Resource Library

Welcome to TechRepublic's Resource Library - the web's largest directory of free vendor-supplied technical content, including IT white papers, webcasts, case studies and much more. Take advantage of the library's vast resources on an array of topics, from Big Data to cloud computing, mobility to security. There's a world of knowledge at your fingertips in the Resource Library - and it's free to registered TechRepublic members.

  • A secure, scalable and cost-effective Cloud Platform

    This case study explores the challenges faced by Tickethour before to entering to the UK market, and the reasons that took them to consider a Cloud base solution that offered security and scalability while guaranteeing an ease use and efficient maintenance process.

  • Case Study: Cloud Iaas implementation at Ajinomoto Co. Inc.

    This case study is exploring the benefits of a Cloud IaaS pay-per-use Model. Ajinomoto is a japanese organsation with activities in the food industry, they needed to decentralise the production and disaster recovery systems, while reducing costs and time with DR systems maintenance. Download this case to learn what was...

  • Cloud Computing - Creating Value For Business Across the Globe: Frost & Sullivan Report

    The global cloud computing market is expected to reach approximately US$86 billion in 2016 from an estimated US$36 billion in 2013, growing at a compound annual growth rate of 33.4%. While SaaS continues to be the most popular cloud service offerings with users, IaaS is witnessing growing adoption and is...

  • On-demand Webcast: UK New Threat Landscape..

    There have been multiple high profile worldwide data breaches so far in 2014. Do you wonder what's happening on the UK Threat Landscape? Join Rackspace and Alert Logic to hear more about malicious cybercrime, the evolution of hackers, how the underground economy works and how it affects the corporate IT...

  • On-demand Webcast: UK Threat Landscape.....

    There have been multiple high profile worldwide data breaches so far in 2014. Do you wonder what's happening on the UK Threat Landscape? Join Rackspace and Alert Logic to hear more about malicious cybercrime, the evolution of hackers, how the underground economy works and how it affects the corporate IT...

View all white papers

View all white papers

  • Cloud Priorities 2014: Cloud strategies, priorities and implementation plans of North American IT leaders and professionals

    The ZDNet Cloud Priorities 2014 report, sponsored by Windstream, is a research study on cloud in North America and reports on the current and future adoption of the subject technology, the business objectives of adopters, and the experiences of those adopters. The report also covers current budgets and changes in...

  • Gartner Whitepaper: Notebook Total Cost of Ownership: 2013 Update

    The gap between desktop and notebook total cost of ownership continues to close, but tablets are also being considered as notebook replacements. Infrastructure and operations leaders should use this analysis to support their endpoint adoption decision.Find out how much your Notebook solution is costing you with this whitepaper report from...

  • Cyber Security Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

  • Dell Case Study: Rich learning outcomes for digitally-connected students

    Somerville House has deployed personal notebooks to students for the past eleven years as part of their integrated approach to technology in education. The school wanted to give their students and teachers access to anytime, anywhere learning through devices with the capability for integrating richer data types into the learning...

  • Critical Concepts of the 200-120 CCNA Routing and Switching Exam

    In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing...

View all white papers

  • Live Webcast: The Significance of Story in Powerful Presentations

    Join us for this LIVE event! Wednesday, September 10, 2014 11 AM (PDT) / 2 PM (EDT) Speaker:Kelly Loosli, Animation Producer and Co-Creator of the Internationally Recognized Animation Program at Brigham Young University. There’s no denying the power of a good story. Our fascination with storytelling fuels the fire of...

  • Live Webcast: The Future of Meetings

    Join us for this LIVE event! Thursday, August 7, 2014 10 AM (PDT) / 1 PM (EDT) Let’s face it -- your meetings have likely gone a bit out of control. With more time allocated for gathering than for actual work, companies of all shapes and sizes are suffering from...

  • Top 5 Things Every C# Developer Should Know

    C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how you can gain deeper intelligence into your code to avoid critical crash causing defects. C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how...

  • 5 Tips From Intuit For Implementing Static Code Analysis

    Poor software quality has become one of the most expensive topics in human history with costs exceeding $500 billion per year worldwide. However, 97% of software defects can be removed through code review, static analysis and unit testing. Learn how the implementation of static analysis at Intuit led to reduced...

  • Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

View all webcasts

  • On-demand Webcast - ZDNet's Cloud Priorities 2014

    ZDNet’s Cloud Priorities 2014 webcast, sponsored by Windstream, will debut findings from a research study we conducted among our readers on cloud computing in North America. Our own Bill Detwiler, managing editor of Tech Pro Research, will share key findings from the study and discuss the most ground-breaking cloud trends....

  • On-demand Webcast: Your Strategy at the Intersection of Cloud and Mobile

    We live in an enterprise world where Bring Your Own Device (BYOD) is a fait accompli and mobile is part of all of our lives. IT and mobility stakeholders continue to address ongoing changes with audiences, OS environments, data formats, coding methods, business processes and more. The case for investing...

  • Top 5 Things Every C# Developer Should Know

    C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how you can gain deeper intelligence into your code to avoid critical crash causing defects. C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how...

  • 5 Tips From Intuit For Implementing Static Code Analysis

    Poor software quality has become one of the most expensive topics in human history with costs exceeding $500 billion per year worldwide. However, 97% of software defects can be removed through code review, static analysis and unit testing. Learn how the implementation of static analysis at Intuit led to reduced...

  • Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

View all webcasts

  • Answering the Tough Question: Who Has Access to What?

    Learn from this webcast how to select specific users or groups in Active Directory (AD) and efficiently assess and document permission assignments within your environment, as well as how automating the process can save your organization time and money.

  • On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

  • 5 Tips From Intuit For Implementing Static Code Analysis

    Poor software quality has become one of the most expensive topics in human history with costs exceeding $500 billion per year worldwide. However, 97% of software defects can be removed through code review, static analysis and unit testing. Learn how the implementation of static analysis at Intuit led to reduced...

  • Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

  • Webinar: Workday 20 Webinar

    Workday announces the arrival of Workday Big Data Analytics in Workday 2.0. Watch the webinar to learn how this powerful new application lets you combine Workday data with multiple non-Workday data sources to get more comprehensive insight and lets you run your business your way.

View all webcasts

  • E-Guide: HP Case Studies

    Read this E-Guide to learn how wih new HP Officeject Pro X devices, you can meet your targets for saving energy and cut total print costs by around 50 per cent.

  • Case Study: LogMeIn Rescue and Rice Toyota

    As Rice Toyota has grown, so has its dependence on computer applications and systems to deliver a high level of customer service and customer satisfaction. With more than 180 employees using computers to access applications in four buildings, Rice’s small IT department was increasingly challenged to resolve user support issues...

  • Cincinnati Zoo transforms customer experience and boosts profits

    The Cincinnati Zoo & Botanical Garden is one of the nation's most popular attractions, a Top 10 Zagat-rated Zoo, and a Top Zoo for Children according to Parent's Magazine. Each year, more than 1.3 million people visit its 71-acre site, which is home to more than 500 animal and 3,000...

  • A Forrester Total Economic Impact Case Study

    Forrester Research conducted a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Polycom voice solutions for Microsoft Lync. Download this case study to understand the framework for evaluating the potential financial impact of Polycom voice solutions within their organizations....

  • Gartner Predicts 2014: Identity and Access Management

    Industry analyst firm Gartner, Inc. reviews how the Nexus of Forces is driving complex shifts in identity and access management. Download this Gartner report to learn about the: Impact of cloud and SaaS adoption; Growth of external identity providers; Importance of context-based acces.

View all case studies

  • Customer Success Story of Columbia Prep:

    ExtremeZ-IP is helping thousands of educational institutions worldwide conquer their Mac/Windows integration challenges. Check out this case study to learn how Columbia Prep School improved Mac user communication and productivity while reducing IT management cost with ExtremeZ-IP.

  • Customer Success Story of University of Central Lancashire:

    ExtremeZ-IP is helping thousands of educational institutions worldwide conquer their Mac/Windows integration challenges. Learn how the University of Central Lancashire, a leading UK institution, is successfully and securely integrating popular Apple products alongside Windows devices in a cross-platform campus environment.

  • Case Study: LogMeIn Rescue and Rice Toyota

    As Rice Toyota has grown, so has its dependence on computer applications and systems to deliver a high level of customer service and customer satisfaction. With more than 180 employees using computers to access applications in four buildings, Rice’s small IT department was increasingly challenged to resolve user support issues...

  • Addressing the Malware Challenge - Strategies at Work: An IANS Custom Report

    We all know malware is a problem, but what's really being done about it? - IANS answers this question with in-depth research on how 100 large global organisations are combating sophisticated security threats. In general, the report provides insights on how malware is changing, what the implications for defence are...

  • Buyer's Criteria for Next-Generation Network Security

    This Next-Generation Network Security Buyer's Criteria will provide an in-depth explanation of the factors that drive organisations to look at next-generation solutions. It offers an analysis of the key capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need...

View all case studies

  • Cloud Services for Dummies eBook

    For business leaders, cloud computing is a cost-effective way to leverage IT resources to prototype and implement strategic change. For your IT organization, the cloud allows it to be significantly more proactive and responsive when it comes to supporting strategic business imperatives. Learn how to take advantage of IaaS and...

  • Gartner Predicts 2014: Identity and Access Management

    Industry analyst firm Gartner, Inc. reviews how the Nexus of Forces is driving complex shifts in identity and access management. Download this Gartner report to learn about the: Impact of cloud and SaaS adoption; Growth of external identity providers; Importance of context-based acces.

  • IDC Report - Managed Services: Business Value

    Research shows that today’s business goals are centered on reducing costs, strengthening customer relationships and improving financial management. The biggest challenges to achieving these goals are lack of skills and investment funds, and inadequate linkages between the IT environment and how business processes are managed. Read this analyst report to...

  • Forrester Report: Bring ROI to your BYOD

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program.

  • Preparing your Network for the Mobile Onslaught

    Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices - which can ultimately lead to poor performance or an inflexible infrastructure. Find...

View all case studies

  • Download a FREE Trial of IP Address Manager from SolarWinds®!

    Are you still using spreadsheets to manage your IP space? The growing size and complexity of networks makes it increasingly difficult to reliably manage IP space with only simple spreadsheets or homegrown tools. SolarWinds IP Address Manager can help. It allows you to: Automatically scan and accurately inventory...

  • Troubleshoot WAN Performance & Availability

    Application performance issues are not isolated to your data center or central office and, in fact, may be more prominent in your branch offices or remote locations due to susceptibility to WAN induced jitter, latency, and packet loss. Using Cisco's IP SLA technology, traffic data can be simulated to test...

  • Replace a Failed Critical Network Device in Under One Hour

    Replacing a failed network device can be stressful because of the potential downtime and cost to your organization. Too often, replacing a failed device takes too long because you don’t have a backup of the configuration files. For critical devices the configuration files can be very difficult and time consuming...

  • V3 – Why is the app slow? Download a FREE trial of SolarWinds Application Monitor & find out.

    Why is the app slow? Download a FREE trial of SolarWinds Application Monitor & find out. 3 reasons to consider SolarWinds Server & Application Monitor: Out-of-the-box monitoring for almost everything – servers, virtual infrastructure & 150+ apps. Easy customization for your enterprise needs – customize templates,...

  • Orchestration ROI Infographic

    Operations orchestration is the coordination of automated tasks across teams, tools, and environments including incident management, service request fulfillment and more. This infographic reveals how most IT organizations realized ROI in less than 6 months and quantifies orchestration benefits. HP is the sponsor of this material. By submitting your...

View all downloads

  • AppAssure 5 Trial

    Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. It offers a variety of flexible recovery options so you can retrieve your data quickly, whether it resides on physical or virtual servers, or in the cloud.

  • Top 5 Reasons to Choose SolarWinds Log & Event Manager (LEM)

    Real-Time, In-Memory, Event Log Correlation: Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations Out-of-the-Box Security and Compliance Reporting Templates: Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates USB Defense: Protect against endpoint data loss &...

  • Comprehensive Virtualization Management - From VM to Spindle

    SolarWinds Virtualization Manager delivers integrated VMware & Microsoft Hyper-V capacity planning, performance monitoring, VM sprawl control, configuration management, & chargeback automation. All in one awesomely affordable product that’s easy to download, deploy, and use. Virtualization Manager auto-discovers the virtual machines in your environment making the creation of your monitoring environment...

  • Dameware - Provide secure remote support to end-users located anywhere in the world.

    With DameWare Remote Support you can: Support end-users and computers located both inside & outside your firewall Remotely control the desktop of Windows®, Mac OS X® and Linux computers Take advantage of extensive security and encryption capabilities, including multiple authentication methods Centrally manage shared host lists, users & administrators,...

  • V3 – Why is the app slow? Download a FREE trial of SolarWinds Application Monitor & find out.

    Why is the app slow? Download a FREE trial of SolarWinds Application Monitor & find out. 3 reasons to consider SolarWinds Server & Application Monitor: Out-of-the-box monitoring for almost everything – servers, virtual infrastructure & 150+ apps. Easy customization for your enterprise needs – customize templates,...

View all downloads

  • AppAssure 5 Trial

    Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. It offers a variety of flexible recovery options so you can retrieve your data quickly, whether it resides on physical or virtual servers, or in the cloud.

  • Top 5 Reasons to Choose SolarWinds Log & Event Manager (LEM)

    Real-Time, In-Memory, Event Log Correlation: Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations Out-of-the-Box Security and Compliance Reporting Templates: Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates USB Defense: Protect against endpoint data loss &...

  • Replace a Failed Critical Network Device in Under One Hour

    Replacing a failed network device can be stressful because of the potential downtime and cost to your organization. Too often, replacing a failed device takes too long because you don’t have a backup of the configuration files. For critical devices the configuration files can be very difficult and time consuming...

  • Download a FREE Trial of IP Address Manager from SolarWinds®!

    Are you still using spreadsheets to manage your IP space? The growing size and complexity of networks makes it increasingly difficult to reliably manage IP space with only simple spreadsheets or homegrown tools. SolarWinds IP Address Manager can help. It allows you to: Automatically scan and accurately inventory...

  • Download a FREE Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

View all downloads