Resource Library

Welcome to TechRepublic's Resource Library - the web's largest directory of free vendor-supplied technical content, including IT white papers, webcasts, case studies and much more. Take advantage of the library's vast resources on an array of topics, from Big Data to cloud computing, mobility to security. There's a world of knowledge at your fingertips in the Resource Library - and it's free to registered TechRepublic members.

  • Protect the Mobile Enterprise with Smarter Security

    Mobile security, and ensuring users do the right thing, is one of the highest priorities of today’s CIOs. Although mobile employees can be more productive by working anytime and anywhere, they are now accessing corporate data and applications from outside the traditional network perimeter. This means traditional access and authentication...

  • Identity and Access Intelligence: Transforming the Nature of Enterprise Security

    In this paper, Enterprise Management Associates® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud...

  • IBM: Consolidated Security Management for Mainframe Clouds

    Organisations today grapple with the expansion of distributed computing, increased online collaboration, explosive data growth and heterogeneous IT environments—all issues that make information security more critical, yet more complex than ever. In this white paper, IBM takes a look at organisations who allow the mainframe to serve as an enterprise...

  • Fight Malware, Malfeasance and Malingering

    Every year brings an even more extreme set of threats to the enterprise than the last. Spam email used to be the number one headache. Now it’s been replaced with malware, spear phishing, and the infamous spin-off of the two, the advanced persistent threat (APT). Employee internet usage is also...

  • 10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

View all white papers

  • IDC Market Scape: Worldwide Datacenter Infrastructure Management 2013 Vendor Analysis

    The latest IDC MarketScape Report names the Trellis™ platform a leader for capabilities and future strategy. International Data Corporation (IDC) recognized Emerson as a leading vendor of data center infrastructure management (DCIM) software solutions in its Worldwide Datacenter Infrastructure Management 2013 Vendor Analysis.

  • Cloud email migration, your questions answered. A Gartner Analyst review

    A video bought to you by, Matt Cain, Research Vice President at Gartner and Mounil Patel, Vice President of Field Enablement from Mimecast. This short video looks at some of the key questions and answers around email migrations whether it be to the latest Exchange server, Office 365 or a...

  • 6 Secrets to Offering Exceptional Customer Service

    The vast majority of people are not experiencing great service. Nearly a third of consumers believe that businesses are now paying less attention to providing good customer service. On top of that, just 7% of those polled say that customer service experiences they have with companies typically exceed their...

  • ZDNet ANZ IaaS / PaaS Priorities 2013/14

    The Infrastructure-as-a-Service and Platform-as-a-Service strategies, priorities and implementation plans of ANZ IT leaders and professionals Part of ZDNet's Cloud Priorities research project, ZDNet IaaS/PaaS Priorities reports the findings of a survey about the cloud priorities and implementation plans of IT and business leaders in Australia and New Zealand. ...

  • 20 Customer Service Practices

    It can be easy for customer service departments to continue doing what they’ve always been doing. Csat scores and overall cost are the same, so why change? This mindset neglects the fact that today’s consumer has options around how they want to contact a company for support. We are...

View all white papers

  • SPSS Stastics White Paper: The Risk of Using Spreadsheets for Statistical Analysis

    While spreadsheets are widely used for statistical analysis, they are useful only to a certain point. When used for a task they’re not designed to perform, or for a task beyond the limit of their capabilities, using spreadsheets can be risky. Read this paper to learn about more powerful yet...

  • Profit Magazine: Everything You Know About Sales is Wrong

    Everything You Know About Sales is Wrong. Daniel Pink, author of the book, To Sell Is Human unveils the secrets to selling - what makes sales people tick and the traits that make the best sellers successful in today’s marketplace.

  • Forrester Study: Total Economic Impact of Google Apps for Business

    Forrester Consulting has performed a total economic impact (TEI ) analysis, commissioned by Google, for organizations considering switching to Google Apps for Business from a traditional, on-premise environment for messaging and collaboration. In a study entitled "The Total Economic Impact of Google Apps for Business", the research and advisory firm...

  • Systems Engineering for Dummies

    This IBM Limited Edition ebook, "Systems Engineering For Dummies," explains what systems engineering is and how it can help you simplify the development of smart, connected products. If you're looking for ways to expedite time-to-market, ensure business agility, and deliver high-quality smart products while cutting costs, this ebook is for...

  • OpenText Fax2Mail vs. Fax Machines

    An overview of a fax service that eliminates fax machines, enhances employee productivity and drives profitability.

View all white papers

  • Live Webcast: How to Simplify Deployment of Google Apps and Office 365

    Google Apps and Microsoft Office 365 each has its own vast ecosystem, from email to office applications to identity management. Google would prefer you live entirely in the Google environment, while Microsoft would prefer you live entirely in its Exchange/Office 365/Active Directory infrastructure. You are likely using a combination of...

  • Live Webcast: Who’s Holding You Hostage? Tips from a Former FBI Negotiation Trainer on How to Get Through to Anyone

    Join us for this LIVE event! Wednesday, May 21st 11:00 AM PDT / 2:00 PM EDT The first make-or-break step in persuading anyone to do anything is getting them to hear you out. But one of the most effective ways to make that happen is to start listening to...

  • Live Webcast: Three Reasons Your Competitors Are Adopting Cloud

    Cloud computing adoption is accelerating as businesses face a growing body of facts and figures that show the cloud can meet data security, privacy and compliance requirements; reduce costs; and allow consolidation of data backup and recovery needs. With this mounting evidence, the cloud train is leaving the station. ...

  • The Collaboration System that Brings Teams Together

    Sharing knowledge, developing ideas, making better decisions – these move agencies and teams in the right direction. With Christie Brio, you can simultaneously contribute rich multimedia content from multiple wireless sources and engage easily with colleagues – in the same room or around the world, in real-time. Learn about Christie...

  • Google Hangout - HP Proliant: Saving You Time with the World’s Most Intelligent Servers

    The most valuable and scarce resource in any small business’ IT department is time. HP Proliant servers aim to give organizations back their time by offering embedded systems that feature intelligent provisioning, an active health system, greater insights and iLO remote management. The best part is: HP offers this all...

View all webcasts

  • Live Webcast: Smart Strategies for Data Backup and Recovery

    Everyone knows the dire consequences of data loss. The key is how to work pre-emptively to avoid them by employing smart strategies for backup and recovery. Smart strategies are centered around an essential understanding of why systems fail and what can be done to play it safe with your...

  • On-demand Webcast: 2014 Email Predictions From The Most Interesting Man in Email Today

    Join the man who made CMO Magazine’s list of “50 Marketing Leaders You Should Know” for a scintillating sneak peek into what email leaders today are most concerned about. Bill McCloskey, founder of TheOneHundredClub.org, eDataSource.com and Only Influencers, has his finger on the pulse of what’s happening in email today....

  • Calculating ROI for PC hardware and Client OS Upgrades

    Nearly a quarter of all businesses are still using Windows XP, despite two current and effective Windows OS options. Now, with the end-of-support for Windows XP upcoming in 2014, many organizations are faced with the challenge of how to keep end users productive, while retaining necessary applications and security. The...

  • Live Webcast: Moments of Magic in Customer Service

    Join us for this LIVE event! Thursday, April 24th 10:00 AM PDT / 1:00 PM EDT There’s a big difference between satisfied customers and loyal customers. Satisfactory is a rating, while loyalty is an emotion. The goal is to deliver a customer service experience that gives people a...

  • IBM OnDemand Webcast - Boost performance & profitability with better planning & mobile reporting

    See how Ashurst, a top-tier legal service provider for private and public sector clients worldwide, was able to effectively manage organizational change and improve profitability using IBM Business Analytics.

View all webcasts

  • On-demand Webcast - ZDNet's Cloud Priorities 2014

    ZDNet’s Cloud Priorities 2014 webcast, sponsored by Windstream, will debut findings from a research study we conducted among our readers on cloud computing in North America. Our own Bill Detwiler, managing editor of Tech Pro Research, will share key findings from the study and discuss the most ground-breaking cloud trends....

  • On-demand Webcast: As threats become more sophisticated, so too must next generation firewalls

    Not a day goes by without security threat news. Whether it's foreign hackers who have been living inside a famous company's network for years, or criminals stealing data from credit cards, employment and patient records, and selling them for pennies to other criminals, each day the situation gets worse. As...

  • On-demand Webcast: Overcoming the challenges of multifactor authentication

    Many cloud service providers are rolling out two-factor authentication features to address the increasing challenges that come from relying on passwords alone to secure user access and company data. Multifactor authentication is a great step towards stronger security and access management. Unfortunately, for enterprises that leverage more than a...

  • On-demand Webcast: Enterprise-proofing the Apple ecosystem with Centrify and Aqua Connect

    Here's something new. Most IT folks are familiar with terminal services on Windows Server, but did you know you can provide remote, secure terminal services with OS X? It's not only possible; it's a technology that allows you to provide the entire Macintosh experience to neglected corporate and enterprise users...

  • On-demand Webcast: 2014 Email Predictions From The Most Interesting Man in Email Today

    Join the man who made CMO Magazine’s list of “50 Marketing Leaders You Should Know” for a scintillating sneak peek into what email leaders today are most concerned about. Bill McCloskey, founder of TheOneHundredClub.org, eDataSource.com and Only Influencers, has his finger on the pulse of what’s happening in email today....

View all webcasts

  • Forrester Report: Surviving the Technical Security Crisis

    As new threats emerge every day, the need for qualified security staff is growing. But there aren't enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders...

  • Under Cloud Cover: How leaders are accelerating competitive differentiation

    According to a survey by the IBM Center for Applied Insights and Oxford Economics, business leaders are becoming increasingly focused on the business value of cloud. Although the participant’s cloud strategies differ in terms of scope, platform and delivery models, the chief takeaway from the survey is that cloud is...

  • Building a Security Incident Response Plan

    Security breaches can cost millions of dollars—but these days they’re virtually inevitable. Every organization needs a formal, documented Computer Security Incident Response Plan (CSIRP) and it needs to be kept up-to-date. In this executive brief, IBM shares the ten most common shortcomings of CSIPRs and how you can avoid these...

  • Avoiding the pitfalls of outdated DR plans: Expectations and threats may require new approaches.

    Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven...

  • Putting Mobile First - Best Practices

    Mobility is now a business fact of life. Will your organization be one with mobile capabilities or a truly mobile enterprise?

View all case studies

  • MageMojo Boosts Security and Ensures Availability Using F5 Solution

    Magento e-commerce hosting provider MageMojo needed to improve security after a series of distributed denial-of-service (DDoS) attacks that took its site offline at the worst possible time: Cyber Monday. Consolidating its DDoS mitigation and firewall needs in a high-performance F5 solution, MageMojo strengthened both its security posture and its business.

  • Cloud Services for Dummies eBook

    For business leaders, cloud computing is a cost-effective way to leverage IT resources to prototype and implement strategic change. For your IT organization, the cloud allows it to be significantly more proactive and responsive when it comes to supporting strategic business imperatives. Learn how to take advantage of IaaS and...

  • Customer Success Story of Columbia Prep:

    ExtremeZ-IP is helping thousands of educational institutions worldwide conquer their Mac/Windows integration challenges. Check out this case study to learn how Columbia Prep School improved Mac user communication and productivity while reducing IT management cost with ExtremeZ-IP.

  • Case Study: Cincinnati Zoo and Botanical Garden

    The Cincinnati Zoo & Botanical Garden is one of the nation's most popular attractions, a Top 10 Zagat-rated Zoo, and a Top Zoo for Children according to Parent's Magazine. Each year, more than 1.3 million people visit its 71-acre site, which is home to more than 500 animal and 3,000...

  • Case Study: Meka Pro harnesses analytics to improve profitability of manufacturing projects

    To operate effectively in different markets, Finnish manufacturer Meka Pro needed to be able to adjust its pricing and manufacturing strategies to each locality, but had no insight into their own data. Read this case study to learn how Meka Pro used IBM® Cognos® software modules to make faster, better...

View all case studies

  • Quadmark: A case study on switching to Google Apps

    Read how Quadmark, the global consulting and training organisation, with over 100 employees globally embarked on a rebranding and expansion plan including a streamline of IT infrastructure. This included switching it’s email server from Exchange to Gmail and adopting Google Apps.

  • The Successful Cloud Enabled Enterprise - Your Journey to the Cloud Infopaper

    It’s no secret that more and more businesses are leveraging the power of the cloud. And there’s good reason for that. Cloud computing offers the promise of cost-effective capacity on demand—anytime, anywhere, and on any device. But taking advantage of the cloud’s many benefits isn't as simple as signing...

  • HP: Risky business: why business leaders must take action on Windows XP?

    This ZDNet and TechRepublic guide, in association with HP, looks at what's at stake for those who're still on XP, explains some of the threats, and offers options to help the risk-exposed take action to protect their business.

  • Quadmark - A case study on switching to Google Apps for Business

    Read how Quadmark, the global consulting and training organisation, with over 100 employees globally embarked on a rebranding and expansion plan including a streamline of IT infrastructure. This included switching it’s email server from Exchange to Gmail and adopting Google Apps for Business.

  • Comparative Guide: Hitachi Unified Storage VM

    IT decision-makers often struggle to achieve a balanced information infrastructure that meets all their needs. Historically, they have chosen between low initial costs and higher efficiencies or market advantages. A platform that combines enterprise virtualization, data unification and efficient packaging enables businesses to extract increasing value from their data for...

View all case studies

  • Dameware - Provide secure remote support to end-users located anywhere in the world.

    With DameWare Remote Support you can: Support end-users and computers located both inside & outside your firewall Remotely control the desktop of Windows®, Mac OS X® and Linux computers Take advantage of extensive security and encryption capabilities, including multiple authentication methods Centrally manage shared host lists, users & administrators,...

  • Comprehensive Virtualization Management - From VM to Spindle

    SolarWinds Virtualization Manager delivers integrated VMware & Microsoft Hyper-V capacity planning, performance monitoring, VM sprawl control, configuration management, & chargeback automation. All in one awesomely affordable product that’s easy to download, deploy, and use. Virtualization Manager auto-discovers the virtual machines in your environment making the creation of your monitoring environment...

  • SolarWinds Server & Application Monitor (SAM) Offers Easy Exchange Mailbox Management with NEW AppInsight™ for Exchange!

    SolarWinds Server & Application Monitor provides extensive capabilities to monitor and fix your servers and applications, including custom application monitoring. With AppInsight for Exchange, SAM provides expert alerts and advice along with comprehensive visibility to proactively pinpoint Exchange performance issues. Find & fix problems with Microsoft® Exchange & other...

  • Business Essential: Complimentary Vulnerability Scan

    This complimentary security scanner searches for endpoint vulnerabilities, including misconfigurations, missing patches, open services and backdoors. Run the scan to receive a detailed report so you can address security vulnerabilities before they become a problem. Find out if your endpoints are secure. Try this FREE vulnerability scanner now.

  • Free Trial - Unified IT Monitoring for Infrastructure and Applications with up.time®

    Do you want a unified view of IT systems performance, availability and capacity across all server platforms, network devices, applications, and IT business services? Unified, enterprise-level monitoring, alerting and reporting across all Servers, Networks, Applications, and IT services. Easy to use and quick to deploy. up.time can...

View all downloads

  • AppAssure 5 Trial

    Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. It offers a variety of flexible recovery options so you can retrieve your data quickly, whether it resides on physical or virtual servers, or in the cloud.

  • Download a FREE Trial of SolarWinds Server & Application Monitor!

    Why is the app slow? Download a FREE trial of SolarWinds Application Monitor & find out. 3 reasons to consider SolarWinds Server & Application Monitor: Out-of-the-box monitoring for almost everything – servers, virtual infrastructure & 150+ apps. Easy customization for your enterprise needs – customize templates,...

  • Hadoop for the enterprise: quick, easy, free.

    InfoSphere BigInsights Quick Start Edition combines the power of Hadoop with enterprise-grade features including visualization & exploration, advanced analytics, and security & administration. Download the free Quick Start now.

  • IBM Worklight Developer Edition

    IBM® Worklight is an open, comprehensive, and advanced mobile application platform that helps organizations extend their business to mobile devices. Try it today.

  • IBM Security AppScan

    IBM® Security AppScan® enables organizations to assess the security of their applications and achieve regulatory compliance by identifying vulnerabilities and generating reports with intelligent fix recommendations to ease remediation.

View all downloads

  • Intel® Advisor XE 2013

    This breakthrough threading prototyping tool simplifies data-driven threading design for C, C++, C#, and Fortran application architects. Quickly prototype multiple threading designs and compare the projected performance scaling and synchronization issues. Evaluate design alternatives before investing in implementation and without disrupting product development and release cycles. Select the design with...

  • Intel® Parallel Studio XE 2013 SP1

    Efficiently boost application performance. This development suite offers industry-leading compilers, along with highly tuned performance libraries for math, crypto, imaging, compression, and others. Harness performance from the latest processors simply by recompiling your code. Scale for multicore and many-core architectures with Intel® Threading Building Blocks and Intel® Cilk Plus™ parallel...

  • Intel® Inspector XE 2013

    Intel® Inspector XE finds memory leaks, corruption, deadlocks, data races, and more in C, C++, C#, F#, Fortran, and MPI applications. Use a normal build: no special compiler or recompiles are required. Heap growth analysis and debugger breakpoints simplify diagnosis of difficult bugs early in the development cycle―when they are...

  • AppAssure 5 Trial

    Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. It offers a variety of flexible recovery options so you can retrieve your data quickly, whether it resides on physical or virtual servers, or in the cloud.

  • Financials - Killing your Business

    Today’s CFOs are strapped with old systems that are inflexible and holding back their business. It’s no surprise that innovative CFOs are finding freedom with cloud-based financial management applications. See the infographic to learn how CFOs are transforming their organizations in the cloud.

View all downloads