Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Companies face big challenges with big data analytics applications

        It's hardly breaking news, but businesses today are looking to cash in on big data. And naturally, vendors of big data analytics applications are trying to capitalize on that by promising new opportunities for companies looking to increase revenues and gain competitive advantages over business rivals. What you won't hear about, at least not as readily, are the challenges they first need to overcome.

        In this three-part guide, three consultants weigh in with concrete offers of encouragement for companies struggling to turn big data -- large, varied and fast-changing data sets -- into valuable business insight. First, Wayne Eckerson serves up an in-depth analysis of Hadoop. The open source software offers companies a platform for reining in the spreadmarts set up by data analysts and business users, while still giving them a place to do self-service analytics. Next, Keith B. Carter delivers a warning about big mistakes that many organizations make on big data analytics projects, with tips on how to avoid them. Barry Devlin, the founder and principal of 9sight Consulting, finishes with a cautionary note about overreliance on data analytics at the expense of intuitive decision making.

        View E-Handbook
      • Strategies for a successful data protection program

        Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies, experts say that custom policies are essential to making a DLP system perform efficiently. Selection of a DLP vendor of-ten depends on how well the software integrates with the systems in place. Fortunately, enough companies have performed a DLP deployment providing best practices to avoid getting tripped up. The rollout is typically performed slowly and systematically. False positives are still an issue, though the system can be immediately tuned to avoid any disruption to employee productivity.

        This TechGuide identifies some of the challenges associated with deploying data protection technology, highlights some of the initial pitfalls encountered by early adopters and explains how it can be used effectively in an organization. CSOs share how they use it to mitigate risks and identify weaknesses and experts discuss some best practices for deploying data protection solutions.

        View E-Handbook
      • New technologies take enterprise collaboration to the next level

        Businesses that hope to collaborate effectively in today’s marketplace have a host of issues to contend with -- trust issues with the cloud (yes, still) and an ever-widening workforce among them. So the ways in which organizations collaborate must evolve. No longer can they count on face-to-face interaction to foster business innovation. Scattered workforces and closely guarded business assets can impede the community-aspect of business collaboration. To remain competitive, organizations are looking to technology to keep enterprise collaboration rolling.

        This three-part guide examines what organizations can do to foster that collaboration and improve on the ideation process. First, Lauren Horwitz, an executive editor in the Business Applications & Architecture Media Group, explains how cloud-based applications -- Dropbox, Skydrive and Google Drive, for example -- are enabling simple, secure file-sharing in organizations around the world. Horwitz is joined by Laura Aberle, SearchContentManagement site editor, in the second piece. Together, they describe how, for some organizations, file-sharing isn’t enough. These companies, aiming to take collaboration further, are bringing together external and internal employees -- and in some cases, users -- to crowdsource ideas through collaboration-as-a-service applications. To close, consultant Shawn Shell discusses in more detail the trend of crowdsourced collaboration -- specifically, the challenges wrought by connecting global, mobile and external collaborators.

        View E-Handbook
      • The cloud on the networking horizon

        This Technical Guide examines how cloud has affected networking. It breaks down the concept of network as a service (NaaS) and its use in public, private and hybrid clouds. Included, too, is an in-depth look at what goes into hybrid cloud networking, and how the characteristics of cloud applications affect deployment. Hybrid cloud networking originally fell short when it came to enabling total orchestration across public and private clouds. But software-defined networking, network virtualization and orchestration tools are changing that.

        View E-Handbook
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • E-book: Focus on virtual machine storage

        Virtualization puts new demands on storage, so whether you opt for FC, iSCSI or NAS, storage will be a key factor for your virtual environment. Read this e-book for expert tips and suggestions on managing storage for virtual servers and virtual desktops including, ten things to know about storage for VMs and choosing NAS for virtual machines.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 4
      Page 1 of 4
    • Page 1 of 1
      • The benefits of data archive storage

        Data archiving is firmly entrenched as a storage management best practice. SearchStorage surveys indicate that 70% of companies use some form of archiving for email, file systems, databases or other applications. Archiving yields multiple benefits, such as effective storage tiering, adequate performance for applications, and enforcing regulatory compliance, corporate information management and preparedness.

        While a significant number of companies currently use some form of archiver, we've found that most companies are actively seeking to expand their data archive storage operations by adding archiving to address additional applications or file systems. In this buyer's guide, we describe the benefits of data archiving, the practical issues related to deploying archivers and other issues related to selecting and implementing data archiving.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 3 of 3
      Page 3 of 3
    • Page 1 of 19
      • Big data storage challenges: Speed, capacity and HDFS integration

        Big data infrastructure and analytics are some of the hottest technology topics today, and it can sometimes seem impossible to dissect and digest all the industry information surrounding them. As a revolutionary way of thinking about data and the way it's used and accessed, big data has staked a claim as a legitimate technology sphere. But what are some of the big data storage challenges storage professionals must deal with when architecting their systems to take advantage of everything the technology has to offer? This technical handbook offers practical advice and how-to tips for establishing an organizations' big data project goals, and delves into areas such as the speed at which analytical processes must deliver results, the ability to scale capacity and integrating HDFS with storage.

        View E-Handbook
      • Moving target: Endpoint backup

        August 2014 Vol. 13 No. 6

        Includes:
        • Use of cloud services extends past backup
        • Importance of mobile device backup grows
        • Keys to a painless data migration process
        View E-Zine
      Page 1 of 19
    • Page 1 of 1
      • Good match: iSCSI and vSphere

        Vol. 9 Num. 5 July/August 2010

        Includes:
        • Unified storage offers savings and efficiency
        • Hospitals strive for centralized image archives
        • Continuous data protection; it's back!
        View E-Zine
      • iSCSI: Ready for prime time?

        Vol. 7 No. 2 April 2008

        Includes:
        • Data management priorities: By The Numbers
        • Automate application recovery
        • Need persists for mainframe storage skills
        View E-Zine
      Page 1 of 1
    • Page 1 of 1
      • New crop of unified storage systems promise unprecedented flexibility

        A challenge that has long plagued storage administrators is that applications use storage in different ways. Some applications make use of storage at the block level, while others depend on file-level storage. Historically, the solution was to maintain two separate storage architectures. However, a new crop of unified storage systems promise to deliver an unprecedented degree of flexibility and to drive down storage management costs. This would seemingly make unified storage an obvious choice for storage admins struggling with disparate storage requirements; but, like many things in IT, vendor hype might not always be solidly based in reality.

        This report outlines the considerations and technical features that must be taken into account before investing in a unified storage appliance so you can obtain a clear picture of how and when they’re appropriate for your IT shop.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Scale-out storage systems deep dive

        Scale-out storage systems can accommodate data growth simply by adding more capacity resources; and processing power can be increased as needed. In this buyer's guide, check out the latest scale-out storage systems to help you decide the best technology for your organization. Get your most important questions answered about scale out network-attached storage (NAS), and learn about the common pitfalls to avoid.

        View E-Handbook
      • Why NAS virtualization is on the rise

        Vol. 9 Num. 6 September 2010

        Includes:
        • Quality Awards V: Compellent regains top midrange arrays spot
        • Top 10 tips for tuning your storage network
        • Aging RAID still an effective protection technology
        View E-Zine
      Page 1 of 1
    • Page 1 of 2
      • Primary storage dishes up dedupe

        Vol. 9 Num. 2 April 2010

        Includes:
        • Tape may be teetering, but it's still a big part of backup ops
        • Dedupe and compression cut storage down to size
        • SAN consolidation with director-class switches
        View E-Zine
      • Enterprise data storage capacity planning guide

        Maximizing your enterprise data storage capacity is more important than ever before. With the majority of storage budgets unable to keep pace with data growth rates, most storage administrators need to find ways to reduce capital and operating expenses to survive the economic downturn. Download this tutorial to learn more about tiered storage.

        View E-Book
      Page 1 of 2
    • Page 1 of 1
      • The past, present and future of RAID data protection

        Seemingly everyone working in IT knows the power of RAID, and setting various RAID levels continues to be a solid foundation of a data protection strategy. But RAID efficiency is being put to the test by rapidly expanding data stores, and the storage industry is racing to meet new demands by exploiting technologies such as wide striping, erasure codes and multi-copy mirroring. Erasure code technology, for example, is gaining traction in a slew of enterprise offerings. It's being presented to end users as a way to improve upon RAID systems that require an increasing number of disk drives to run and, in turn, allows for the possibility of problematic rebuild times.

        In this handbook on the past, present and future of RAID data protection, learn which RAID data protection options are viable today, which ones make sense for your shop, and how RAID can be replaced and improved upon.

        View E-Handbook
      • R.I.P. RAID?

        Vol. 9 Num. 3 May 2010

        Includes:
        • Storage tiering getting more automated
        • Storage managers can reach for their wallets again
        • Hard disk drive technology trends
        View E-Zine
      Page 1 of 1
    • Page 1 of 2
      Page 1 of 2
    • Page 1 of 1
      • Getting started with IT disaster recovery planning

        Whether you're new to IT disaster recovery planning or want to brush up on best practices, we have the answers for you in this essential DR planning guide. Learn how to create a DR plan, and get advice from experts. Discover how to make sure your data is safe in the event of a disaster. Read about the hottest technologies in IT disaster recovery planning, and learn about better disaster recovery strategies, whether your organization is big or small.

        View E-Book
      • Choosing the best disaster recovery planning tool

        Vol. 7 Num. 12 January 2009

        Includes:
        • Consolidated archiving
        • Green is still the color of money in storage
        • Disaster recovery site options
        View E-Zine
      Page 1 of 1
    • Page 1 of 2
      Page 1 of 2
    • Page 1 of 1
      • Best practices for cloud backup integration

        Vol. 11 Num. 2 April 2012

        Includes:
        • Companies still rely on good ol’ NAS
        • Integrated cloud backup
        • Storage for big data
        View E-Zine
      • Better data protection strategies with CDP and deduplication

        Continuous data protection (CDP) and data deduplication are chief among the technologies that data storage managers are investigating when it comes to improved data backup and storage efficiency. In this expert e-book, learn how CDP and deduplication have evolved, and determine the best implementation strategy for your shop. Get your most important data protection questions answered, and learn about better data protection strategies for your enterprise.

        View E-Book
      Page 1 of 1
    • Page 1 of 2
      • Status report: Solid-state storage

        Vol. 10 Num. 8 October 2011

        Includes:
        • Solid-state goes mainstream
        • Storage tiering gets more sophisticated and automated
        • Status report: Solid-state storage
        View E-Zine
      • E-book: Making the case for solid-state storage

        This all-encompassing SearchStorage.com e-book will cover the bases of solid-state drives (SSD). Learn more about how to build a business case for solid-state storage, adding SSD drives instead of disk drives, how to implement NAND flash, and the benefits and fallbacks of standalone SSD arrays.

        View E-Book
      Page 1 of 2
    • Page 1 of 2
      Page 1 of 2
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 2
      Page 1 of 2
    • Page 1 of 1
      Page 1 of 1

Featured E-ZINES on searchStorage.comView all >>

  • Storage magazine

    Storage magazine keeps IT and storage managers up to date on new storage technologies, and how those techs can meet emerging business requirements.

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchStorage.comView all >>

  • Intrusion detection and prevention: IT decision center

    Intrusion detection and intrusion prevention systems (IDS/IPS) help to identify potential threats and to launch a swift response to defend your network. There are many factors to take into account when choosing IDS/IPS products, and this Decision Center series lays them out. It also provides critical questions to ask vendors, offers insight on how to match product features to your particular requirements, and challenges vendors in the IDS/IPS space to present the facts on their offerings.

  • Enterprise Hadoop: Ready for prime time?

    Many vendors are pitching Hadoop as the foundation for enterprise data management environments that delivers information and insights to business users and serves as a hub for other data systems and applications. In the era of big data, the case for Hadoop is strong: Hadoop provides a cost-effective way to ingest, store and process large volumes of multi-structured data. With Hadoop, organizations can store all data in its original format and provide a system of record for the enterprise. Even more, they can bring the applications to Hadoop and process the data in place.

    But does reality square with the promise today? Are companies willing to trust their enterprise data to Hadoop? The big question is whether Hadoop is ready to support enterprise-scale, production environments where data can't be corrupted or inconsistent. Does Hadoop have adequate management, monitoring, backup, recovery and security features? What are the major gaps today and what are vendors doing to plug the holes? At what point can companies trust production computing environments to Hadoop? This report, based on a comprehensive survey of business intelligence professionals and interviews with experts in the field, addresses these questions.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchStorage.comView all >>

  • Companies face big challenges with big data analytics applications

    It's hardly breaking news, but businesses today are looking to cash in on big data. And naturally, vendors of big data analytics applications are trying to capitalize on that by promising new opportunities for companies looking to increase revenues and gain competitive advantages over business rivals. What you won't hear about, at least not as readily, are the challenges they first need to overcome.

    In this three-part guide, three consultants weigh in with concrete offers of encouragement for companies struggling to turn big data -- large, varied and fast-changing data sets -- into valuable business insight. First, Wayne Eckerson serves up an in-depth analysis of Hadoop. The open source software offers companies a platform for reining in the spreadmarts set up by data analysts and business users, while still giving them a place to do self-service analytics. Next, Keith B. Carter delivers a warning about big mistakes that many organizations make on big data analytics projects, with tips on how to avoid them. Barry Devlin, the founder and principal of 9sight Consulting, finishes with a cautionary note about overreliance on data analytics at the expense of intuitive decision making.

  • Strategies for a successful data protection program

    Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies, experts say that custom policies are essential to making a DLP system perform efficiently. Selection of a DLP vendor of-ten depends on how well the software integrates with the systems in place. Fortunately, enough companies have performed a DLP deployment providing best practices to avoid getting tripped up. The rollout is typically performed slowly and systematically. False positives are still an issue, though the system can be immediately tuned to avoid any disruption to employee productivity.

    This TechGuide identifies some of the challenges associated with deploying data protection technology, highlights some of the initial pitfalls encountered by early adopters and explains how it can be used effectively in an organization. CSOs share how they use it to mitigate risks and identify weaknesses and experts discuss some best practices for deploying data protection solutions.

OTHER FEATURED E-HANDBOOKS