Resource Library

Welcome to TechRepublic's Resource Library - the web's largest directory of free vendor-supplied technical content, including IT white papers, webcasts, case studies and much more. Take advantage of the library's vast resources on an array of topics, from Big Data to cloud computing, mobility to security. There's a world of knowledge at your fingertips in the Resource Library - and it's free to registered TechRepublic members.

  • How Network Connections Drive Web Application Performance

    Users around the globe, on all sorts of devices, expect Web applications to function as seamlessly as desktop applications. This paper discusses the challenges and solutions for effectively delivering applications in today’s global marketplace.

  • Quality in the Cloud: Best Practices for ISVs

    Independent Software Vendors (ISVs) looking to enter the cloud market must exercise due diligence in choosing a hosting company, or risk quality of service. This GigaOm report offers ISVs guidance on determining whether their hosting partners can support their specific market needs.

  • Scaling SaaS Delivery for Long-Term Success

    Thanks to increased SaaS adoption, there is greater opportunity for providers to expand their customer bases. This paper provides recommendations for SaaS executives on using the cloud to increase market share and retaining their customers amid a growing number of consumer options.

  • Meeting the Big Data Challenge: Get Close, Get Connected

    Big Data can be a key tool in gaining a competitive advantage—allowing businesses to better understand and target their customers and transform their processes. This paper outlines the challenges related to Big Data and how to manage and overcome them, so you can derive value faster.

  • Enterprise Data Lake Platforms: Deep Storage for Big Data and Analytics

    In the past 18 months or so, the term data lakes has surfaced as yet another phrase that seemingly attempts to describe a large repository of unstructured data. However, many Big Data repositories pose restrictions on data ingest and access, forcing the data to be formatted and moved to the...

View all white papers

  • Finding Success in the Cloud

    Over the past few years, the cloud market has grown by leaps and bounds while becoming an integral part of IT operations. Cloud computing is a great way for businesses of all sizes to create collaborative environments with little investment, and it’s a profitable way for IT service providers to...

  • Set Your IT Business Up For Success: Achieving Client Satisfaction in the First 30 Days

    The key to achieving client satisfaction and building long-term client relationships is starting off on the right foot. It is important that the groundwork be laid in advance to ensure a smooth onboarding process, as this is the time when new clients are most critical of the work being performed....

  • Top Ten Considerations for Selecting the Right RMM Solution

    Remote monitoring and management (RMM) is an important part of your IT services offering. RMM tools enable service delivery and provide a number of benefits, including increased customer service levels, time and money savings, and ultimately a more effective and profitable business. Read this eBook for tips to ensure you...

  • Web Attack Survival Guide

    With an increasing amount of business being conducted online, the internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial espionage, sabotage and cyber terrorism are becoming more frequent, resulting in lost revenue, stolen data, service interruptions and damaged reputations. This white paper...

  • What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

View all white papers

  • Critical Concepts of the 200-120 CCNA Routing and Switching Exam

    In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing...

  • Fundamentals of the PKI Infrastructure

    Securing corporate information can be a challenge, considering the numerous technologies and platforms that need to be protected. One technology that definitely helps achieve secure data is public key infrastructure (PKI), which enhances the security of data by using advanced access methods and making sure the authenticity of the data...

  • Understanding AIX Logical Volume Management

    Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.

  • The ROI of Cloud-based Financial Applications

    Thinking about moving your financial apps to the cloud? Chances are, you've asked yourself the same crucial question that's applied to every strategic decision in your business: What's the ROI? A solid business case not only unlocks budget dollars, it provides a roadmap for successful deployment and maximum value....

  • Turn Data Into Knowledge - Social Collaboration Empowers a More Intelligent Service Desk

    Extract social knowledge for the help desk. Connect business and IT into one conversation to improve service quality and business results. Download this whitepaper to learn more.

View all white papers

  • Live Webcast: Surviving Workplace Zombies

    Join us for this LIVE event! Thursday, October 7, 2014 10 AM (PDT) / 1 PM (EDT) No doubt you’ve seen them. Office zombies. The mindless, slow, de-motivated, disconnected people who try to drag you down to their level. In some workplaces they are rare while in others they swarm...

  • Live Webcast: Mastering Difficult Conversations: Tips and Tools from a Former FBI Hostage Negotiation Trainer

    Join us for this LIVE event! Thursday, October 2, 2014 10 AM (PDT) / 1 PM (EDT) Nobody likes to deliver bad news, discuss a sensitive subject or talk about a project or meeting that's gone wrong. The mere thought of these conversations can fill you with anxiety and distract...

  • On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

  • The Business Value of Cloud-Managed Wireless Networks - IDC Webinar

    Cloud-managed Wi-Fi promises greater networking efficiencies and flexibility in managing, scaling and upgrading the wireless network. But cloud-managed Wi-Fi may not be the right solution for everyone. Watch this webcast to hear IDC analyst and Vice President, Rohit Mehra, discuss the critical factors to take into account as you...

  • On-demand Webcast: Mastering the Virtual Sales Pitch

    Making an online presentation has its unique challenges — but there are also countless opportunities for today’s savvy sales professional. Join Tim Wackel as he shares ideas on how to grow your sales (without growing your frequent flyer account). Attend this on-demand webinar to learn how to: Plan and...

View all webcasts

  • Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

  • Mind The Gap: Surviving The Technical Security Skills Crisis

    Gain insights from a recent Forrester and IBM study on the global IT security skills crisis Are you having a hard time finding and hiring qualified IT security staff – and retaining them on staff? If so, you are not alone. There is a widespread technical security skills crisis, and...

  • Webinar: A New Way to Work (Mobile)

    Mobile devices are everywhere, and every employee in your enterprise has one. In order to give employees access to the information they need, your apps must work collaboratively, on the go, and in real-time. Watch this webinar for an overview of Workday's current offerings for mobile HR and finance applications.

  • Webinar: Workday 20 Webinar

    Workday announces the arrival of Workday Big Data Analytics in Workday 2.0. Watch the webinar to learn how this powerful new application lets you combine Workday data with multiple non-Workday data sources to get more comprehensive insight and lets you run your business your way.

  • Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

View all webcasts

  • On-demand Webcast: Solve Complex Revenue Management Challenges

    For business professionals today, revenue management is an increasingly complicated proposition. Accountants and administrators are now responsible for managing multiple revenue sources and models, which requires a different level of data and analysis, plus powerful tools to successfully manage the complexities of the market and business operations. So how...

  • On-demand Webcast: Mastering the Virtual Sales Pitch

    Making an online presentation has its unique challenges — but there are also countless opportunities for today’s savvy sales professional. Join Tim Wackel as he shares ideas on how to grow your sales (without growing your frequent flyer account). Attend this on-demand webinar to learn how to: Plan and...

  • 5 Tips From Intuit For Implementing Static Code Analysis

    Poor software quality has become one of the most expensive topics in human history with costs exceeding $500 billion per year worldwide. However, 97% of software defects can be removed through code review, static analysis and unit testing. Learn how the implementation of static analysis at Intuit led to reduced...

  • On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

  • Answering the Tough Question: Who Has Access to What?

    Learn from this webcast how to select specific users or groups in Active Directory (AD) and efficiently assess and document permission assignments within your environment, as well as how automating the process can save your organization time and money.

View all webcasts

  • US Industrial Products Company Enhances Compliance

    This case study explores how one US company was inspired by the TV appearance of IBM Watson to revolutionize their records management company wide, a discovery with far-reaching implications for your organization as well as categorizing content consistently, uniformly and accurately, complying more easily with internal and governmental compliance, and...

  • Mobile Risk Study 2013 - Forbes list of Global 2000

    The Mobile Risk Study 2013 presents the major findings of HP Security Research’s comprehensive dive into today’s cyber vulnerability and mobile threat landscape. It provides information you need to effectively plan your cyber security strategy and deploy your defenses. Download this report to know the report findings of more than...

  • Top 10 Ways Businesses Rely on Box

    Box is a cloud platform that helps you securely store, share and manage all your company's files. Whether you need to secure confidential business information, develop a custom mobile application or are trying to simplify paper-based office processes, here are the top 10 ways enterprises rely on Box.

  • With the MobileIron Platform, Sally Beauty puts a new face on its sales team

    Seeking to increase the effectiveness of its field sales staff while helping them present a more professional image, Sally Beauty implemented the MobileIron enterprise mobility management (EMM) platform. Sally Beauty uses MobileIron to let retail and traveling sales staff access product collateral on iPads, recommend and deliver the most helpful...

  • Discovery Communications knows no boundaries with MobileIron solutions

    Discovery implemented a MobileIron enterprise mobility management (EMM) platform to enforce security policies across 2,000 iOS and Android devices, let employees complete HR and financial transactions through a secure mobile web browser, and remotely wipe corporate data from employee-owned devices after employees leave the company.

View all case studies

  • With the MobileIron Platform, Sally Beauty puts a new face on its sales team

    Seeking to increase the effectiveness of its field sales staff while helping them present a more professional image, Sally Beauty implemented the MobileIron enterprise mobility management (EMM) platform. Sally Beauty uses MobileIron to let retail and traveling sales staff access product collateral on iPads, recommend and deliver the most helpful...

  • Discovery Communications knows no boundaries with MobileIron solutions

    Discovery implemented a MobileIron enterprise mobility management (EMM) platform to enforce security policies across 2,000 iOS and Android devices, let employees complete HR and financial transactions through a secure mobile web browser, and remotely wipe corporate data from employee-owned devices after employees leave the company.

  • Philip Morris International mobilizes a global workforce with MobileIron solutions

    To support a mobile program that was rapidly growing worldwide, Philip Moris International worked with Nomasis to implement a MobileIron enterprise mobility management (EMM) platform. PMI uses MobileIron to secure corporate-issued and employee-owned devices, maintain an accurate device count across 60 countries, reset employee passcodes in seconds, and manage its...

  • Top 10 Ways Businesses Rely on Box

    Box is a cloud platform that helps you securely store, share and manage all your company's files. Whether you need to secure confidential business information, develop a custom mobile application or are trying to simplify paper-based office processes, here are the top 10 ways enterprises rely on Box.

  • Customer Success Story of Columbia Prep:

    ExtremeZ-IP is helping thousands of educational institutions worldwide conquer their Mac/Windows integration challenges. Check out this case study to learn how Columbia Prep School improved Mac user communication and productivity while reducing IT management cost with ExtremeZ-IP.

View all case studies

  • With the MobileIron Platform, Sally Beauty puts a new face on its sales team

    Seeking to increase the effectiveness of its field sales staff while helping them present a more professional image, Sally Beauty implemented the MobileIron enterprise mobility management (EMM) platform. Sally Beauty uses MobileIron to let retail and traveling sales staff access product collateral on iPads, recommend and deliver the most helpful...

  • Discovery Communications knows no boundaries with MobileIron solutions

    Discovery implemented a MobileIron enterprise mobility management (EMM) platform to enforce security policies across 2,000 iOS and Android devices, let employees complete HR and financial transactions through a secure mobile web browser, and remotely wipe corporate data from employee-owned devices after employees leave the company.

  • Philip Morris International mobilizes a global workforce with MobileIron solutions

    To support a mobile program that was rapidly growing worldwide, Philip Moris International worked with Nomasis to implement a MobileIron enterprise mobility management (EMM) platform. PMI uses MobileIron to secure corporate-issued and employee-owned devices, maintain an accurate device count across 60 countries, reset employee passcodes in seconds, and manage its...

  • Top 10 Ways Businesses Rely on Box

    Box is a cloud platform that helps you securely store, share and manage all your company's files. Whether you need to secure confidential business information, develop a custom mobile application or are trying to simplify paper-based office processes, here are the top 10 ways enterprises rely on Box.

  • Customer Success Story of Columbia Prep:

    ExtremeZ-IP is helping thousands of educational institutions worldwide conquer their Mac/Windows integration challenges. Check out this case study to learn how Columbia Prep School improved Mac user communication and productivity while reducing IT management cost with ExtremeZ-IP.

View all case studies

  • Your FREE 60-Day Trial Starts Here

    Get instant access to the Brocade Vyatta 5400 vRouter. Download your free virtual router trial now and enjoy 24/7 support. KEY FEATURES INCLUDE: Advanced IPv4 and IPv6 Unicast and Multicast Stateful firewall, IPsec, SSL-Based OpenVPN and DMVPN Linux-based extensible network OS Hypervisors Supported: VMware ESX, Citrix...

  • You're A Few Steps Away From Future-Proofing Your Career

    Prepare for the future of networking today with free 60-day trial software, web-based training, and a Brocade Network Function Virtualization Certification ($650 value). BE A BROCADE CERTIFIED PROFESSIONAL NOW. Build your skills by creating a virtualized network with the Brocade Vyatta vRouter Stay ahead of the industry's...

  • Troubleshoot Poor VoIP Call Quality

    Troubleshooting poor VoIP call quality is relatively straightforward with the right monitoring and diagnostic tools to help you identify the cause. The most likely causes include: Jitter, Latency and Packet Loss Call Signaling and Routing Misconfigured VoIP Equipment With SolarWinds® VoIP & Network Quality Manager, you can quickly...

  • Improving Customer Service with First-Class Remote Support

    Want to provide excellent customer support, while minimizing operational costs? Organizations like you are turning to remote support solutions to connect to various devices and pull system diagnostics, push configurations and view the device to deliver personalized, hands-on support. Rescue from LogMeIn, provides a sophisticated set of core...

  • Help Desk & IT Asset Management Software – Extremely Affordable & Easy-to-Use

    SolarWinds® Web Help Desk® (WHD) is a web-based help desk software that simplifies, centralizes and automates help desk management tasks including ticketing management, IT asset management, IT change management, knowledge management, incident & problem management, SLA management, & more. SolarWinds WHD provides email-to-ticket automation, dynamically assigns, routes and escalates trouble...

View all downloads

  • V3 – Why is the app slow? Download a FREE trial of SolarWinds Application Monitor & find out.

    Why is the app slow? Download a FREE trial of SolarWinds Application Monitor & find out. 3 reasons to consider SolarWinds Server & Application Monitor: Out-of-the-box monitoring for almost everything – servers, virtual infrastructure & 150+ apps. Easy customization for your enterprise needs – customize templates,...

  • Top 5 Reasons to Choose SolarWinds Log & Event Manager (LEM)

    Real-Time, In-Memory, Event Log Correlation: Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations Out-of-the-Box Security and Compliance Reporting Templates: Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates USB Defense: Protect against endpoint data loss &...

  • Find the root cause of your toughest SQL Server performance issues in 4 clicks!

    Slow SQL Server performance? Don't let yourself get tangled up in volumes of server health metrics. Get to the root cause of performance problems in just four clicks. Only SolarWinds Database Performance Analyzer correlates SQL response time with server health metrics - in a single view - to quickly pinpoint...

  • Find, analyze & resolve your toughest performance issues on SQL Server - FAST

    Slow SQL Server performance? Don't let yourself get tangled up in volumes of server health metrics. Get to the root cause of performance problems in just four clicks. Only SolarWinds Database Performance Analyzer correlates SQL response time with server health metrics - in a single view - to quickly pinpoint...

  • Help Desk & IT Asset Management Software – Extremely Affordable & Easy-to-Use

    SolarWinds® Web Help Desk® (WHD) is a web-based help desk software that simplifies, centralizes and automates help desk management tasks including ticketing management, IT asset management, IT change management, knowledge management, incident & problem management, SLA management, & more. SolarWinds WHD provides email-to-ticket automation, dynamically assigns, routes and escalates trouble...

View all downloads

  • Top 5 Reasons to Choose SolarWinds Log & Event Manager (LEM)

    Real-Time, In-Memory, Event Log Correlation: Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations Out-of-the-Box Security and Compliance Reporting Templates: Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates USB Defense: Protect against endpoint data loss &...

  • Replace a Failed Critical Network Device in Under One Hour

    Replacing a failed network device can be stressful because of the potential downtime and cost to your organization. Too often, replacing a failed device takes too long because you don’t have a backup of the configuration files. For critical devices the configuration files can be very difficult and time consuming...

  • Download a FREE Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

  • Download a FREE Trial of IP Address Manager from SolarWinds®!

    Are you still using spreadsheets to manage your IP space? The explosion of IP-enabled devices in corporate networks has increased the complexity of IP space management beyond what can be handled with spreadsheets or other home-grown tools. SolarWinds IP Address Manager makes it easier than ever to manage and...

  • Your FREE 60-Day Trial Starts Here

    Get instant access to the Brocade Vyatta 5400 vRouter. Download your free virtual router trial now and enjoy 24/7 support. KEY FEATURES INCLUDE: Advanced IPv4 and IPv6 Unicast and Multicast Stateful firewall, IPsec, SSL-Based OpenVPN and DMVPN Linux-based extensible network OS Hypervisors Supported: VMware ESX, Citrix...

View all downloads