notably by reducing Mean Time to Identify Failures (MTIF).

This handy reference includes privileged information such as:
  • Lab–testing guidelines
  • MTIF-optimized test solutions
  • Cost of Quality (CoQ) case study
  • Test use cases: end-to-end network testing and SMS-over-IP service testing


Request Free!


The Complete Guide to Simplifying and Securing Your Life with LastPass and Xmarks


If you’re like most people, the keys to your entire life are stored online. Your bank accounts, health records, work files, tax returns, vehicle registration information, and just about every other important document is stored somewhere in the cloud. While this means that you can easily access all of your important information wherever you are, it also means that you have a lot of passwords. And keeping track of all of those passwords is really hard. That’s why LastPass was created. This guide will take you through the basics and some of the more advanced features of LastPass, from storing your passwords to checking the level of your online security. It will also explain Xmarks, a bookmarking and open-tab-syncing service formerly known as Foxmarks. Between these two apps, you’ll be able to access all of your important information online, securely, no matter where you are!



Request Free!


The Ultimate 'Should I Use Linux?' Checklist


For those who aren’t sure how to evaluate the efficacy of Linux for themselves, we have created a simple guide that can walk you through the criteria you need to look at. Since you want an operating system to work for you without any issues, it’s safe to assume that any major issues that you find along the way are enough reason to choose not to use Linux. Get started and find out for yourself.



Request Free!


The Ultimate Netflix Guide: Everything You Wanted To Know About Netflix But Were Afraid To Ask


Netflix — the binge-watcher’s Holy Grail — delivers all the TV shows and movies you could ask for … right to your screen. But we already knew that. This guide will fill you in on all the extras like how to install Netflix, how to watch on another device, third-party apps and services, and much more.



Request Free!


Ultimate IFTTT Guide Use the Web's Most Powerful Tool Like A Pro


IFTTT is an automation that will enable you to connect 2 services so that, when something happens with one service, a trigger goes off and an action takes place automatically on the other.  For example: let’s say that you are a photography fan who uses Instagram constantly throughout the day. You love taking photos with your mobile device, touching them up and sharing them for everyone to see. Your followers seem to love the photos, so you think that maybe you’d like to get a bit more serious about this whole photography endeavor.

We’ll get to photography-specific examples before this introduction is over, but the uses certainly don’t stop with photography. In fact, I would recommend that you give IFTTT a try regardless of your walk of life. It’s why I outline uses for everyone – from artists to students to professionals – in this guide.



Request Free!


Cloud Computing and Solvency II


IBM survey shows how cloud is forming a part of insurers' Solvency II strategy.

Request Free!


Context-Aware Collaboration: Turning Field Service Workers into Knowledge Workers


Many enterprises, however, have yet to use these services to improve internal operations, such as field service, and other elements of their workforce management solutions. Integrating context-aware services with modern collaboration capabilities can help organizations improve the way they share ideas, resolve issues and improve customer service.

Request Free!


How to Increase Revenue with WiFi & Retail Presence Analytics


Many WiFi Retail Presence Analytics platforms promise the world, but provide little more than a collection of reports and meaningless data. Fortinet Presence Analytics is different, delivering a platform that helps you better understand customer behavior, engage more closely with your customers and actually influence their purchasing decisions.

Join Koroush Safar, Senior Director of Product Management at Fortinet as he demonstrates how your retail organization can leverage Fortinet's Presence Analytics to increase your revenue.

In this webinar, Koroush will cover:
  • How WiFi Presence Analytics works
  • Social WiFi and its impact on customer engagement
  • Customer privacy concerns and how to address them
  • How you can leverage Presence Analytics to increase sales and revenue


Request Free!


It's Raining, It's Pouring, Are Your Field Techs Snoring?


Mobile Apps will energize your field engineers and give them the practical, timesaving tools and resources that ensure a productive working day.

Download this paper to find out how you can wake up your field techs with mobile apps from ClickSoftware.

Request Free!


Email Security: How To Prevent Spoofing & Phishing


Email security isn't as cut and dry as just marking messages from Nigerian princes as SPAM. Without the right security features in place, phishers, spammers, and attackers can hijack your email to send messages that look like they’re from your company.

This not only hurts your recipients if they end up giving the phishers information, but it can ultimately hurt your brand reputation. In this whitepaper, you’ll learn what you should be implementing in your email backend and how to do it. In no time at all, you can rest easy knowing that your customers and your brand are protected.

In this whitepaper, you'll learn the importance of email security as well as:

  • The secure transmission and reception of an email
  • Authentication of email messages by worldwide receivers
  • How to implement SPF, DKIM, and DMARC


Request Free!


Evaluating The Cost Of A DDoS Attack


Take a look at all that a DDoS attack can cost you (hint: it’s not JUST downtime) and maybe you’ll reconsider your plan of crossing your fingers that no one attacks you.

While no one would want to undergo a DDoS attack and risk downtime, many companies don’t have the proper procedures and equipment in place to successfully prevent or mitigate an attack.

For something that may never happen, many look at DDoS protection as a sunk cost.

The question is, are you willing to risk the cost of a DDoS attack in order to save some money now? Find out just how much you’re putting at stake if you skimp on security.



Request Free!


How to Protect Your Brand in Social Media


The very characteristics that make social media incredibly appealing to consumers are the same ones that make it ripe for scammers seeking to exploit the value and power of established brands. It's not unusual for fans and consumers to be exposed to something new every day, whether a promotion, contest, fan page or enticing content. And, without much history to signal what is genuine and what is not, consumers find themselves at risk of being hoodwinked by brand impersonators, malicious account spoofers and counterfeiters.

This white paper offers best practices for protecting your brand--and brand engagement--in social media channels.

Request Free!


Building Your Brand on the Big 6 Networks


You can't build a strong social brand for your clients without a deep understanding of Facebook, LinkedIn, Google+, Twitter, Instagram, and Pinterest. “6 Blueprints for Social Network Success” puts valuable structure around the best practices for each of these very different networks.

By mining these blueprints, you can help your clients:
  • Gain quick wins on any of the Big 6 networks
  • Understand how content needs and audience expectations vary from network to network
  • Match social strategies and client goals to the right social networks
Download this tip sheet and start building a stronger social framework for your clients.

Request Free!


Forrester Market Overview: Hosted Collaboration Services Providers


Sixty-five percent of IT leaders Forrester recently surveyed said they are interested in or already using software-as-a-service (SaaS) for some portion of their collaboration technology portfolio. But many IT leaders — particularly those at very large organizations — are unsure whether standardized SaaS offerings from Google and Microsoft provide the flexibility they need. These concerns shouldn't prevent CIOs from moving collaboration tools off-premises. We find a burgeoning services sector that can deliver highly customized messaging, teaming, and real-time communication services for the enterprise.

This report provides an overview of the market, giving CIOs a sense of the players, their capabilities, and their offerings.

Request Free!


How the Cloud is Reshaping Virtual Desktops


Discover the benefits of independence from your physical desktop computer infrastructure.

Desktop computing has become an increased cost burden for IT, and a source of frustration for tech-savvy users who expect more flexibility. Cloud-hosted desktops enable companies to mitigate the complexity placed on IT while reducing the risks associated with lost or stolen devices, all at a reduced TCO.

Request Free!


Learn 7 Tips from Virgin America for Building a Mobile Social Intranet on Salesforce1 Platform


In this recorded on-demand webinar, see how Virgin America uses a mobile social intranet to connect its teammates and how they make it easy to use.

Request Free!


Spotlight on Cloud Security


While the cloud is becoming an underlying assumption of computing, often public cloud services present problems for IT that business managers fail to think through, especially security implications. This paper covers:
  • Cloud security liabilities
  • Identity management
  • Data encryption
Today, nearly all businesses have one foot in the cloud whether they realize it or not. This paper will enable IT to assess their organization's exposure and reap the benefit of public cloud services without creating worry or unnecessary risk.

Request Free!


The Social Hunger: Why Your Audience Feasts on Social Integration


Your audience craves social media. How do we know? We asked hundreds of people about their attitudes, opinions, and beliefs when it comes to brands integrating social media into their marketing efforts. Universally, the data supports what we've already seen in action: consumers want to engage with brands that integrate social media, and they prefer to do business with social brands. How can your brand satisfy this insatiable appetite? Download The Social Hunger to learn:
  • The principles you can use today to build your social media strategy.
  • What you can do to increase customer engagement as well as improve amplification and reach.
  • How social media increases purchase intent and strengthens consumer preference.


Request Free!


The State of Enterprise Social Marketing Report


Marketing on social media is now an imperative for companies seeking to stay relevant to consumers and potential customers. But little research has been conducted to learn how the most profitable brands and companies approach, execute and measure social marketing.

In Q1 2014, Spredfast commissioned research from Forrester Consulting to uncover insights on the state of enterprise social marketing programs at the biggest companies across the U.S. and Western Europe. With input from 160 Director-level or above leaders in companies with $1 Billion or above in revenue, this first-of-its-kind research report surfaced corporate social marketing trends and insightful benchmarks for consideration in 2014 planning and beyond. The 25-page research report reveals insights into:
  • Executive-level oversight and priority of social marketing efforts
  • The business value of social marketing across different social networks and tactics
  • Enterprise companies' top business goals and objectives for social marketing
  • How and what companies are measuring to determine the impact of social marketing
  • The integration of social marketing across broader (non-social) marketing efforts and owned sites
Use these new insights and 30+ data points to fine-tune your social planning for the upcoming months, and beyond.

Request Free!


Don't Just Produce Content - Deliver Results


When it comes to content, rich media is having a greater effect on search engine rankings than ever before. Rich media has also flattened the traditional text-based click distribution curve on SERPs, delivering a higher CTR for listings lower on the page. Ask yourself, is SEO your primary content channel? It should be because organic traffic captures 40% of revenue. Download now to find out how.

Request Free!


Survey Highlights: Data Backup and Recovery Benchmark Report


Where does your data management plan stand in relationship to other systems in the industry? Is there room for improvement? Iron Mountain sets out to help you answer these questions with an in-depth review of practices used by 1,200 IT professionals. Discover the trials and triumphs of data management personnel and find out where your organization fits in on the information governance spectrum. Topics discussed include:
  • Time-sensitive backup planning
  • Onsite vs. offsite storage
  • A triaged list of the most important data management issues faced by IT professionals
  • Safe, effective, compliant data disposal
Explore the state of data management today and learn how to stay ahead of the information curve as your business and your data expand.

© 2014 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks are the property of their respective owners.

Request Free!


The Cost of Inertia: Insight from Data Protection Predictors


This comprehensive study report follows the observations of IT professionals across several fields of industry as they consider the current state of data management. The study examines the roadblocks that many organizations will face in the coming years as data continues to expand, but also helps readers map their way toward a more secure, more efficient data protection plan. Topics discussed in the study include:
  • Assessing the problems of implementing and maintaining a data safety plan
  • Creating safeguards against lawsuits, damages to reputation, and other disasters
  • Fortifying the infrastructure of your data protection system
  • Choosing the best technological backup tools according to the needs of your company
Hear from business peers as they take a powerful look at where data management stands today and where it will stand going forward. Download the report to take advantage of the study and turn yesterday's experiences into tomorrow's successes.

© 2014 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks are the property of their respective owners.

Request Free!


The Future of Backup as a Data Protection Strategy


With so many technologies and security solutions available, it's difficult for a data manager to know where to begin when it comes to building a safety plan. Iron Mountain offers guidance in the form of five questions any data management professional must ask before getting a backup security system off the ground. The questions reveal advice on:
  • Cataloguing data according to its level of business importance
  • Locating and properly assessing your current data backups
  • Finding the right combination of security services that cater to your needs
  • Weighing the cost of various backup systems
  • Creating the best and most cost-effective tests for a data protection plan
Get a detailed picture of how to begin safeguarding your data against harm, theft, and corruption. Read Iron Mountain's article today.

© 2014 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks are the property of their respective owners.

Request Free!


What To Look For In A New Phone System For Your Business


There are many different types of telephone systems, and each type will offer different advantages for varying sizes of businesses; therefore, it's important to ensure that all aspects of the phone system will be met before making a final decision.

Before considering a specific type of Business Telephone System (BTS), it's important to understand exactly what employees and clients need. In this guide, we will review all the systems and their features and help you determine which would best fit your needs now and into the future as your business grows. Plus, we'll also include several no-obligation complimentary price quotes from reputable Phone Systems providers to get you started.

Request Free!


The Essentials of IT Security - Free Kit


The Essentials of IT Security, brings together the latest in information, coverage of important developments, and expert commentary to help with your IT Security related decisions.

The following kit contents will help you get the most out of your IT Security research:
  • Citrix NetScaler: A Powerful Defense against Denial of Service Attacks
  • Magic Quadrant for Identity and Access Management as a Service
  • Adapting Security to the Cloud
  • Advanced Persistent Threat Protection for Dummies (SPECIAL EDITION)


Request Free!


The Essentials of Virtualization - Free Kit


The Essentials of Virtualization, brings together the latest in information, coverage of important developments, and expert commentary to help with your Virtualization related decisions.

The following kit contents will help you get the most out of your Virtualization research:
  • Virtual Desktop Acquisition Cost Analysis
  • Why Hybrid IT Strategy is a Bridge Between Today's Environment and Tomorrow's Technology
  • Virtualizing Your Infrastructure with a Path to the Cloud: 5 Reasons Why Your IT Infrastructure Should Run on Blade Servers
  • Seven Virtualization DR Myths


Request Free!


iPad CTO Kit - including the iPad Tips and Tricks Guide for IT Executives and Managers


The iPad CTO Kit brings together the latest in information, coverage of important developments, and expert commentary to help with your IT Management related decisions.

The following kit contents will help you get the most out of your IT Management research:
  • iPad Tips and Tricks - A Guide for Executives and Managers
  • Application Release Automation with Zero-Touch Deployment
  • Taking Your Enterprise Mobile: An Executive Checklist
  • The Mobile Strategy Video Series The Impact of Mobile on Business and IT


Request Free!


The Essentials of Information Security Kit: Includes a Free PC Security Handbook - 2nd Edition eBook


The Essentials of Information Security brings together the latest in information, coverage of important developments, and expert commentary to help with your Information Security related decisions.

The following kit contents will help you get the most out of your Information Security research:
  • Citrix NetScaler: A Powerful Defense against Denial of Service Attacks
  • PC Security Handbook - 2nd Edition
  • Magic Quadrant for Identity and Access Management as a Service
  • Adapting Security to the Cloud


Request Free!


Considerations for Embracing Wireless Management


This paper details three critical steps to stay ahead of employee demand for wireless access, including:
  • Measuring how many devices are currently accessing the network, when and for what
  • Leveraging that data to create wireless policies – vs. guesstimating
  • Rethinking network design to accommodate this new normal
Change your strategy before it's too late: According to Gartner, as wireless networks migrate from networks of convenience to primary user networks, 80% of network designs will be obsolete by 2015.

Request Free!


Important versus Vital Records: The Magic 5% You Can't Live Without


There are 2 key factors that determine the useful life of vital records—where they are stored and their identification. Do you know the measures that need to be taken to ensure the life of your vital records?

Consult the following white paper to learn:
  • the steps it takes to properly identify and protect your vital records
  • a deeper understanding of the risks associated with inadequate preservation
  • how to evaluate storage options, and more
© 2014 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks are the property of their respective owners.

Request Free!


Information Governance Benchmark Survey Report


Records and Information Management (RIM) as you know it today is changing, especially in light of all of the attention being given to Information Governance. The Information Governance Survey Benchmarking Report provides you with the opportunity to compare the state of your RIM program to that of others. It can help you further establish business value in your RIM program and provides insight such as:
  • 87% of organizations surveyed have a RIM program in place
  • 8% measure compliance
  • 64% cannot get employees to “let go” of information for disposition
Download the report to discover how your peers in the industry are dealing with this evolving information lifecycle management environment.

© 2014 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks are the property of their respective owners.

Request Free!


Records Management Best Practices Guide


Compliance with the regulations governing records management is not only necessary to avoid punishment, it is increasingly important for your organizations to be able to provide evidence of business transactions, decisions and satisfaction of legal obligations. Building a defensible program takes time, but we've created this best practices guide to help get you started.

The best practices initiative is a direct response to requests for guidance on:
  • Best-in-class compliant Records and Information Management (RIM) practices
  • Continual program improvement ideas
  • Government regulations that impact RIM
A compliant RIM program is necessary for organizations to proactively and progressively manage all business record content, regardless of its format or location. Review this guide to learn more.

© 2014 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks are the property of their respective owners.

Request Free!


Video Killed The Web-Conferencing Star


Blue Jeans reveals national survey data demonstrating the power of video-centric meetings. According to the survey, the majority of professionals prefer all of their online or remote meetings to include face-to-face video of meeting participants. Download the infographic for the full list of stats.

Request Free!


When Time Isn't on Your Side: Options for Tackling Event Based Retention Rules


If you are like most organizations, you continue to struggle with an effective way to flip the switch that begins the destruction eligibility count down.

Download this paper and discover some potential options for tackling the event-based retention conundrum. As you read through them, you will need to consider your organizations:
  • risk profile
  • ability to commit resources
  • and attitude towards “keeping everything”
This will help determine which options are most applicable to you.

© 2014 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks are the property of their respective owners.

Request Free!


Don't Let Secure Search Leave You Out in the Cold


The Secure Search paradigm shift forces SEO professionals to use an entirely different approach to SEO management. Adapting to this revolutionary change is mandatory. This Secure Search white paper unlocks the door to SEO success.

Request Free!


Mitigating Security Risks at the Network's Edge


With locations that typically process credit cards, distributed enterprises are at a particularly high risk of suffering data breaches. This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.

Request Free!


PCI 3.0 Compliance Guide


Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI-DSS 3.0. Enabling features of CradlePoint solutions include network segmentation (Ethernet ports, SSIDs and VLANs), stateful firewall, MAC/IP/URL filtering, authentication, encryption, event logging, event alerts, time synchronization, and configuration management from CradlePoint Enterprise Cloud Manager.

Request Free!


Uninterrupted Internet: Maximizing Revenue and Minimizing Business Risk with 3G/4G Failover


With CradlePoint as your Internet backup solution, you're ensured more uptime for your POS transactions and cloud-based services while gaining significant financial and operational benefits over wired backup solutions including: better reliability, lower operating costs, greater ease of use and management, and quicker speed to deployment.

Request Free!


Vehicles Best Practices Installation Guide


Power in automotive systems is not stable and is often subject to fluctuations and noise. Proper installation of the power conditioning devices in relation to the hardware you are trying to protect is important. With the Vehicle Best Practices Installation Guide you will learn the background on the problems and solutions as well as guidance for the installation of in-vehicle networks as well as guidance to overcome these obstacles.

Request Free!


Essential Security Trends, Predictions and Recommendations from Fortinet's FortiGuard Labs


Join FortiGuard Labs', Senior Security Strategist, Richard Henderson as he discusses topics like:
  • Which threat classes are on the rise, and which on the wane
  • The latest botnet/command & control channels to be sure are on your block list
  • Early indications of what and where Cybercriminals may focus on next
Richard provides additional color behind key findings from the midyear report as well as best practice recommendations to be sure are in place. Request now to hear directly from FortiGuard Labs.

Request Free!


Webinar: Extending Active Directory to Office 365


Since its launch in 2011, Microsoft's Office 365 has quickly become the collaboration software of choice for many organizations. While some are choosing Microsoft for the first time, most Office 365 customers have a history with Microsoft Exchange running on top of a Microsoft infrastructure which includes Active Directory as the main identity store serving as the Exchange server backend. The top concern for many adopters is federating access with Active Directory.

This webinar will discuss delivering:
  • Federated single sign-on
  • User on-boarding and synchronization
  • Microsoft's offering - pros & cons
  • Office 365 with Okta


Request Free!


Why Learning with Analytics Bridges the Gaps in Your Workforce's Capabilities, Improves Performance, and Delivers a Quantifiable ROI


All too often, training is managed without the tools to deliver the right training or measure its impact on the business. How do you know if your training programs are effective? How do you know if they deliver a real ROI for your business? Only when you use business metrics and analytics to support your training programs will you start to see the impact across the business.

Find out what analytics shows you and what real results you can gain.

Request Free!


Office 365 Single Sign-On: High Availability without High Complexity


For most organizations, the move to Office 365 (O365) is a leap forward in user experience, productivity, IT simplification, and savings. But organizations that fail to implement Single Sign-On (SSO) reliably will expectedly experience an increase in risk and a decline in productivity.

This technology brief will explain why highly reliable SSO between your on-premise network and O365 is crucial, and why that implementation is surprisingly difficult to achieve using the accessory tools provided with O365.

Request Free!


Stop Password Sprawl with SaaS Single Sign-On via Active Directory


As mobile devices have pushed their way into the enterprise, they have brought cloud apps along with them. This app explosion means account passwords are multiplying, which exposes corporate data and leads to help desk calls from frustrated users.

Download this white paper to learn:
  • How you can leverage your existing AD to manage app access.
  • Key capabilities to consider when implementing Single Sign-On (SSO).
  • How SSO can boost IT satisfaction and improve security.


Request Free!


Windows Least Privilege Management and Beyond


Devising an enterprise-wide privilege access scheme for Windows systems can be complex. For example, each Window system object has its own access control list and the myriad of OS level rights and integrity levels which can vary by Windows version. For Windows environments it is critical that organizations can delegate administration and establish granular privileges quickly and efficiently. By doing so, IT can restrict administrators so that they can access the servers and resources required to perform their job, and only during the approved times to perform specific tasks.

This white paper examines the security, compliance and efficiency issues surrounding least privilege management for Windows servers, and explains where native Windows tools fall short.

Request Free!


Google BigQuery Analytics -- Free Sample Chapter


Google BigQuery Analytics is the perfect guide for business and data analysts who want the latest tips on running complex queries and writing code to communicate with the BigQuery API. The book uses real-world examples to demonstrate current best practices and techniques, and also explains and demonstrates streaming ingestion, transformation via Hadoop in Google Compute engine, AppEngine datastore integration, and using GViz with Tableau to generate charts of query results. In addition to the mechanics of BigQuery, the book also covers the architecture of the underlying Dremel query engine, providing a thorough understanding that leads to better query results.

  • Features a companion website that includes all code and data sets from the book
  • Uses real-world examples to explain everything analysts need to know to effectively use BigQuery
  • Includes web application examples coded in Python


Request Free!


Hadoop For Dummies -- Free Sample Chapter


Big data has become big business, and companies and organizations of all sizes are struggling to find ways to retrieve valuable information from their massive data sets with becoming overwhelmed. Enter Hadoop and this easy-to-understand For Dummies guide. Hadoop For Dummies helps readers understand the value of big data, make a business case for using Hadoop, navigate the Hadoop ecosystem, and build and manage Hadoop applications and clusters.

  • Explains the origins of Hadoop, its economic benefits, and its functionality and practical applications
  • Helps you find your way around the Hadoop ecosystem, program MapReduce, utilize design patterns, and get your Hadoop cluster up and running quickly and easily
  • Details how to use Hadoop applications for data mining, web analytics and personalization, large-scale text processing, data science, and problem-solving
  • Shows you how to improve the value of your Hadoop cluster, maximize your investment in Hadoop, and avoid common pitfalls when building your Hadoop cluster

From programmers challenged with building and maintaining affordable, scalable data systems to administrators who must deal with huge volumes of information effectively and efficiently, this how-to has something to help you with Hadoop.



Request Free!


Opportunity From Uncertainty: Choosing the Right Strategic Partner for Your Data Center


You'll learn how HP BladeSystem with HP OneView can help you unify tools and processes, cut data center costs, and deliver IT rapidly.

Sponsored by: HP BladeSystem c7000 Platinum enclosure powered by the Intel®Xeon® processor E5-2600 v2 series

Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.

Request Free!


Creating Mobile Apps with jQuery Mobile--Free 30 Page Excerpt


The development focuses on creating a framework compatible with a wide variety of smartphones and tablet computers made necessary by the growing but heterogeneous tablet and smartphone market. The jQuery Mobile framework is compatible with other mobile app frameworks and platforms such as PhoneGap, Worklight, and more.

Creating Mobile Apps with jQuery Mobile reflects the author’s years of experience and exposes every hidden secret which will ease your mobile app development. With just a smattering of design and user experience thrown in, going through this book will allow you to confidently say, “yes, I can do that.”

We’ll start out with effective mobile prototyping and then move directly to the core of what every one of your mobile sites will need. Then, we’ll move on to the fancy stuff.

After creating some basic business templates and a universal JavaScript, we will move into the more interesting side of mobile development but we always try to keep an eye on progressive enhancement. jQuery Mobile is all about reaching everyone. So is this book.

"Creating Mobile Apps with jQuery Mobile" will take your basic mobile knowledge and help you make versatile, unique sites quickly and easily.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Dreamweaver CS6 Mobile and Web Development with HTML5, CSS3, and jQuery Mobile--Free 26 Page Excerpt


These technologies have radically reconfigured the process of designing web content and function in the widest possible range of browsing environments, ranging from desktops to mobile devices.

"Dreamweaver CS6 Mobile and Web Development with HTML5, CSS3, and jQuery Mobile" is essentially three books in one: an introduction to building websites; Dreamweaver CS6: HTML5, CSS3, Responsive Design; and an in-depth explanation of how to build inviting, accessible mobile sites with Dreamweaver CS6, responsive design, and jQuery Mobile.

This book serves both as the essential reference for Dreamweaver CS6, and a valuable addition to even the most extensive set of resources for modern web design, with or without Dreamweaver.

The book starts off by teaching you to create sites and pages with Dreamweaver CS6 and how to use HTML5 for page structure. Then we will learn some cutting-edge design and animation with CSS3.

The book also shows how to create and enhance mobile sites with jQuery Mobile. You will also learn to customize themes with ThemeRoller.

"Dreamweaver CS6 Mobile and Web Development with HTML5, CSS3, and jQuery Mobile Mobile" covers the entire spectrum of web design with Dreamweaver, with an emphasis on multi-media (full screen and mobile) design and jQuery Mobile.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


HTML5 iPhone Web Application Development--Free 41 Page Excerpt


Work through real world examples with references, and in-depth discussions on the approach; including its benefits and drawbacks.

"HTML5 iPhone Web Application Development" strives to teach all levels of developers, beginners and professionals, the process of creating web applications for iOS Safari. Utilizing current industry standards for frontend development, learn to take advantage of HTML5, CSS3 and JavaScript to create compelling software.

Start with reviewing current industry standards for frontend development, and end with creating a native application using the same codebase.

Your journey will begin with an overview of current industry standards for frontend technology, quickly moving to solve real world issues; from creating a resizable or responsive gallery, to creating a single page application that utilizes the popular Backbone.js framework.

"HTML5 iPhone Web Application Development" aims to make you an expert in developing web applications for the iOS Safari platform.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Joomla! 3 Beginner's Guide--Free 34 Page Excerpt


It’s a free, fun, and feature-rich tool for anyone who wants to create dynamic, interactive websites. Even beginners can deploy Joomla to build professional websites. Even though it can be challenging to get beyond the basics and build the site that meets your needs perfectly, this book will guide you through it all.

Completely updated for Joomla! 3, this practical guide helps you to create professional and good-looking websites with Joomla!, whether you want to build a personal blog site or a full-featured company or club website.

The Joomla! 3 Beginner’s Guide will help you to get started with Joomla! quickly. It’s presented in an organized, easy-to-read manner. The book doesn’t focus on what Joomla! can do – it focuses on what you can do using Joomla!.

You learn how to get Joomla! up and running, how to organize content, add new menus, add new features, change the design and much more. Real-life examples and tutorials will spark your imagination and show you what kind of professional, feature-rich websites any web builder can achieve with Joomla!. The focus is on clear instructions and easy-to-understand tutorials, with minimal jargon.

Using the "Joomla! 3 Beginner’s Guide" you’ll quickly gain the knowledge needed to build your own site, perfectly tailored to your specific needs.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Learning JavaScriptMVC -- Free 14 Page Excerpt


As it does not depend on server components, it can be combined with any web service interface and server-side language.

"Learning JavaScriptMVC" will guide you through all the framework aspects and show you how to build small- to mid-size well-structured and documented client-side applications you will love to work on.

This book starts from JavaScriptMVC installation and all its components are explained with practical examples. It finishes with an example of building a web application. You will learn what the JavaScriptMVC framework is, how to install it, and how to use it efficiently.

This book will guide you on how to build a sample application from scratch, test its codebase using unit testing, as well as test the whole application using functional testing, document it, and deploy the same. After reading Learning JavaScriptMVC you will learn how to install the framework and create a well-structured, documented and maintainable client-side application.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Responsive Web Design by Example--Free 33 Page Excerpt


You can now create your very own responsive website quickly and efficiently, allowing you to showcase your content in a format that will work on any device with an Internet browser.

By following our detailed step-by-step instructions in this structured reference guide, you will learn how you can build engaging responsive websites. With coverage of Bootstrap, Skeleton, and Zurb Foundation you'll learn about three of the most powerful responsive frameworks available today.

Leading you through by practical example, you'll find that this essential reference develops your understanding by actually helping you create beautiful websites step by step in front of your very eyes. After going over the basics, you'll be able to choose between creating your own responsive portfolio page with Skeleton, building a stunning product page with Bootstrap, or setting up your own professional business website with Zurb Foundation. Ultimately you'll learn how to decide which framework is right for you, and how you can deploy and customize it to your exact specifications!

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


The Professional ScrumMaster's Handbook--Free 30 Page Excerpt


A professional ScrumMaster relaxes this tension using the Scrum framework so that the team arrives at the best possible outcome.

"The Professional ScrumMaster’s Handbook" is a practical, no-nonsense guide to helping you become an inspiring and effective ScrumMaster known for getting results.

This book goes into great detail about why it seems like you’re fighting traditional management culture every step of the way. You will explore the three roles of Scrum and how, working in harmony, they can deliver a product in the leanest way possible. You’ll understand that even though there is no room for a project manager in Scrum, there are certain “management” aspects you should be familiar with to help you along the way. Getting a team to manage itself and take responsibility is no easy feat; this book will show you how to earn trust by displaying it and inspiring courage in a team every day.

"The Professional ScrumMaster’s Handbook" will challenge you to dig deep within yourself to improve your mindset, practices, and values in order to build and support the very best agile teams.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


jQuery Hotshot -- Free 32 Page Excerpt


It has become the standard tool for web developers and designers to add dynamic, interactive elements to their sites, smoothing out browser inconsistencies and reducing costly development time.

jQuery Hotshot walks you step by step through 10 projects designed to familiarise you with the jQuery library and related technologies. Each project focuses on a particular subject or section of the API, but also looks at something related, like jQuery's official templates, or an HTML5 feature like localStorage. Build your knowledge of jQuery and related technologies.

Learn a large swathe of the API, up to and including jQuery 1.9, by completing the ten individual projects covered in the book.

Some of the projects that we'll work through over the course of this book include a drag-and-drop puzzle game, a browser extension, a multi-file drag-and-drop uploader, an infinite scroller, a sortable table, and a heat map.

Learn which jQuery methods and techniques to use in which situations with jQuery Hotshots.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


A Crossroads for Windows XP Users: Windows 7 or Windows 8?


Microsoft no longer supports Windows XP (or Office 2003), so now it's decision time for many organizations. Remarkably, Windows XP in early 2014 still holds somewhere between 15% and 25% of the overall PC operating system market, depending on whose analysis you read.

Request Free!


Environmental Design + Construction


Published monthly on 100 percent de-inked recycled fiber paper, Environmental Design + Construction provides the progressive architect, designer, specifying engineer and building developer with essential information on the rapidly growing green building industry.

Request Free!


Planning for the Redeployment of Technical Personnel in the Modern Data Center


The modern data center is a highly technical combination of servers, memory devices, management workstations, security devices, software, network-related services, equipment racks, Ethernet LAN switches, multilayer switches, cabling, power systems, cooling systems, fabric switches, and a few people.

From the standpoint of providing for the exchange of information to and from a client and one of the servers in the data center, the process is divided into two clearly defined halves: Local Area Network (LAN) and Storage Area Network (SAN).

Request Free!


SDN and Cloud Computing


After a review of Software-Defined Networking (SDN) and its close cousin Network Functions Virtualization (NFV), this white paper addresses three main deployment scenarios: SDN without deploying cloud computing, cloud computing without deploying SDN, and deploying cloud computing in conjunction with SDN. We'll look at use cases, when the approach makes sense, and any applicable limitations.

Request Free!


VSAN: Reimagining Storage in vSphere


In 2013, VMware announced VMware Virtual SAN (VSAN), which is VMware's native version of Software Defined Storage (SDS). It is simple, easy to setup, and managed by user-defined policies.

Request Free!


You can find other free technology white papers here.