Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

Featured E-ZINES on searchSecurity.comView all >>

  • Information Security magazine

    Information Security is the leading publication for enterprise security professionals, providing in-depth coverage of security technologies, practices and trends.

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.


Featured E-BOOKS on searchSecurity.comView all >>

  • Forging the path to tomorrow's CRM

    Perhaps no two words have more of an effect on business today than "customer experience." Consumers have a wealth of options for buying products and services -- and they're not shy about letting the social media sphere know when they’re not happy. To keep them coming -- and coming back -- organizations need to ensure that the experiences they’re serving up are nothing less than stellar.

    In our e-book series, The Risks and Rewards of Customer Experience Management, readers will get practical advice and real-world insight into strategies that place the focus of organizations' operations and processes on their customers. The first chapter concentrates on automation in the contact center. It will explore the technologies, such as interactive voice response and virtual agents. And it will examine what organizations need to evaluate when deciding which processes to automate and which areas will always need a human touch. The second installment delves into digital marketing, mobile applications and social media. It's no longer enough to send the same message to all customers; messages now must be personalized -- and soon, based on where customers are at any given moment. The chapter will look at location-based automated marketing and the pros and cons -- including the loss of privacy -- associated with such practices. The final chapter digs deep into the role of analytics in customer experience management plans, scrutinizing data harvesting methods and ways to use big data to augment customer experiences. And the chapter will look at times when knowing all about your customer goes horribly wrong.

  • Market trends tell the future of predictive analytics deployments

    Predictive analytics employs statistical or machine-learning models to discover patterns and relationships in data, thereby enabling the prediction of future behavior or activity. Long used by credit card companies, predictive analytics -- and now self-service predictive analytics -- is making inroads in organizations of all sizes. Based on a survey of more than 3,000 IT and business professionals, this report analyzes their responses to provide information on implementation status, maturity of implementations, value and vendors of predictive analytics tools.


Featured E-HANDBOOKS on searchSecurity.comView all >>

  • Determine if NoSQL databases are right for your organization

    NoSQL databases offer more flexible alternatives to mainstream relational software, particularly for big data applications. But NoSQL offerings include a diverse set of technologies that can present prospective users with a bewildering array of choices. And those technologies have yet to secure a place in many organizations. In fact, in a survey of IT and business professionals conducted by The Data Warehousing Institute in November 2013, 65% of the respondents said they had no plans to incorporate NoSQL databases into their data warehouse architectures. Don't let that scare you off, though: There are companies successfully putting NoSQL products to work in applications they're suited for.

    In this three-part guide, readers will learn about the different types of NoSQL technologies and their potential uses. First, get details about the four primary NoSQL product categories, with deployment examples from experienced users and advice on how to avoid going down the wrong database path. Next, read about why it's a mistake to force-fit technologies into IT environments -- and why Gartner analyst Merv Adrian says it's a fruitless exercise to compare NoSQL offerings "that are so wildly different in structure and intent." And in our third story, find out why many organizations are creating what consultancy Enterprise Management Associates calls a hybrid data ecosystem -- a blend of old and new technologies, including NoSQL systems -- to support their big data environments.

  • Staying secure, HIPAA compliant with mobile technologies

    The integration of health data systems with phones, tablets, laptops and other mobile devices is one of the biggest challenges facing healthcare IT professionals. That, readers will soon learn, is easier said than done.

    In this three-part guide, we clear away some of the cobweb-ridden concerns around mobile device management. First, readers will take a look at the repercussions of recent U.S. Food and Drug Administration draft guidance. While makers of new mobile personal health apps are rejoicing over news that the FDA will not regulate mobile device data systems (MDDS), it's a potential nightmare for healthcare providers. Experts say the move leaves medical devices with an extremely low barrier for safety -- and no checks and balances to speak of.

    Next, we attempt to understand why -- even with the technology to support it -- adoption of mHealth apps is so low. To that end, health IT consultant Reda Chouffani points to areas where mobile healthcare could serve to enhance the care experience. We close with a look at patient engagement, as mandated in stage 2 meaningful use criteria. Many in healthcare are looking to technology -- electronic communication, primarily -- to involve patients in their care, and the pressure to effectively address patient engagement safety is mounting. Here, we outline the steps hospitals everywhere must take to do just that.