Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
Free technology white papers »
These are only the most recent releases from our complete list of free technology white papers. To stay informed, subscribe to the RSS feed, bookmark this page, or follow Geekzone on Twitter.

Enter your email address below to subscribe to a daily email with links to new free technology white papers:


4 Critical Risks Facing Microsoft® Office 365 Implementation


With Microsoft's push to move Exchange environments to Office 365, this move requires planning both the migration and also how to ensure the same level of administration, security, and message hygiene you've come to enjoy with your on-premises implementation. Read this white paper to learn the considerations you should address internally when planning and implementing the move to Office 365.

Request Free!


Application Delivery Controllers (ADCs): Their Expanding Role & Importance


The data presented in this ESG white paper is based upon a survey of 243 IT professionals working at enterprise organizations (i.e., those with more than 1,000 employees) based in North America.

The ESG research reveals that the role of ADCs has expanded well beyond the historical perception of hardware-based load balancers. Organizations are deploying ADCs as virtual appliances at an increasing rate and taking advantage of ADC functionality from the network through the application layer with security taking on a more prominent role.

DOWNLOAD NOW TO LEARN:
  • Why ADCs Are More Pervasive Than Ever
  • How ADCs Move Beyond Load Balancing
  • Why ADCs Have Become a Critical Security Control


Request Free!


Balancing Security, Compliance and Cost


Learn how cloud-based technologies for core productivity tools such as email and collaboration can help healthcare organizations be more efficient with IT dollars and focus on strategic initiatives such as the EMR.

Request Free!


Cloud Requires Dynamic Security


Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.

Request Free!


Edge Consolidation Delivers Peace of Mind for IT


To increase agility while lowering costs, IT organizations are using virtualization and cloud-based infrastructure services to consolidate and reduce the number of physical servers and data centers across the enterprise. IDC estimates that, by 2015, more than 20 percent of the information running through servers will do so on virtualized systems. This percentage increases along with the size of the company, with some larger organizations using 100 percent virtualized systems. IDC predicts that, over the next decade, the amount of information managed by enterprise data centers will grow by a factor of 50.

Request Free!


Email Archives: No Longer Fit for Purpose?


There are, for example, options available which can bring email archiving up-to-date, with e-discovery and archiving-driven solutions available in the cloud. But to what extent are they being accepted by businesses, and what are the barriers to the acceptance of these solutions? The research paper also identifies the obstacles to change and how they can be overcome, as well as the many advantages to be had for business as a whole from adopting modern archiving solutions.

Request Free!


Infographic - The State of Enterprise Mobility


This inforgraphic explains the factors driving enterprise mobility, types of enterprise mobile applications,top 5 factors to consider in implementing enterprise apps, industry expert's predictions and global mobile spend by sector.



Request Free!


Magic Quadrant for Application Security Testing


Global-scale scandals around critical applications' breaches have highlighted the need for effective detection of exploitable application security vulnerabilities. Application security testing is the solution for Web, cloud and mobile applications.

Request Free!


Network Asset Management Survey report 2014


As per the recent report unveiled at GSMA Mobile World Congress 2015, capex investment will reach $1.4 trillion from 2015-2020. Under the backdrop of increasing capital expenditures (CAPEX) and revenue growth that is failing to keep pace, operators are now faced with a critical and immediate need to optimize CAPEX practices while improving service efficiency.

To study the network asset management program and CAPEX practices within the operators,
TM Forum Asset Management project team met with dozens of operators worldwide and commissioned an industry survey.

Subex is pleased to share first of its-kind industry survey report with TM Forum which provides insights into asset misalignment, asset visibility and capacity management. 

The report validates that network CAPEX remains the largest budgetary line item with virtually every operator today but it’s not getting enough attention. Most of the surveyed operators are not able to answer:

Are returns measured?

Are assets optimized?

Are assets lost or stranded?

How well their Network Capital investments are performing?

How aligned is the organization in planning and spending? 

Read more in the survey report



Request Free!


New Cyber Security Federal Regulations: How This Is Impacting Application Network


Chief among the respondents were CIO/CTOs representing the financial services industry with global annual sales of $5 billion or more.

DOWNLOAD THIS SURVEY NOW to read how new federal regulations on Cyber Security lead to:
  • Revenue Loss
  • Business Disruption
  • Loss of Productivity
It is imperative that companies, not just the financial services industry, do everything in their means to not only mitigate cyber threats, but also to comply with emerging industry regulations in order to optimally protect their networks, applications and data – and most importantly, their customers.

Request Free!


Powering the Hybrid Enterprise


How can IT achieve the flexibility and agility it needs to offer multiple types of applications in multiple locations? Just as enterprises take advantage of applications hosted in multiple locations (i.e., public clouds, private clouds, or SaaS applications), they take advantage of different networks for different reasons (i.e., performance, backup, remote access). These could be MPLS links, ATM links, traditional Internet connections, or VPN lines. Enterprises, in effect, are already building hybrid networks, and those combined with the elements of hybrid clouds create the hybrid enterprise.

Request Free!


Proactively Managing Your Mobile Platform


Martin Jack, chief technology officer at Barcoding Inc., details how data analytics helps manage mobile platforms.



Request Free!


Protect People, Processes and Technology from Web Application Threats


Incidents of web application security breaches that result in data theft are growing in frequency and severity, making it critical for organizations to take immediate steps to examine the security measures they have in place, assess vulnerabilities and act to protect their businesses.

Request Free!


Recognizing Five Sources of High-Profile Data Security Breaches


The average cost of a breach jumped 15% in 2014 to $3.5 million, and 43% of firms report having experienced a data breach in the past year. Meanwhile, businesses feel that their annual security budgets are only about 50% of what they need to adequately address the problem.

This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.

Request Free!


Safeguarding the Cloud with IBM Dynamic Cloud Security


The IBM Dynamic Cloud Security portfolio provides layered protection and deep insight across public, private and hybrid cloud environments. Solutions help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics.

Request Free!


Schneider Electric: Riverbed Cloud Steelhead Appliances Support IT Migration to Cloud Computing, SaaS and IaaS


SteelHead appliances deliver LAN-like performance for applications running in the data centers, and have reduced optimized traffic volume across the WAN by an average of 75% leading to fewer bandwidth upgrades. Interceptor appliances avoid costs related to data center disruptions and help control capital expenses. In addition, Cloud SteelHead appliances will save the company money when it moves to cloud computing, as Schneider Electric will only pay for the resources it needs.

Request Free!


Secure The Enterprise With Confidence Using A Mainframe Infrastructure


This Forrester Consulting thought leadership paper, commissioned by IBM, examines the infrastructure landscape for security to help detect threats and protect the reputation of an enterprise.

Request Free!


Securing Applications for a Safer Cloud Environment


This white paper explains how an effective application security program can help organizations protect their assets in the cloud. It will also discuss how a secure-by-design approach to application security can help reduce risk across the IT infrastructure, in the cloud and beyond.

Request Free!


Select the Right Solution for Identity and Access Assurance


It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.

Request Free!


Storage Anywhere and Everywhere: Dealing with the Challenges of Data Fragmentation


Gone are the days when one or two central systems could meet all of the organization's IT needs. We now have more departmental applications, collaboration and sharing environments, and even cloud-based services in the mix, with access via desktops, laptops, tablets and smartphones that can each store data in their own right. Against this background, are we in danger of losing control of our business information?

Request Free!


The Client Mandate on Security


Unlike many other organizations, however, law firms must also protect their client's confidential information. They have long been required to secure private information due to legal and regulatory requirements. Email is a key area of a firm's IT infrastructure when it comes to vigilance for security and governance.

Request Free!


The Importance of Continuity in Office 365 Environments


Email is an essential tool for communications, collaboration and content sharing, and is employed more than all other tools combined to accomplish these tasks. Consequently, email must remain available as close to 100% of the time as possible in order for information workers to remain productive. Unfortunately, email downtime is a fact of life for virtually every organization and carries with it a variety of consequences that range from the annoying to the financially devastating.

Request Free!


The State of Mobile Security Maturity


In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-a`-vis the four pillars of the framework and what their short-to-medium-term plans are to extend these capabilities.

Request Free!


Which Image Format Delivers the Best User Experience for a Website?


Images comprise more than half of a typical page's weight: among the top 1,000 websites, images comprise 58% of the average page's total weight.

Optimizing images so that they render more quickly in the user's browser should be a priority for every site owner.

There are a number of image optimization techniques – ranging from basic to advanced – that site owners can leverage, but selecting the best image-rendering format is the first step on the path toward fully optimized images.

DOWNLOAD NOW TO LEARN:
  • Which Image Format Delivers the Best User Experience
  • Best Practices for Image Optimization
  • Adding Neuroscientific Insight to the Debate
  • How Slow Image Load Affects the User Experience


Request Free!


Win the Race Against Time to Stay Ahead of Cybercriminals


IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.

Request Free!


Converging Branch Infrastructure for Simplicity, Efficiency, and Lower Costs


In remote offices however, servers and storage exist as isolated islands of disparate infrastructure that require management through separate operational processes and procedures. This approach is expensive and puts your data at risk.

Request Free!


Eliminating the Challenge of Branch Office Recovery


That puts IT in a precarious position, especially when it comes to disaster recovery. It can take days to restore branch operations. Branch converged infrastructure delivers local performance, stores data safely in the datacenter, and enables instant recovery.

Request Free!


Securing DNS to Thwart Advanced Targeted Attacks and Reduce Data Breaches


Internet traffic is severely affected when critical DNS services are not reliable or are compromised by cyber attacks, just as highway traffic is disrupted or stopped when bridges are damaged. Even worse than disruption, insecure DNS services can be used by attackers to impersonate a business and route customer traffic to malicious sites that steal usernames, passwords, account information or valuable intellectual property.

DNS services can be secured with the right configuration and deployment of appropriate solutions, but in many IT organizations the responsibility is spread across multiple groups and often falls through the cracks. CEOs and CIOs should ensure first that DNS governance is well defined and then make sure those DNS services are delivered efficiently, reliably and securely.

Request Free!


6 Steps to an Effective Performance Monitoring Strategy


Whether you’re looking to improve your application and service delivery, consolidate existing performance monitoring tools and responsibilities or justify the impact of a new technology deployment, the following six steps can help you create the fundamental building blocks of an effective performance monitoring strategy.



Request Free!


Mobile Forms: 10 Surprising Benefits of 'Going Paperless'


Many organizations simply don't realize the unnecessary risks (and high costs) they are incurring through their reliance on outdated and inefficient paper forms. Mobile technology now makes it possible to send, receive, process and store information instantly, allowing for streamlined workflows and a vastly superior customer experience. And yet, businesses are still reluctant to adopt this powerful and money-saving technology.

This free resource is for anyone intrigued by the potential of “going paperless,” but would like to learn more about the realities involved. It covers:
  1. The hidden risks of depending on paper forms to share information
  2. Four common barriers to adopting a mobile forms solution
  3. 10 ways that mobile forms can improve any organization
  4. Recommendations for “first steps” to reduce reliance on paper
The adoption and deployment of a new technology always comes with its own challenges. This white paper is intended to help you evaluate the benefits versus the risks of incorporating mobile technology into your operation, and visualize how such an adoption might improve your organization both now and into the future.

Request Free!


Using Speed at Scale to Ensure Network Infrastructure Performance for Financial Services


This whitepaper examines the ever-increasing need for speed at scale, proactive analysis, and higher levels of accessibility, granularity and visibility, as IT managers strive to ensure uptime and rapid response in business-critical networks and customer-facing networks.

In the financial services industry, failed trades and an inability to understand why they failed within a reasonable period of time not only frustrates users and management, but has a direct impact on the bottom line. The same is true in the retail banking and insurance industry when understanding the failure of online transactions. Every minute of downtime is well quantified, and financial services firms know exactly how much money they are losing whenever transactions fail. Moreover, poor performance in customer-facing applications can lead to high levels of churn. In either case, performance degradation results in lost revenue, and brand damage.

Addressing these issues end-to-end or at scale however, poses a multitude of challenges, given that performance is the sum of the delay imposed by the network (servers, middleware, storage), the communications infrastructure (local and wide area connectivity), and also the way in which the applications running over them are written.



Request Free!


The Essentials of Information Security Kit: Includes a Free PC Security Handbook - 2nd Edition eBook


The Essentials of Information Security brings together the latest in information, coverage of important developments, and expert commentary to help with your Information Security related decisions.

The following kit contents will help you get the most out of your Information Security research:
  • PC Security Handbook - 2nd Edition
  • 4 Steps to Taking Control with Cyber Resilience
  • Best Practices for Making BYOD Simple and Secure
  • The Case for Mobile Security Management


Request Free!


Best of Windows 8 Modern Apps


From slightly ropey beginnings in 2012, Windows 8 has developed and evolved. By now, you should be using Windows 8.1, a much more stable and user-friendly version, one that has an improved selection of apps available, free and paid.

We’re talking games, note-taking apps, video streaming, cloud storage, utilities, audio streaming and MP3 players and even e-readers. The selection is considerable.

Download today for the Windows 8 Modern apps that you should install, or consider installing, on your computer.



Request Free!


Beyond the Next Generation: Putting Advanced Network Security To Work


Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today's more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today's organizations to confront whatever may come tomorrow.

Request Free!


Beyond the Next Generation: Meeting the Converging Demands of Network Security


Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

Request Free!


The Best Websites on the Internet


The Internet is a big place, with a lot of content — about one billion websites, at last count of which 180 million are active. Because the web is constantly changing, it can be hard to keep track of which sites have the best content and resources. To help make things a little easier, we’ve compiled an enormous list of the best websites on the Internet, in fourteen handy categories.

The websites on this list are those that we consider to be the best: genuinely useful, top-of-the-line sites that will get you what you need.



Request Free!


Digital Clarity Group -- Successful Customer Experience Calls for Customer Insight


Because consumers know what they want, everything within reach must be customized and relevant to fit their needs. From the report: "Providing the desired web experiences is hard enough, but consumers are already looking for, and favoring, companies that can offer consistent and coherent experiences across multiple channels and for the entire extent of their customer journey."

In this report, learn about:

  • Empowered consumers and the dream of personalized interactions
  • Meeting the demand for great customer experiences
  • Responding to needs: insight is good, action is better

Register now to access this free report and get great insight on your customers.



Request Free!


How to Choose the Best CMS for Customer Experience Management


With so many possibilities, it can be difficult to select the best CMS tools for your needs. This free guide will help you make the right CMS decision for your business by letting you review the critical features of web content management systems.

What you’ll learn in the free guide:

  • Comparison Guide  -  A complete content management system comparison and features review
  • Critical Features  -  What marketing features to look for - site, analytic, SEO, email marketing - and how to decide what's important for you
  • Scalability  -  How to make sure your new CMS meets your needs today, and scales easily as your site grows
  • Streamline Business Processes  -  How to streamline business processes by choosing a CMS that integrates with your CRM, ERP and other legacy systems


Request Free!


The Forrester Wave: Web Content Management Systems


Web Content Management (WCM) has evolved radically as it has now forms the backbone to Experience Management platforms that manage, deliver and optimize experiences across every step of a customer’s journey.

The Forrester Wave is Forrester Research’s evaluation of vendors in a software, hardware, or services market, written for the role professionals they serve. With a rigorous assessment process using thirty-five different evaluation factors, Forrester Research appraised WCM solutions from ten vendors.

Learn how Sitecore achieved a leader position for the Sitecore® Experience Platform™ and why Forrester Research believes web content management should be ‘the bedrock of your business technology agenda’.



Request Free!


iPad CTO Kit - including the iPad Tips and Tricks Guide for IT Executives and Managers


The iPad CTO Kit brings together the latest in information, coverage of important developments, and expert commentary to help with your IT Management related decisions.

The following kit contents will help you get the most out of your IT Management research:
  • iPad Tips and Tricks - A Guide for Executives and Managers
  • Executive Guide: Harnessing the Power of Enterprise Social Collaboration
  • SaaS Apps? BYOD? Take Cloud Control
  • The Case for Mobile Security Management


Request Free!


6 Steps for Leveraging Tablets and Smart Phones for Materials Data Collection


It’s clear that mobility in the workplace is here to stay. Supply chain organizations must adopt mobility plans, applications, and practices as an integral part of overall corporate strategy in order to stay competitive. Data collection and inventory/package tracking are areas where mobility can deliver significant ROI and quickly realized benefits.

Download this eBook for 6 steps to optimize tablets and smartphones for data collection and tracking to achieve increased accuracy, performance, and efficiency across your supply chain.



Request Free!


Your Unofficial Raspberry Pi Manual


You’ve surely heard of the Raspberry Pi: the palm-sized computer with enough power to run servers or media centres complete with retro gaming.  Rasberry Pi has the connectivity to control security systems and enthusiast projects; and with the software tools to encourage the teaching and understanding of programming. Since its launch in 2012 the Raspberry Pi has exceeded expectations, becoming a must-have piece of computer hardware for enthusiasts and tech-heads. For a small project developed to be sold to schools and colleges to teach programming principles, that’s not bad. It’s also just the tip of the iceberg. In this guide you’ll find everything you need to know about the Raspberry Pi computer, its background, purpose, system specs, the software it runs and the amazing things it is capable of.



Request Free!


5 Advantages of Mobile for Customer Service


Companies who use a customer engagement platform enable every employee across the organization to engage with each other and its customers like never before. Mobile connects your field service reps to your contact center, your managers to the data they need to make decisions, and your department to the rest of the company. So how does mobile technology really impact a customer service department?

Download this eBook to learn more!

Request Free!


How To Use Your iPhone iOS5: Lesson 1 Beginner


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.  Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This beginner guide hopes to help point these features out (also available for iOS6). This version of the Beginner guide is intended for iOS5 users. If your phone is up-to-date, read MakeUseOf’s iOS6 version instead.



Request Free!


How To Use Your iPhone iOS5: Lesson 2 Intermediate


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.  Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This intermediate guide hopes to help point these features out, and is follow-up to MakeUseOf’s Beginner iPhone guide (also available for iOS6). This version of the Intermediate guide is intended for iOS5 users. If your phone is up-to-date, read MakeUseOf’s  iOS6 version instead.



Request Free!


How To Use Your iPhone iOS5: Lesson 3 Advanced


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This advanced guide hopes to help point these features out, and is follow-up to MakeUseOf’s Intermediate iPhone guide (also available for iOS6). This version of the Advanced guide is intended for iOS5 users. If your phone is up-to-date, read MakeUseOf’s  iOS6 version instead.



Request Free!


How To Use Your iPhone iOS6: Lesson 1 Beginner


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.  Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This beginner guide hopes to help point these features out (also available for iOS5). This version of the Beginner guide is intended for iOS6 users. If your phone is not up-to-date, read MakeUseOf’s iOS5 version instead.



Request Free!


How To Use Your iPhone iOS6: Lesson 2 Intermediate


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.  Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This intermediate guide hopes to help point these features out, and is follow-up to MakeUseOf’s Beginner iPhone guide (also available for iOS5). This version of the Intermediate guide is intended for iOS6 users. If your phone is not up-to-date, read MakeUseOf’s iOS5 version instead.



Request Free!


How To Use Your iPhone iOS6: Lesson 3 Advanced


The iPhone is a revolutionary device thanks to its user-friendly interface and sleek minimalist design -- but that doesn’t mean it’s always straightforward.  Many of the iPhone’s advanced or lesser-used features are hidden away and Apple doesn’t always do the greatest job of filling you in. This advanced guide hopes to help point these features out, and is follow-up to MakeUseOf’s Intermediate iPhone guide (also available for iOS5). This version of the Advanced guide is intended for iOS6 users. If your phone is not up-to-date, read MakeUseOf’s iOS5 version instead.



Request Free!


Best Android Browser: Chrome vs. Firefox vs. Opera vs. Dolphin


Still using the stock Android browser? You’re missing out. Android users can choose from a plethora of browsers, bringing a richer mobile Web experience to your smartphone or tablet. We considered Android’s top third-party browsers, Firefox and Opera, along with relative underdog Dolphin, then tested and compared them to Chrome to see which one deserves to be the default choice on your smartphone.

With this download you will also receive free weekly coverage on the latest technology news and developments from Laptop Magazines eNewsletter.



Request Free!


Best Windows 8.1 Browser: Chrome vs. Firefox vs. Internet Explorer


When it comes to Web browsing on your Windows 8 tablet, chances are you’ve already picked your favorite browser for the job. But you might be missing out. The best browsers can enhance your surfing experience with fast speeds, comprehensive standards support and intuitive navigation. We put the three leading browsers for Windows 8′s “Metro” mode — Google Chrome, Mozilla Firefox and Internet Explorer — to the test to see which one will serve you best.

With this download you will also receive free weekly coverage on the latest technology news and developments from Laptop Magazines eNewsletter.



Request Free!


How to Use Your iPad as Your Only PC


Sometimes carrying your 1-pound iPad is just more convenient than toting around a 4-5-pound notebook. For many folks, your iPad can fulfill most of your laptop’s duties. If you’re the type that primarily uses your computer to browse the Web, work in word-processing programs or lightly edit photos, you may be able to ditch your laptop entirely. Here are a few tips and tricks to show you that your iPad could be the only PC you need.

With this download you will also receive free weekly coverage on the latest technology news and developments from Laptop Magazines eNewsletter.



Request Free!


iOS 7.1: How to Upgrade Your iPhone and iPad Now


You’ll definitely want to upgrade your iPhone and iPad as soon as possible, because with this update comes a whole host of tweaks and improvements.

Among the most talked about improvement is CarPlay, previously known as iOS in the Car. With iOS 7.1 your iPhone will support in-car calling, music, maps and messaging through Siri. Apple’s digital assistant also will get more natural sounding voices for U.K. English, Australian English, Japanese and Mandarin Chinese. Other new features include:

  • iTunes Radio now gets the ability to buy albums from the Now Playing list
  • TouchID gets a better biometric reader for improved fingerprint recognition
  • Camera will now include a setting that enables HDR mode for iPhone 5s owners
  • FaceTime call notifications are now automatically cleared when you answer a call on a different device
  • Calendar gets back list view in the month view, and adds country specific holidays for various locations
  • Better accessibility options that allow the use of a bolder font, darker keyboard and app icons, plus reduce motion options for the parallax motion feature now applies to weather, messages and multitasking user interface animations

With this download you will also receive free weekly coverage on the latest technology news and developments from Laptop Magazines eNewsletter.



Request Free!


Exploit Kits: Cybercrime's Growth Industry


Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.

Request Free!


Creating Mobile Apps with jQuery Mobile--Free 30 Page Excerpt


The development focuses on creating a framework compatible with a wide variety of smartphones and tablet computers made necessary by the growing but heterogeneous tablet and smartphone market. The jQuery Mobile framework is compatible with other mobile app frameworks and platforms such as PhoneGap, Worklight, and more.

Creating Mobile Apps with jQuery Mobile reflects the author’s years of experience and exposes every hidden secret which will ease your mobile app development. With just a smattering of design and user experience thrown in, going through this book will allow you to confidently say, “yes, I can do that.”

We’ll start out with effective mobile prototyping and then move directly to the core of what every one of your mobile sites will need. Then, we’ll move on to the fancy stuff.

After creating some basic business templates and a universal JavaScript, we will move into the more interesting side of mobile development but we always try to keep an eye on progressive enhancement. jQuery Mobile is all about reaching everyone. So is this book.

"Creating Mobile Apps with jQuery Mobile" will take your basic mobile knowledge and help you make versatile, unique sites quickly and easily.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


jQuery Hotshot -- Free 32 Page Excerpt


It has become the standard tool for web developers and designers to add dynamic, interactive elements to their sites, smoothing out browser inconsistencies and reducing costly development time.

jQuery Hotshot walks you step by step through 10 projects designed to familiarise you with the jQuery library and related technologies. Each project focuses on a particular subject or section of the API, but also looks at something related, like jQuery's official templates, or an HTML5 feature like localStorage. Build your knowledge of jQuery and related technologies.

Learn a large swathe of the API, up to and including jQuery 1.9, by completing the ten individual projects covered in the book.

Some of the projects that we'll work through over the course of this book include a drag-and-drop puzzle game, a browser extension, a multi-file drag-and-drop uploader, an infinite scroller, a sortable table, and a heat map.

Learn which jQuery methods and techniques to use in which situations with jQuery Hotshots.

Packt Enterprise books can be summed up through the tagline "Professional Expertise Distilled". They take in-the-trenches knowledge from experienced software professionals, and distil it into a single, easy to follow manuscript.



Request Free!


Six Essential Elements of Web Application Security


Like all competitive businesses, your application developers and operation teams are constantly under pressure to move quickly. Everybody wants their application security efforts to be effective, but only if they don't unduly impede workflow or drive up costs. To balance these potentially-competing objectives, industry-leading organizations often use six elements in their approach to web application security. Download this white paper to learn more!

Request Free!


Extending Traditional Security to VDI


Organizations have adopted Virtual Desktop Infrastructure (VDI) due to benefits such as increasing overall utilization, reducing management costs, and enhancing security. VDI also supports consumerization and Bring-Your-Own-Device (BYOD) strategies, as endpoint users can access applications and data on their desktops using any mobile device, resulting in better productivity. However, extending traditional security to virtualized environments opens up networks to a plethora of security challenges and threats that can lead to business disruption or, worse, data leakage.

Request Free!


Explore How Paul VI Catholic High School Benefited From Fujitsu's Devices and Software


Paul VI Catholic School wanted to develop a laptop program that would equip its students and teachers with the right tools to increase classroom learning, prepare their students for college, and to develop the 21st Century skillsets required by today's employers.

Following a comprehensive selection process, the school chose to provide 1,000 students, and 75 teachers with the Fujitsu LIFEBOOK T732/4 laptop. The school also chose DyKnow's teaching & learning software as part of the overall strategy.

The benefits:
  • Teachers now use the devices, combined with DyKnow software, to provide an engaging, immersive learning experience
  • The Fujitsu LIFEBOOK T732 Laptop, and now the most recent T734 model, is giving students the flexibility to have all their computing needs covered for 4 years in one device
  • By supplying almost half of set textbooks in e-book format, students' families are now saving approximately 50 percent on costs
  • The school's transformation to a more student-centered educational program puts Paul VI at the forefront of the private school educational sector and positions it well in the highly competitive Fairfax County Public School system


Request Free!


The Definitive Guide to Employee Advocate Marketing


Employee-shared content increases reach 10x and engagement 8x. That's why leading brands are launching Employee Advocate Marketing programs to drive the marketing metrics they care about most, including increased awareness, social engagement and new customers.

But what are the steps they took to launch a successful program? Download this guide and step-by-step checklist for everything you need to know to launch an employee Advocate Marketing program.

In this guide you will learn:
  • The steps to launching an employee Advocate Marketing program
  • Proven best practices to grow your program
  • The recommended timeline and steps to ensure the program drives your goals


Request Free!


Everything You Need To Know About Switching To A Chromebook


Like any device, Chromebooks have their advantages and their disadvantages.  Chromebooks are Google’s take on the laptop. They run a slimmed-down operating system optimized for getting on the web with just the Chrome browser and Chrome apps. If you can do everything in your browser with web-based services and online storage, you can switch to a Chromebook.

Many Chromebook users haven’t actually “switched” to a Chromebook — they’ve purchased a Chromebook as an additional device, not one that replaces their current computer entirely. A Chromebook is the simple laptop you pick up when you need to browse the web, watch videos, type emails, write documents, and do other things you can accomplish in a browser. But let’s assume you actually want to switch to a Chromebook.



Request Free!


On Air: Set Up Your Own Online Broadcast


The Internet is fast; computers are powerful. It makes sense, then, that live televised entertainment has found a new home: PC monitors.  Popular commercial services like Netflix and Hulu are commanding a strong part of the television market in an age when watching TV no longer requires a TV. I was a resident assistant at my college a few years ago when they made the decision to cut cable service. There was no reason to keep it anymore - anyone who wanted to watch TV was using the Internet. It was the first salient realization for a lot of people that Internet streaming had become huge.

However, since its rise in popularity, streaming has also enabled anyone with a computer to stream over the Internet. Lots of people have been using webcams to interact face-to-face via instant messaging services for years. Since higher bandwidth has become more common, many have found uses for personal streams over the Internet to the public. These livestreams can be accessed by anyone from an Internet browser from any common computer.



Request Free!


The Unofficial, Beginners Guide to tumblr


By now you’ve heard of tumblr. The blog building website was sold to Yahoo for $1.1 billion, and is the number one social networking site for people under 25.  Clearly it’s important, but it’s a bit mystifying. It’s less a blog than it is an anti-blog. Do you want to try to understand it? Do you want to figure out how to use it so that you can build your own site on the service? If so, then this is the guide for you! MakeUseOf will try to unpack the sociology of tumblr and why it’s so popular. Along the way they'll look at some famous tumblrs, and help you build your own!



Request Free!


Unofficial Guide to Tor: Really Private Browsing


The issue of privacy on the Internet has long been a difficult one: there are a lot of good reasons that you might be leery of strangers reading your emails or spying on the websites you visit.  There are equally compelling reasons that various unscrupulous people, corporations, and governments might want to do just that. The whole issue has come to a head recently with the revelation that the NSA has been illicitly spying on American citizens and others through Facebook, Google, and Skype – including, probably, you.

In a nutshell, Tor is a powerful, easy-to-use piece of software that lets you keep your online life private. This guide will provide a step-by-step guide to installing, configuring, and using Tor, and getting you started taking an active role in defending your privacy on the Internet.



Request Free!


Earn Money Online: writing, transcribing and tutoring gigs


There are many, many places to find online work -- this manual is just a quick outline of what’s possible.  When you’re talking about making money online, the words scam and slave labor get thrown around fairly often – and not without cause. But there are plenty of legitimate ways to earn a decent secondary income online if you’re savvy enough to avoid the false offers that are simply too good to be true, and if you possess any of a wide variety of marketable skills.

First of all, if you ever come across any sort of advertisement claiming some sort of magical guru can teach you how to make thousands of dollars easily from the comfort of your home, run away fast. That is unless you’re reading this guide of course, in which case we’d like to preface its actual content with a disclaimer: all of these activities are best done as sources of secondary income only, unless you’ve already been doing any of them long enough to feel they’re reliable and you keep a tight budget. You won’t find any get rich quick schemes here, but with some hard work, your finances might get a welcome boost.

There won’t be any information in this guide about doing surveys or odd jobs such as those available in Swagbucks, Clickworker, etc. since these basically pay nothing. Our purpose here is to guide you towards increasing your income in a considerable manner, showcasing easy writing gigs with lower pay through to more elusive work with quite lucrative payments. Whether you’re simply looking for a few extra bucks on the side or you are a competitive freelancer, you should come along for the ride. Your wallet will thank you.



Request Free!


Five Stages of a Web Malware Attack


This paper will explain the advanced techniques hackers use to infect web users and steal data or money, and how most web security products are failing. Most importantly, you will get insight into the layers of protection needed, and a checklist for evaluating your policies and the security capabilities of your web protection solution.

Request Free!


Windows Server 2012 Are You Ready?


Now is the ideal time to plan your move, and avoid possible server management, performance, security and compliance issues. Read this report to learn about:
  • New features and benefits of Windows Server 2012 R2
  • Key considerations when moving from a legacy platform
  • How to plan for your move, migrate content efficiently and effectively manage your new environment
Download the report today for a smoother, faster, safer migration.

Request Free!


Protecting Critical DNS Infrastructure Against Attack


This paper outlines the recent DDoS attacks on DNS services and challenges of mitigating those attacks.

Learn how:
  • DNS DDoS attacks take advantage of weaknesses in the DNS protocol
  • Attackers launch a high bandwidth sophisticated attack on their victim
  • Attackers use amplification effect
Securing DNS service requires rethinking on perimeter security with dedicated tools to identify and mitigate these new breed of attacks on DNS services.

DOWNLOAD NOW to stop DNS DDoS Attacks!

Request Free!


You can find other free technology white papers here.