Resource Library

Welcome to TechRepublic's Resource Library - the web's largest directory of free vendor-supplied technical content, including IT white papers, webcasts, case studies and much more. Take advantage of the library's vast resources on an array of topics, from Big Data to cloud computing, mobility to security. There's a world of knowledge at your fingertips in the Resource Library - and it's free to registered TechRepublic members.

  • Gartner Magic Quadrant for Enterprise Mobility Management Suites

    The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices. Check this Gartner Report Now!

  • Enterprise Mobility Management - The Big Bang Theory

    The universe of mobility is a complex thing, and it is ever expanding-much like our actual universe. The other mobility shares with our ever- expanding cosmos is the potential that can be realized through a rational, analytic, and comprehensive understanding.

  • HP Operations Orchestration Overview

    An innovative enterprise scale automation platform that provides infrastructure management and application management capabilities for delivering services on traditional data centers and hybrid cloud environments.

  • Enterprise-scale IT automation with a disciplined approach

    This report explores the benefits of IT process automation that supports entire IT environment from traditional IT to cloud-based infrastructure operations. Read this info brief and learn how HP helped organisations reduced operational cost and improved service quality.

  • The benefits of HP Operations Orchestration

    This info brief explores the benefits of automating the orchestration of process such as incident management and service request fulfilment leading to reduced errors and execution times by 50% or more.

View all white papers

  • Automating and Securing Healthcare Information with Cloud-Based Fax Messaging

    Federal guidelines are driving healthcare providers to automate the processing of patient-related information. Using internal fax infrastructures to manage healthcare information is becoming more costly, and posing a security risk. Find out how a cloud-based fax solution secures patient information processing while lowering operational costs.

  • Using Cloud-Based Fax to Minimize Security Breaches and Compliance Risks

    Enterprises that rely heavily on fax view regulatory compliance as a major business component. Non-compliance issues that arise from security breaches and other forms of information leakage often result in substantial regulatory penalties, both civil and criminal. As government regulations regarding information security evolve, the need to align fax systems...

  • Using Production Messaging to Automate Workflow

    For customers at one of the nation’s leading pharmacies, wait times were becoming a hassle. Manual processes, like keying data into the central pharmacy system and faxing documents back and forth, meant that prescriptions took hours instead of the minutes to fulfill. With OpenText Production Messaging and Document Capture, the...

  • Automating Insurance Business Processes with Cloud-Based Fax Messaging

    The continuous need to cut costs, improve productivity and provide a high level of protection for policy holders is a very complex undertaking for modern insurance companies. Many of these organizations have to manage traditional fax machines and infrastructure, requiring a lot of manual document handling and processing. This mode...

  • A reliable platform that helps facilitate HIPAA and HITECH compliance

    In today’s business climate of strict government regulation healthcare organizations are ramping up their IT resources, exhausting every option available to remain compliant with the Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH). They don’t have much choice with regards...

View all white papers

  • Tyco Integrated Security: Overall Crime Index for Your Area

    This helpful and informative Crime Index shows detailed scores that indicate the relative risk of crime at a specific address or site listed as compared to national averages. A Crime Index score of 256 means that the risk of crime at the location is 2.56 times that of the national...

  • Cloud Priorities 2014: Cloud strategies, priorities and implementation plans of North American IT leaders and professionals

    The ZDNet Cloud Priorities 2014 report, sponsored by Windstream, is a research study on cloud in North America and reports on the current and future adoption of the subject technology, the business objectives of adopters, and the experiences of those adopters. The report also covers current budgets and changes in...

  • 6 Secrets to Offering Exceptional Customer Service

    The vast majority of people are not experiencing great service. Nearly a third of consumers believe that businesses are now paying less attention to providing good customer service. On top of that, just 7% of those polled say that customer service experiences they have with companies typically exceed their...

  • Gartner Whitepaper: Notebook Total Cost of Ownership: 2013 Update

    The gap between desktop and notebook total cost of ownership continues to close, but tablets are also being considered as notebook replacements. Infrastructure and operations leaders should use this analysis to support their endpoint adoption decision.Find out how much your Notebook solution is costing you with this whitepaper report from...

  • 20 Customer Service Practices

    It can be easy for customer service departments to continue doing what they’ve always been doing. Csat scores and overall cost are the same, so why change? This mindset neglects the fact that today’s consumer has options around how they want to contact a company for support. We are...

View all white papers

  • Live Webcast: The Future of Meetings

    Join us for this LIVE event! Thursday, August 7, 2014 10 AM (PDT) / 1 PM (EDT) Let’s face it -- your meetings have likely gone a bit out of control. With more time allocated for gathering than for actual work, companies of all shapes and sizes are suffering from...

  • Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

  • Top 5 Things Every C# Developer Should Know

    C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how you can gain deeper intelligence into your code to avoid critical crash causing defects. C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how...

  • 5 Tips From Intuit For Implementing Static Code Analysis

    Poor software quality has become one of the most expensive topics in human history with costs exceeding $500 billion per year worldwide. However, 97% of software defects can be removed through code review, static analysis and unit testing. Learn how the implementation of static analysis at Intuit led to reduced...

  • Mind The Gap: Surviving The Technical Security Skills Crisis

    Gain insights from a recent Forrester and IBM study on the global IT security skills crisis Are you having a hard time finding and hiring qualified IT security staff – and retaining them on staff? If so, you are not alone. There is a widespread technical security skills crisis, and...

View all webcasts

View all webcasts

View all webcasts

  • E-Guide: HP Case Studies

    Read this E-Guide to learn how wih new HP Officeject Pro X devices, you can meet your targets for saving energy and cut total print costs by around 50 per cent.

  • Case Study: LogMeIn Rescue and Rice Toyota

    As Rice Toyota has grown, so has its dependence on computer applications and systems to deliver a high level of customer service and customer satisfaction. With more than 180 employees using computers to access applications in four buildings, Rice’s small IT department was increasingly challenged to resolve user support issues...

  • Cincinnati Zoo transforms customer experience and boosts profits

    The Cincinnati Zoo & Botanical Garden is one of the nation's most popular attractions, a Top 10 Zagat-rated Zoo, and a Top Zoo for Children according to Parent's Magazine. Each year, more than 1.3 million people visit its 71-acre site, which is home to more than 500 animal and 3,000...

  • A Forrester Total Economic Impact Case Study

    Forrester Research conducted a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Polycom voice solutions for Microsoft Lync. Download this case study to understand the framework for evaluating the potential financial impact of Polycom voice solutions within their organizations....

  • Gartner Predicts 2014: Identity and Access Management

    Industry analyst firm Gartner, Inc. reviews how the Nexus of Forces is driving complex shifts in identity and access management. Download this Gartner report to learn about the: Impact of cloud and SaaS adoption; Growth of external identity providers; Importance of context-based acces.

View all case studies

  • Kansas City Power & Light Quality Management Video

    Kansas City Power & Light (KCP&L), a U.S. energy provider that services over 800,000 customers, shares how HP ALM (Application Lifecycle Management) and the HP Executive Scorecard enable their company to enhance quality management and make informed fact-based decisions with powerful executive reporting tools. Namita Gogumalla, manager of the project...

  • McGraw-Hill Case Study

    Discover how McGraw-Hill created a Project and Portfolio Management Center of Excellence and cut development times, and improved traceability and reporting. Download the case study and learn how McGraw-Hill established best practices to support the development of innovative products and services with a leading enterprise project and portfolio management (PPM)...

  • Lufthansa

    Read the Lufthansa customer case study and learn how a Quality Center SaaS model enabled the airline to cut IT cost and provide 24/7access to HP Quality Center support for all Lufthansa employees and partners worldwide using the SaaS model, 365 days a year. HP is the sponsor of...

  • Vodafone Ireland implements world-class service excellence with HP BSM

    Learn how business service management helped Vodafone Ireland transform from a reactive to a proactive IT Operations function. Read how BSM solutions enabled the Vodafone IT Operations group to align priorities to match the business and drive business value, delivering 300% ROI in one year. HP is the sponsor...

  • Scottish marketing company provides excellence in service delivery

    See how a Scottish marketing company upheld its service-level agreements and maintained compliance for its UK-based clients by working with Dell Partner Certum and Dell AppAssure. The Results: Saved almost £10,000.00 over legacy tape backup approach Improved RTO and RPO from hours to minutes Reduced storage space requirements by...

View all case studies

  • Gartner Predicts 2014: Identity and Access Management

    Industry analyst firm Gartner, Inc. reviews how the Nexus of Forces is driving complex shifts in identity and access management. Download this Gartner report to learn about the: Impact of cloud and SaaS adoption; Growth of external identity providers; Importance of context-based acces.

  • Cloud Services for Dummies eBook

    For business leaders, cloud computing is a cost-effective way to leverage IT resources to prototype and implement strategic change. For your IT organization, the cloud allows it to be significantly more proactive and responsive when it comes to supporting strategic business imperatives. Learn how to take advantage of IaaS and...

  • Forrester Report: Surviving the Technical Security Crisis

    As new threats emerge every day, the need for qualified security staff is growing. But there aren't enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders...

  • Forrester Report: Bring ROI to your BYOD

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program.

  • Preparing your Network for the Mobile Onslaught

    Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices - which can ultimately lead to poor performance or an inflexible infrastructure. Find...

View all case studies

  • Download a FREE Trial of IP Address Manager from SolarWinds®!

    Are you still using spreadsheets to manage your IP space? The growing size and complexity of networks makes it increasingly difficult to reliably manage IP space with only simple spreadsheets or homegrown tools. SolarWinds IP Address Manager can help. It allows you to: Automatically scan and accurately inventory...

  • Troubleshoot WAN Performance & Availability

    Application performance issues are not isolated to your data center or central office and, in fact, may be more prominent in your branch offices or remote locations due to susceptibility to WAN induced jitter, latency, and packet loss. Using Cisco's IP SLA technology, traffic data can be simulated to test...

  • Citrix NetScaler VPX - 90 Day Trial

    Try the Citrix NetScaler VPX for 90 days and see for yourself the benefits for web app acceleration, availability and security. Key benefits of NetScaler VPX Freedom to choose your platform - Virtual appliance runs on Citrix XenServer, Microsoft or VMware Simple to install and manage - The...

  • Find, analyze & resolve your toughest performance issues on SQL Server - FAST

    Slow SQL Server performance? Don't let yourself get tangled up in volumes of server health metrics. Get to the root cause of performance problems in just four clicks. Only SolarWinds Database Performance Analyzer correlates SQL response time with server health metrics - in a single view - to quickly pinpoint...

  • Recover from a Network Configuration Error in Under Five Minutes

    Researchers say that over 80% of network outages are caused by human error. Many errors are made when someone makes changes to a device configuration. When a network outage occurs, the standard triage questions are "what just happened", "did something fail or was something changed", and "how do we get...

View all downloads

  • vRanger Backup & Replication Upgrade Trial (vRanger Pro)

    Dell™ vRanger software provides high-speed backup, replication and recovery of VMware® and physical Windows Server® environments. It protects entire virtual environments in minutes, detecting and backing up new VMs automatically, and delivers safe, scalable data protection to even the largest VMware customers. With vRanger, you can locate and restore individual...

  • Quest vRanger Virtual Appliance

    Dell™ vRanger software provides high-speed backup, replication and recovery of VMware® and physical Windows Server® environments. It protects entire virtual environments in minutes, detecting and backing up new VMs automatically, and delivers safe, scalable data protection to even the largest VMware customers. With vRanger, you can locate and restore individual...

  • Dell AppAssure 5 for centOS x64

    Back up your data fast—and replicate and recover it even faster—with Dell AppAssure, a single unified backup and recovery solution for virtual, physical and cloud. As a key data protection element of Dell’s Fluid Data™ Architecture, AppAssure 5 enables you to control cost, optimize performance and enhance protection. It goes...

  • Dell AppAssure 5 centOS x86

    Back up your data fast—and replicate and recover it even faster—with Dell AppAssure, a single unified backup and recovery solution for virtual, physical and cloud. As a key data protection element of Dell’s Fluid Data™ Architecture, AppAssure 5 enables you to control cost, optimize performance and enhance protection. It goes...

  • AppAssure for Windows Agent x64

    Back up your data fast—and replicate and recover it even faster—with Dell AppAssure, a single unified backup and recovery solution for virtual, physical and cloud. As a key data protection element of Dell’s Fluid Data™ Architecture, AppAssure 5 enables you to control cost, optimize performance and enhance protection. It goes...

View all downloads

  • AppAssure 5 Trial

    Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. It offers a variety of flexible recovery options so you can retrieve your data quickly, whether it resides on physical or virtual servers, or in the cloud.

  • Intel® Inspector XE 2013

    Intel® Inspector XE finds memory leaks, corruption, deadlocks, data races, and more in C, C++, C#, F#, Fortran, and MPI applications. Use a normal build: no special compiler or recompiles are required. Heap growth analysis and debugger breakpoints simplify diagnosis of difficult bugs early in the development cycle―when they are...

  • Replace a Failed Critical Network Device in Under One Hour

    Replacing a failed network device can be stressful because of the potential downtime and cost to your organization. Too often, replacing a failed device takes too long because you don’t have a backup of the configuration files. For critical devices the configuration files can be very difficult and time consuming...

  • Download a FREE Trial of IP Address Manager from SolarWinds®!

    Are you still using spreadsheets to manage your IP space? The growing size and complexity of networks makes it increasingly difficult to reliably manage IP space with only simple spreadsheets or homegrown tools. SolarWinds IP Address Manager can help. It allows you to: Automatically scan and accurately inventory...

  • Top 5 Reasons to Choose SolarWinds Log & Event Manager (LEM)

    Real-Time, In-Memory, Event Log Correlation: Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations Out-of-the-Box Security and Compliance Reporting Templates: Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates USB Defense: Protect against endpoint data loss &...

View all downloads