White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By IBM // Jul 2015

    How to use Embedded Database and Streaming Analytics for Value - Internet of things Data

    The Internet of Things is driven by consumer demand for new services and convenience, as well as by the availability of low cost sensors smart phones, and universal internet access, offering tremendous growth opportunities and new revenue streams. New technologies can enable you to take advantage of this new natural...

  • Sponsored By Cisco Systems // Jul 2015

    The Cisco 2015 Midyear Security Report

    As adversaries rapidly refine their ability to develop and deploy malware that can breach network defences and evade detection, the security industry, as a whole, struggles to innovate at a similar pace. This dynamic creates a significant problem for organizations investing in security products and services: They often end up...

  • Sponsored By IBM // Jul 2015

    Big Data - Why Transaction Data is Mission Critical to Success: Intelligent Business Solutions Report

    Analyst Mike Ferguson of Intelligent Business Strategies writes about the enhanced role of transactional DBMS systems in today's world of Big Data. Learn more about how Big Data provides richer transactional data and how that data is captured and analyzed to meet tomorrow’s business needs. Access the report now.

  • Sponsored By IBM // Jul 2015

    IDC White Paper: Affordable, Scalable, Reliable OLTP in a Cloud and Big Data World - IBM DB2 PureScale

    This white paper discusses the concept of shared data scale-out clusters, as well as how they deliver continuous availability and why they are important for delivering scalable transaction processing support. It also contrasts this approach, taken in a relational database context, with clustering approaches employed by NoSQL databases and Hadoop...

  • Sponsored By IBM // Jul 2015

    Redefining networks for cloud, analytics, mobile, social and security - New technologies are pushing networks to the breaking point (Japanese)

    This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.

  • Sponsored By Symantec // Jul 2015

    The Hidden Costs of Self-Signed SSL Certificates ( French)

    Download this white paper, The Hidden Costs of Self-Signed Certificates, to read about the true total cost of ownership for self-signed SSL, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. You'll also learn about risk factors such as how self-signed certificates can increase...

  • Sponsored By Symantec // Jul 2015

    The Hidden Costs Of Self-Signed SSL Certificate (German)

    Download this white paper, The Hidden Costs of Self-Signed Certificates, to read about the true total cost of ownership for self-signed SSL, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. You'll also learn about risk factors such as how self-signed certificates can increase...

  • Sponsored By Symantec // Jul 2015

    Feeling Vulnerable? You Should Be. ( Portuguese )

    In an information vacuum, it’s hardly surprising that IT managers rate their likelihood of suffering various vulnerabilities as low. With over half of respondents never having conducted vulnerability assessments, they can only guess at the likelihood of their websites suffering from different vulnerabilities

  • Sponsored By Plantronics // Jul 2015

    Communication Trends Of Business Professionals

    The Plantronics study, “How We Work: Communication Trends of Business Professionals” confirms that business has never had more to say or more ways in which to say it. Working with colleagues across borders and time zones, in businesses fueled by ideas rather than automation, professionals are certainly putting all these...

  • Sponsored By Hewlett-Packard (HP) // Jul 2015

    Five Imperatives for a big data platform

    Organizations of all sizes face a common set of challenges brought by an onslaught of big data. Architectures are outdated, the flood of data is increasingly diverse, and technology choices have proliferated, resulting in a growing gap between human information and technology. What’s needed is a new approach to the...

  • Sponsored By Dell // Jul 2015

    Dell Resources Page 2015

    This catalogue of Dell resources offers advice, expertise and best practice to help your business grow and develop. Find the topic area of interest below and download the asset for review. Resources include case studies, whitepapers and eGuides. Visit this site to find all your Dell Information in one place

  • Sponsored By APC by Schneider Electric // Jul 2015

    Magic Quadrant for Data Centre Infrastructure Management Tools

    Gartner defines the data centre infrastructure management (DCIM) tool market as a space that encompasses tools that monitor, measure, manage and control data centre resources and energy consumption of: • IT-related components, such as servers, storage and network switches • Facilities infrastructure components, such as power distribution units (PDUs) and...

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization (French)

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization (German)

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - The New Reality of Mac in Business (French)

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - The New Reality of Mac in Business

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

  • Sponsored By Symantec // Jul 2015

    The Evolution of Data Privacy (Spanish)

    Today most organizations handle personal, and other sensitive information. The GDPR will force businesses to take precautions in processing personal data to a new level. It will pay to remember for which data you are Data Controller and Data Processor, bearing in mind you may be both.

  • Sponsored By Symantec // Jul 2015

    The Evolution of Data Privacy (Italian)

    Today most organizations handle personal, and other sensitive information. The GDPR will force businesses to take precautions in processing personal data to a new level. It will pay to remember for which data you are Data Controller and Data Processor, bearing in mind you may be both. Read More..

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - Apple Native Security

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...