Resource Library

Welcome to TechRepublic's Resource Library - the web's largest directory of free vendor-supplied technical content, including IT white papers, webcasts, case studies and much more. Take advantage of the library's vast resources on an array of topics, from Big Data to cloud computing, mobility to security. There's a world of knowledge at your fingertips in the Resource Library - and it's free to registered TechRepublic members.

  • Redefine Flash

    The speed and efficiency of flash have given rise to a new wave of apps and approaches that redefine what is possible in IT. But experiencing the full effect of this new technology depends on having the right architecture. With EMC’s flexible solutions, organizations of all sizes can harness the...

  • What does better storage performance mean for your business? – EMC XtremIO

    XtremIO develops enterprise data storage systems based completely on random access media such as flash solid state drives (SSDs). By leveraging the underlying abilities of random access media, XtremeIO delivers unparalleled levels of performance, ease of use, operational efficiency and other advanced storage features. Sub-millisecond response times at scale for...

  • Mobile Apps, Addressing Application Development Challenges

    Many enterprises struggle to ensure successful implementation of their mobile app development plan. Gartner’s recent report “Four Key Areas to Ensure a Successful Mobile Application Plan, Van L. Baker, 29 January 2015”, based on their research, outlines key steps that an enterprise should follow on this topic. Download this must...

  • 10 Signs that you need to modernize your backup and recovery solution (German Asset)

    Your business cannot survive without data management and protection, but getting control of rapidly growing and increasingly distributed information silos is a huge challenge. Infrastructures are growing more complex, virtualization and cloud create more obscurity, and BYOD creates dozens if not hundreds of new endpoints to protect. Legacy backup methods...

  • Virtual Server Protection: A Buyers Checklist (German Asset)

    When looking to maximize the value of your virtual infrastructure investment you need to achieve scalable virtual machine (VM) protection, automated VM lifecycle management and the ability to leverage any type of infrastructure for the most soft effective disaster recovery. To achieve these benefits while also supporting your future moves...

View all white papers

View all webcasts

  • MarketScope for Group Video Systems

    The introduction of personal and mobile endpoints is dramatically reshaping the landscape for group video collaboration. IT leaders should align their video portfolios for maximum utilization and strategic fit with their related investments in collaboration and unified communications.

  • IDC ExpertROI SPOTLIGHT: Allstate Case Study

    Insurance Giant Allstate Corporation, like many companies, found it persistently challenging to maximize the value of the IT services it delivers to employees and customers. So they turned to ServiceNow’s cloud-based IT Service Management (ITSM) solution. Since deployment in 2013, Allstate has levered ServiceNow to: • Improve IT state productivity...

  • Today’s State of Work: The Productivity Drain

    We believe that enterprises that invest in consumerization and automation can gain a profound competitive advantage, delivering benefits that go far beyond simple cost savings. From what we have seen through this report, managers already strongly support this transformation – and are likely to be enthusiastic participants as enterprises embark...

  • Orange Business Services: A Telecom Business Reinvents Itself for the Cloud Era

    When your industry's revenue projections flatten, how can you break away and continue to grow? Learn how Orange Business Services leveraged NetApp storage to reinvent their company by becoming a cloud services provider and exceeded their revenue goals of zero to €500 million by 2015.

  • A Forrester Total Economic Impact Case Study

    Forrester Research conducted a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Polycom voice solutions for Microsoft Lync. Download this case study to understand the framework for evaluating the potential financial impact of Polycom voice solutions within their organizations....

View all case studies

  • Do your digital assets have real-world protection from advanced cyber-attacks?

    Intel Security has developed the world’s first software-based testing environment for advanced evasion techniques (AETs). With this free security tool, you can test your organization’s network security devices against AETs that are increasingly used in sophisticated and targeted cyberattacks: • Launch controlled AET-borne attacks at your own defense technology....

  • Get Intel INDE Professional Edition—Free

    Deliver high-performing, responsive applications fast with Intel Integrated Native Developer Experience (Intel INDE). Cross-architecture, cross-OS support: C++/Java tools for Android on ARM and Intel architecture, and Windows & OS X on Intel architecture. Get performance in less time: Code native applications, expose underlying architecture. IDE choice: Visual Studio,...

  • Cross-Platform Meets Native Performance

    Deliver high-performing, responsive applications fast with Intel Integrated Native Developer Experience (Intel INDE), a suite of tools, libraries, and IDE integration: Cross-architecture, cross-OS support: C++/Java tools for Android on ARM and Intel architecture, and Windows & OS X on Intel architecture. More performance, less time: Code native applications,...

  • Accelerate application performance

    Accelerate development and simplify debugging and tuning with Intel Parallel Studio XE 2015 Cluster Edition. Boost application performance: Faster, more accurate compiling with explicit vectorization, OpenMP 4.0 and MPI-3 support, parallel direct sparse solver, and scaling up to 150k processes. Increase portability with latest standards: Enhanced support for MPI-3,...

  • A New Kind of Defense: Application Self-Protection

    Today over 80% of successful security breaches target the application layer. However, what do you do for these inevitable vulnerabilities in production applications? For a long time, security teams have begun to shift their focus and budgets to address this application security challenge, yet new attacks continue to introduce application...

View all downloads