White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

  • Gartner: Magic Quadrant for Solid-State Arrays

    White Papers // Aug 2017 // provided by IBM

    Within the next 12 months, solid-state arrays will improve in performance by a factor of 10, and double in density and cost-effectiveness, therefore changing the dynamics of the storage market. This Magic Quadrant will help IT leaders better understand SSA vendors' positioning in the market.

    Find Out More
  • Deploy applications in minutes with Cisco UCS

    White Papers // Aug 2017 // provided by Cisco 

    Your business depends on applications, which means it's vital to have the right systems to support and optimise them. Discover how Cisco UCS can power your next wave of applications.

    Learn More
  • Considerations for the Next Phase of Hyperconverged Infrastructure

    White Papers // Aug 2017 // provided by Cisco 

    The hyperconverged infrastructure market has started to reshape IT infrastructure space. In the last few years it has been receiving a tremendous amount of attention from the market and customers who have already benefitted from its agility, efficiency and adaptability. Read more in the 451 Research report today.

    Read More
  • Big Data. Smaller costs.

    White Papers // Aug 2017 // provided by Cisco 

    Data is the foundation of digital business. Make the transformative power of Cisco’s Unified Computing System (UCS) Integrated Infrastructure for Big Data the foundation for the future of your business.

    Find Out More
  • Big Data & Analytics for Dummies

    White Papers // Aug 2017 // provided by Cisco 

    You don't need a PhD in statistics, machine learning, and data mining to know big data. Learn the fundamentals of big data.

    Learn More
  • Secure Clouds Are Happy Clouds

    White Papers // Aug 2017 // provided by Palo Alto Networks

    The adoption of public cloud for business critical applications is continuing at a rapid pace. How will you ensure that your existing security policy is extended to the public cloud? Visit the site to explore: How to achieve a comprehensive and holistic cloud security program. Common security obstacles ...

    Read More
  • Adobe Captivate for Windows - 32 Bit

    White Papers // Aug 2017 // provided by Adobe Systems

    The 2017 release of Adobe Captivate empowers you to leap ahead with a smart eLearning design platform that does the heavy lifting of creating responsive eLearning content. Reduce authoring time with all-new Fluid Boxes that use white space optimally to align objects automatically. Transform legacy Adobe Captivate non-mobile courses(created in ...

    Download Now
  • Adobe Captivate for Mac

    White Papers // Aug 2017 // provided by Adobe Systems

    The 2017 release of Adobe Captivate empowers you to leap ahead with a smart eLearning design platform that does the heavy lifting of creating responsive eLearning content. Reduce authoring time with all-new Fluid Boxes that use white space optimally to align objects automatically. Transform legacy Adobe Captivate non-mobile courses(created in ...

    Download Now
  • Adobe Captivate for Windows - 64 Bit

    White Papers // Aug 2017 // provided by Adobe Systems

    The 2017 release of Adobe Captivate empowers you to leap ahead with a smart eLearning design platform that does the heavy lifting of creating responsive eLearning content. Reduce authoring time with all-new Fluid Boxes that use white space optimally to align objects automatically. Transform legacy Adobe Captivate non-mobile courses(created in ...

    Download Now
  • Proactive Hunting: The Last Line of Defense Against the “Mega Breach”

    White Papers // Aug 2017 // provided by CrowdStrike

    The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint ...

    Download Now