Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Open Information Security Management Maturity Model (O-ISM3)

        Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives.

        View E-Handbook
      • CW+ Open Group: The Open Group Architecture Framework (TOGAF™ 9) and the US DoD

        This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM phases to develop a visual, integrated model of an architecture. The intended audience is the DoD architect who can benefit from a formal methodology to guide architecture efforts and result in a quality architecture description in a DoD-compliant format, and the TOGAF architect who can benefit by a formal set of defined models to capture output for each of the ADM phases. This document provides the architect with a map of the specific DoDAF 2.0 model that should be produced or consumed in a specific phase of TOGAF 9 with enough context to understand the fundamental concepts of both DoDAF and TOGAF.

        View E-Handbook
      • Open Group: FAIR -ISO/IEC 27005 Cookbook

        This document discusses the different purposes of the two standards, how to reconcile the two with regard to terminology and process, and combine the best elements of both to produce a consistent, repeatable risk management process.

        View E-Handbook
      • Governance in IT and Architecture - TOGAF

        The primary audiences for this Paper are business and IT managers who are responsible for the performance of operations. However, enterprise architects also play a key role in supporting IT governance, including architecture governance. Governance is defined as giving direction to activities. In this Paper, the authors focus on governance of the IT domain and its alignment to business. Governance is viewed as a mechanism that influences the internal logic and decision-making of organizations. The internal logic is defined as a compromise between practically conflicting parameters. The mechanism that has to deal with these conflicting parameters consists of decision domains, governance structure, social processes between individuals and groups, and controls to ensure the proper functioning of IT governance. In the context of IT governance, enterprise architecture can be considered as a means for coordination of decision-making related to IT and business. Furthermore, it is recognized that enterprise architecture in its own right also needs to be governed.

        View E-Handbook
    • Page 1 of 1
      • Avoiding pitfalls on the path to endpoint security

        IT security can be overwhelming, but it doesn’t have to be that way. Admins can strengthen desktop and enterprise security by taking a step back to consider the bigger picture.

        View E-Handbook
      • Endpoint Management Strategies and Best Practices

        The job of an IT administrator has become a lot more challenging today than what it once was. IT has evolved from a controlled endpoint environment behind four walls to thousands of islands of information scattered about an organization that must be adequately administered and protected. Access this expert IT handbook for an in-depth look at the at endpoint management strategies and technologies that your organization should consider.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Windows 7 migration station: The path of least resistance

        Organizations that stuck with Windows XP all the way to the end of its supported lifespan must now prepare to migrate to a new operating system. The best way forward might be a Windows 7 migration, especially for companies that value simplicity.

        View E-Handbook
      • Steps to mastering Windows 7 migration

        This handbook will cover best practices for moving to Microsoft Windows 7, including assessing Windows 7 to determine if it’s a good move for your organization and which applications your organization should involve in the Windows 7 migration. Hear from experts about avoiding common migration challenges and learn what resources and help is available for your migration project and licensing.

        View E-Handbook
      • Why a Windows 7 upgrade is worthwhile

        Windows 7 is Microsoft’s highly anticipated successor to Windows Vista. With this release, Microsoft aimed to address user frustrations with Vista and hoped to give Windows XP users a reason to upgrade as well. Feedback has shown that enhancements to security, stability and usability have made Windows 7 a welcome platform for corporate users. These features can make it worth the investment. Read this new e-Book to learn more about why a Windows 7 upgrade can help your enterprise.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Track Microsoft licensing for desktops running Windows 8, Office 2013

        Each version of Windows, Office and other Microsoft applications brings new editions and options for payment and licensing. We take a look at what enterprises need to know about licensing for Windows 8 and Office 2013 and how it affects Desktop as a Service.

        View E-Handbook
      • Keys to a successful Windows 8 migration

        Migrating to a new operating system is no small task. And when the migration involves an OS as divisive as Windows 8, the task becomes that much more complicated. Proponents will need to persuade skeptics that Windows 8 brings real value to the enterprise beyond what Windows 7 or even Windows XP might currently be delivering. Companies interested in taking advantage of the new operating system’s touch features—particularly with mobile devices—could see a lot to like. Other organizations, especially those for which an OS is primarily about running desktops, will have doubts. Organizations with reasons to migrate to Windows 8 should look at four key areas as they proceed with their decision-making and planning: where Windows 8 fits into the enterprise; how to handle legacy applications in the new OS; tools to use for the migration; and details about licensing. This handbook also looks at some of features included in Windows 8.1.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Desktop virtualization best practices

        For decades, enterprise IT managers have delivered applications to employees through a desktop or a laptop, an operating system, a suite of productivity applications (i.e., Microsoft Office) and then through a browser. The IT pro was then cursed to spend his day managing and maintaining what can amount to thousands of endpoints. But this is all about to change. Technologies such as application and desktop virtualization, software services and cloud computing as well as a new generation of smart phones are all redefining application delivery. This e-book will look at some of the trends that may lead to new application delivery methods. You'll learn desktop virtualization best practices, and desktop virtualization strategies for your enterprise.

        View E-Book
      •  
      Page 1 of 1

Featured E-ZINES on searchEnterpriseDesktop.comView all >>

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.

  • Virtual Data Center

    Virtual Data Center E-Zine is an all-encompassing guide to help you select and use the most appropriate virtual data center techniques and technologies to develop an agile, scalable, efficient data center – without breaking the bank.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchEnterpriseDesktop.comView all >>

  • Forging the path to tomorrow's CRM

    Perhaps no two words have more of an effect on business today than "customer experience." Consumers have a wealth of options for buying products and services -- and they're not shy about letting the social media sphere know when they’re not happy. To keep them coming -- and coming back -- organizations need to ensure that the experiences they’re serving up are nothing less than stellar.

    In our e-book series, The Risks and Rewards of Customer Experience Management, readers will get practical advice and real-world insight into strategies that place the focus of organizations' operations and processes on their customers. The first chapter concentrates on automation in the contact center. It will explore the technologies, such as interactive voice response and virtual agents. And it will examine what organizations need to evaluate when deciding which processes to automate and which areas will always need a human touch. The second installment delves into digital marketing, mobile applications and social media. It's no longer enough to send the same message to all customers; messages now must be personalized -- and soon, based on where customers are at any given moment. The chapter will look at location-based automated marketing and the pros and cons -- including the loss of privacy -- associated with such practices. The final chapter digs deep into the role of analytics in customer experience management plans, scrutinizing data harvesting methods and ways to use big data to augment customer experiences. And the chapter will look at times when knowing all about your customer goes horribly wrong.

  • Market trends tell the future of predictive analytics deployments

    Predictive analytics employs statistical or machine-learning models to discover patterns and relationships in data, thereby enabling the prediction of future behavior or activity. Long used by credit card companies, predictive analytics -- and now self-service predictive analytics -- is making inroads in organizations of all sizes. Based on a survey of more than 3,000 IT and business professionals, this report analyzes their responses to provide information on implementation status, maturity of implementations, value and vendors of predictive analytics tools.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchEnterpriseDesktop.comView all >>

  • Open Information Security Management Maturity Model (O-ISM3)

    Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives.

  • CW+ Open Group: The Open Group Architecture Framework (TOGAF™ 9) and the US DoD

    This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM phases to develop a visual, integrated model of an architecture. The intended audience is the DoD architect who can benefit from a formal methodology to guide architecture efforts and result in a quality architecture description in a DoD-compliant format, and the TOGAF architect who can benefit by a formal set of defined models to capture output for each of the ADM phases. This document provides the architect with a map of the specific DoDAF 2.0 model that should be produced or consumed in a specific phase of TOGAF 9 with enough context to understand the fundamental concepts of both DoDAF and TOGAF.

OTHER FEATURED E-HANDBOOKS