Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Memory corruption attacks

        Lack of diversity in software and operating systems over many years has left a large number of computers vulnerable to memory program attacks. A diversified and replicated execution system promises to provide effective countermeasures.

        View E-Handbook
      • Tactics to combat insider threat

        This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.

        View E-Handbook
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • How to deploy and manage a hybrid cloud approach

        A hybrid cloud can be a practical approach to entering the world of cloud computing. There's a lot to consider, though, and the shift is far from simple. This handbook looks specifically at why an organization might choose to go with a hybrid model; which workloads that organization should consider appropriate for the cloud; how to assess security risks; and what challenges should be expected when implementing a hybrid cloud project.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 2
      • Private cloud strategy: Building blocks and roadblocks

        May 2011, Vol. 1 No. 2

        Includes:
        • Moving to a private cloud: Unveiling the myths
        • Adjusting IT attitudes toward private cloud
        • Applications interfere with cloud computing adoption
        View E-Zine
      • Building an effective private cloud in 10 steps

        Private clouds offer many of the advantages of public cloud services, but without the security concerns and compliance issues that make IT managers sweat. So how time-intensive is it to build a private cloud in your enterprise? Roll up your sleeves; this handbook will give you the tools you need to build your own private cloud—in 10 steps or fewer.

        View E-Handbook
      Page 1 of 2
    • Page 1 of 1
      • Is cloud-based storage right for your company?

        Storage needs are growing exponentially. Cloud-based storage has emerged as an alternative to on-site, traditional methods, but it may not make sense in every case. This handbook explores cloud-based storage in terms of cost, manageability, scalability, flexibility, latency/availability and more. It also looks at cloud-based backup and disaster recovery options in the cloud.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • The cloud: Too much (or too little) of a good thing?

        One of the major benefits of cloud services is efficiency. Without proper cloud capacity management, however, companies can miss out on that benefit. This handbook includes best practices on how to avoid provisioning too many or too few resources; it also provides guidance on how to address cost concerns with respect to cloud capacity.

        View E-Handbook
      • In cloud planning, make room for storage

        This handbook explores cloud-based storage in terms of cost, manageability, scalability, flexibility, latency/availability and more. It also looks at cloud-based backup and disaster recovery options in the cloud.

        View E-Handbook
      • Is it time to migrate to the cloud?

        Cloud computing offers substantial benefits for some companies in terms of scalability, flexibility and cost savings through shared, multitenant infrastructure. But for some companies with lots of sensitive data subject to regulation, entrenched data center investments and lots of legacy architecture, moving to the cloud may not make sense. On the other end of the spectrum, smaller companies without a lot of data center resources may benefit from access to the cloud or may not get cost benefits from a private or hybrid cloud if they haven't virtualized enough on their own.

        In this handbook on considerations in moving to the cloud, we evaluate the kinds of company and infrastructure conditions in which it does -- or doesn't -- make sense to move to one of the cloud models.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Getting over the cloud adoption hurdle

        This handbook offers insight into some of the most prominent issues that organizations face with cloud computing -- privacy, security, data governance and compliance. We'll also outline criteria that cloud managers should keep in mind when researching cloud security, as well as management tools to help manage data and resources within a cloud infrastructure. IT teams want to get on board with cloud, but they're faced with security and compliance concerns that can complicate adoption. They need guidance on how to move to the cloud more easily.

        View E-Handbook
      • Cloud computing security up close

        The cloud can't guarantee absolute data security, so you have to take safety into your own hands. This IT handbook is designed to help organizations make practical and strategic decisions about their own cloud computing security. Follow these guidelines to make sure that you've established policies that define data classification categories, data labeling mechanisms and data handling requirements.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Migrating applications to the cloud

        Putting the cloud to work can mean migrating existing applications into the cloud, a process that requires careful planning and evaluation. This handbook considers best practices for the migration of applications to be sure that an organization can take advantage of the benefits of the cloud without undermining server and application performance. What are the best ways to determine which applications can and should make the move? How should applications be prepared for migration? And what are the security and hardware considerations involved in taking applications designed to run on-premises and putting them in the cloud? This discussion also will address legacy apps and when it might make sense to rebuild or replace such highly customized applications rather than move them.

        View E-Handbook
      • Migrating internal apps to the cloud

        Follow this step-by-step guide from concept to implementation to ensure your move to the cloud is efficient and valuable for your organization. If you're migrating internal apps to the cloud, this e-book will provide a roadmap for success.

        View E-Book
      • Designing an application migration plan to bring internal apps to the cloud

        There are benefits to moving to the cloud, but it can be a thorny process for organizations that don’t take the time to prepare. If you're looking for help designing an application migration plan, follow this step-by-step approach and you'll have an effective plan to take your organization from concept to implementation. Follow our tips to ensure that your cloud-computing roadmap leads to success.

        View E-Handbook
      • Hosting applications in the cloud and cloud services explained

        Whether it's public cloud, private cloud or a hybrid of the two, IT can be delivered as a service to today's businesses faster, cheaper and more efficiently than ever before. Today, nearly every company is considering at least some form of “as-a-service” deployment of software tools, and there is no question that there can be significant benefits. But when adopting as-a-service technology for your own company, you must maximize your benefits and manage your risks. Read this E-Book to learn more about hosting applications in the cloud and cloud services.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • The promise and perils of open source clouds

        As cloud computing has developed, open source software has become a cornerstone of the model, which emphasizes homogeneity among infrastructure resources.

        But just as open source has its share of advantages for cloud projects, it also has its downsides. The idea of a license-free or lower-cost option can be enticing to budget-conscious IT departments, but the do-it-yourself nature of open source can be a major disadvantage for some shops. And just because a tool or platform is open source does not ensure integration and portability between cloud environments and so on. So too, many proprietary options offer the advantages of open source because they are built on open source code, but they lack some of its liabilities in terms of lack of support or problems with ease of use. In this handbook on open source and the cloud, we look at open source options, the benefits and liabilities, as well as the pros and cons of proprietary models.

        We explore some of the key issues shaping the market, the tools available and how data centers make use of and contend with open source issues.

        View E-Handbook
      • Open source in the cloud: Boon or bust?

        November 2011, Vol. 1 No. 4

        Includes:
        • No democracy for apps in the cloud?
        • Trends in cloud computing
        • Top cloud computing trends in the enterprise
        View E-Zine
      Page 1 of 1

Featured E-ZINES on searchCloudComputing.comView all >>

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.

  • Private Cloud

    The Private Cloud Computing E-Zine cuts through the hype and industry-slant to help IT pros leverage cloud computing as a solution to on-going pricing, protection, archiving, e-discovery, bandwidth, and performance issues in the data center.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchCloudComputing.comView all >>

  • Enterprise Hadoop: Ready for prime time?

    Many vendors are pitching Hadoop as the foundation for enterprise data management environments that delivers information and insights to business users and serves as a hub for other data systems and applications. In the era of big data, the case for Hadoop is strong: Hadoop provides a cost-effective way to ingest, store and process large volumes of multi-structured data. With Hadoop, organizations can store all data in its original format and provide a system of record for the enterprise. Even more, they can bring the applications to Hadoop and process the data in place.

    But does reality square with the promise today? Are companies willing to trust their enterprise data to Hadoop? The big question is whether Hadoop is ready to support enterprise-scale, production environments where data can't be corrupted or inconsistent. Does Hadoop have adequate management, monitoring, backup, recovery and security features? What are the major gaps today and what are vendors doing to plug the holes? At what point can companies trust production computing environments to Hadoop? This report, based on a comprehensive survey of business intelligence professionals and interviews with experts in the field, addresses these questions.

  • Overcome today's disaster recovery challenges

    The use of devices not connected to a local network is a challenge for IT staffs tasked with protecting data on those devices. Completing backups within a reasonable timeframe has become an issue for organizations. Some organizations are opting for alternatives to traditional backup to address these challenges. The cloud has been pushed as an alternative to tape for offsite storage for disaster recovery. However, there are challenges with this approach and with protecting applications running in the cloud.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchCloudComputing.comView all >>

  • Memory corruption attacks

    Lack of diversity in software and operating systems over many years has left a large number of computers vulnerable to memory program attacks. A diversified and replicated execution system promises to provide effective countermeasures.

  • Tactics to combat insider threat

    This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.

OTHER FEATURED E-HANDBOOKS