Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Memory corruption attacks

        Lack of diversity in software and operating systems over many years has left a large number of computers vulnerable to memory program attacks. A diversified and replicated execution system promises to provide effective countermeasures.

        View E-Handbook
      • Tactics to combat insider threat

        This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.

        View E-Handbook
    • Page 1 of 1
      • PC lifecycle management: A TechTarget ANZ E-Book

        As much as 80% of the cost of owning many IT systems is spent on trivial concerns that could be avoided with better management. This e-book explores the five key elements of PC lifecycle management, a practice that can help you to greatly reduce the ongoing costs of operating your PC fleet and lower the overall lifetime costs of your IT assets.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • ANZ guide to energy management

        CIOs are under pressure to cut energy costs, but often lack a baseline from which to start their energy management effort. If you are like many, you lack the tools to measure power consumption and, without data, struggle to devise powerful responses to rising energy costs. This e-book explores the techniques CIOs can use to measure energy consumption, to help improve data centre operations and the bottom line.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • ANZ guide to a cost-effective and reliable data centre

        Virtualisation is known for reducing rack footprint and improving disaster recovery in the data centre. But it can also reduce power and cooling costs, so long as you consider the physical design of your data centre, as this e-book explains. Learn from the experts how to draw additional cost savings from a virtualisation implementation, by taking several physical data centre design considerations -- such as underloaded power and cooling systems -- into account.

        View E-Book
      •  
      Page 1 of 1

Featured E-ZINES on searchCIOAU.comView all >>

  • CWEurope

    The monthly CW Europe e-zine focuses on multiple themes relevant to the European market. CW Europe discusses key management issues for IT pros – from building a new data centre, considering cloud computing, to developing a more secure infrastructure.

  • CIO Decisions

    Enterprise CIO Decisions Ezine offers IT and business strategies and insights on the latest technologies making waves in the modern IT organization.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchCIOAU.comView all >>

  • Enterprise Hadoop: Ready for prime time?

    Many vendors are pitching Hadoop as the foundation for enterprise data management environments that delivers information and insights to business users and serves as a hub for other data systems and applications. In the era of big data, the case for Hadoop is strong: Hadoop provides a cost-effective way to ingest, store and process large volumes of multi-structured data. With Hadoop, organizations can store all data in its original format and provide a system of record for the enterprise. Even more, they can bring the applications to Hadoop and process the data in place.

    But does reality square with the promise today? Are companies willing to trust their enterprise data to Hadoop? The big question is whether Hadoop is ready to support enterprise-scale, production environments where data can't be corrupted or inconsistent. Does Hadoop have adequate management, monitoring, backup, recovery and security features? What are the major gaps today and what are vendors doing to plug the holes? At what point can companies trust production computing environments to Hadoop? This report, based on a comprehensive survey of business intelligence professionals and interviews with experts in the field, addresses these questions.

  • Overcome today's disaster recovery challenges

    The use of devices not connected to a local network is a challenge for IT staffs tasked with protecting data on those devices. Completing backups within a reasonable timeframe has become an issue for organizations. Some organizations are opting for alternatives to traditional backup to address these challenges. The cloud has been pushed as an alternative to tape for offsite storage for disaster recovery. However, there are challenges with this approach and with protecting applications running in the cloud.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchCIOAU.comView all >>

  • Memory corruption attacks

    Lack of diversity in software and operating systems over many years has left a large number of computers vulnerable to memory program attacks. A diversified and replicated execution system promises to provide effective countermeasures.

  • Tactics to combat insider threat

    This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.

OTHER FEATURED E-HANDBOOKS