Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • CW+: The Open Group: Cloud buyers’ decision tree

        This White Paper describes a Decision Tree that could be used to help you discover where Cloud opportunities and solutions might fit in your organization. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises. Your business situation is either a problem or an opportunity for which you are seeking a solution that includes IT enablement. This Tree presupposes that the current and/or future state of the IT resources for your business situation does and/or will not meet requirements. If you are a Cloud seller, then use this Decision Tree in reverse to determine for which business situations your proposed offering would be a good fit.

        View E-Handbook
      • Start modernizing customer relationship management systems today

        If you were asked to define either an on-premises or hosted contact center, could you? Don't fret if you can't: Many professionals don't know the difference between the two. Choosing between the two different systems, however, is one of the most important decisions when implementing a contact center. And new technologies, increased customer expectations and social media-based customer service are further complicating the choice.

        A move away from a legacy contact center system can alleviate pain, improve employee satisfaction and customer service, and save your company money. Confused where to begin? This three-part guide is a good start. Inside, SearchCRM writers explore the key differences between a hosted and an on-premises contact center. Former Site Editor Lena J. Weiner drills down on the pros and cons -- and specifically, the myriad responsibilities -- in an introduction to each system. Next, reporter Christine Parizo takes a hard look at the legacy systems in contact centers. With some observers today advocating a mix and match of new and old technologies to deal with customers, it's no simple task deciding which systems will remain. To close, Lauren Horwitz, SearchCRM's executive editor, points to some of the newest trends in contact center technology -- specifically, changes to contact center strategy wrought by social media-based customer service.

        View E-Handbook
      • Open Information Security Management Maturity Model (O-ISM3)

        Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives.

        View E-Handbook
      • CW+ Open Group: The Open Group Architecture Framework (TOGAF™ 9) and the US DoD

        This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM phases to develop a visual, integrated model of an architecture. The intended audience is the DoD architect who can benefit from a formal methodology to guide architecture efforts and result in a quality architecture description in a DoD-compliant format, and the TOGAF architect who can benefit by a formal set of defined models to capture output for each of the ADM phases. This document provides the architect with a map of the specific DoDAF 2.0 model that should be produced or consumed in a specific phase of TOGAF 9 with enough context to understand the fundamental concepts of both DoDAF and TOGAF.

        View E-Handbook
    • Page 1 of 1
      • Network disaster recovery tutorial

        Server virtualization is a popular topic in business continuity (BC) and disaster recovery (DR). At the same time, many myths surround BC, DR, high availability and data protection, recovery time objectives, and recovery point objectives. Here's a quick look at some common myths and the realities that are constantly changing in the server virtualization landscape. Get advice from our experts, and learn about what needs to be in your network disaster recovery plan to keep your organization safe in the event of a disaster.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Best practices in disaster recovery tests

        DR testing is frequently put off or overlooked entirely. However, many surveys show that IT pros are not confident in their ability to recover in a timely manner following a disaster. There are a variety of reasons why IT people lack confidence in their DR plans, but many simply lack confidence in the backup/DR technologies they rely on. Technology isn't a substitute for a good backup strategy. And testing is the only way to find holes in your strategy. This Handbook offers guidelines for disaster recovery testing today, with a look at the variety of technologies and practices in use. You will find an expert Q&A outlining technologies that can make DR testing more effective. Another piece takes a look at how one company's quarterly DR test helped prepare them for Hurricane Sandy. And finally, check out a piece on DR testing for the cloud.

        View E-Handbook
      • Developing effective DR/BC plans

        Business continuity/disaster recovery planning is frequently overlooked, delayed or underfunded, because it can be painful to spend time and money on risk mitigation. As a result, we often read survey results that show IT managers are not confident in their company’s ability to adequately recover following a disaster. Indeed, year after year, our surveys show that organizations are not confident in their ability to recover data after an outage. And the reasons they cite remain largely the same. Some lack confidence in the backup/DR technologies they rely on. Others say that DR planning is too expensive and they can’t get management support for an initiative that isn’t directly tied to revenue. There are technologies and techniques available today that have simplified DR and made it more affordable. This handbook will offer tips on how to develop and implement a disaster recovery plan.

        View E-Handbook
      • Virtual disaster recovery planning in the enterprise

        Virtual disaster recovery planning is a multifaceted activity that fails over a virtual machine from a primary site to a remote location. There are a few approaches to facilitating disaster recovery in a virtual machine environment. Learn about look at the various approaches to virtual machine disaster recovery, get advice from our experts, and learn about common pitfalls to avoid in this tutorial. You'll also discover what needs to be in a virtual discover plan, and how to make sure your organization is prepared.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Evaluating hardware, software and hypervisor-based replication

        IT administrators today are faced with a variety of new or growing data protection challenges. For many, the tried and true approach of nightly backups has become impractical. Exponential data growth, the need for more frequent data protection and faster restores have forced administrators to look for alternatives to traditional data backups. One approach that is growing in popularity is to use a combination of replication and snapshots as a way of continuously protecting data. But there are a number of ways this can be accomplished, each with its own pros and cons.

        This handbook compares and contrasts hardware-based and software-based replication so you can better decide which approach suits your organization's needs. You will find an easy-to-digest chart detailing the pros and cons of each as well as articles offering greater detail. You will also learn why hypervisor-based replication is growing in popularity.

        View E-Handbook
      •  
      Page 1 of 1

Featured E-ZINES on searchDisasterRecovery.comView all >>

  • Storage magazine

    Storage magazine keeps IT and storage managers up to date on new storage technologies, and how those techs can meet emerging business requirements.

  • Information Security magazine

    Information Security is the leading publication for enterprise security professionals, providing in-depth coverage of security technologies, practices and trends.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchDisasterRecovery.comView all >>

  • Forging the path to tomorrow's CRM

    Perhaps no two words have more of an effect on business today than "customer experience." Consumers have a wealth of options for buying products and services -- and they're not shy about letting the social media sphere know when they’re not happy. To keep them coming -- and coming back -- organizations need to ensure that the experiences they’re serving up are nothing less than stellar.

    In our e-book series, The Risks and Rewards of Customer Experience Management, readers will get practical advice and real-world insight into strategies that place the focus of organizations' operations and processes on their customers. The first chapter concentrates on automation in the contact center. It will explore the technologies, such as interactive voice response and virtual agents. And it will examine what organizations need to evaluate when deciding which processes to automate and which areas will always need a human touch. The second installment delves into digital marketing, mobile applications and social media. It's no longer enough to send the same message to all customers; messages now must be personalized -- and soon, based on where customers are at any given moment. The chapter will look at location-based automated marketing and the pros and cons -- including the loss of privacy -- associated with such practices. The final chapter digs deep into the role of analytics in customer experience management plans, scrutinizing data harvesting methods and ways to use big data to augment customer experiences. And the chapter will look at times when knowing all about your customer goes horribly wrong.

  • Market trends tell the future of predictive analytics deployments

    Predictive analytics employs statistical or machine-learning models to discover patterns and relationships in data, thereby enabling the prediction of future behavior or activity. Long used by credit card companies, predictive analytics -- and now self-service predictive analytics -- is making inroads in organizations of all sizes. Based on a survey of more than 3,000 IT and business professionals, this report analyzes their responses to provide information on implementation status, maturity of implementations, value and vendors of predictive analytics tools.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchDisasterRecovery.comView all >>

  • CW+: The Open Group: Cloud buyers’ decision tree

    This White Paper describes a Decision Tree that could be used to help you discover where Cloud opportunities and solutions might fit in your organization. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises. Your business situation is either a problem or an opportunity for which you are seeking a solution that includes IT enablement. This Tree presupposes that the current and/or future state of the IT resources for your business situation does and/or will not meet requirements. If you are a Cloud seller, then use this Decision Tree in reverse to determine for which business situations your proposed offering would be a good fit.

  • Start modernizing customer relationship management systems today

    If you were asked to define either an on-premises or hosted contact center, could you? Don't fret if you can't: Many professionals don't know the difference between the two. Choosing between the two different systems, however, is one of the most important decisions when implementing a contact center. And new technologies, increased customer expectations and social media-based customer service are further complicating the choice.

    A move away from a legacy contact center system can alleviate pain, improve employee satisfaction and customer service, and save your company money. Confused where to begin? This three-part guide is a good start. Inside, SearchCRM writers explore the key differences between a hosted and an on-premises contact center. Former Site Editor Lena J. Weiner drills down on the pros and cons -- and specifically, the myriad responsibilities -- in an introduction to each system. Next, reporter Christine Parizo takes a hard look at the legacy systems in contact centers. With some observers today advocating a mix and match of new and old technologies to deal with customers, it's no simple task deciding which systems will remain. To close, Lauren Horwitz, SearchCRM's executive editor, points to some of the newest trends in contact center technology -- specifically, changes to contact center strategy wrought by social media-based customer service.

OTHER FEATURED E-HANDBOOKS