White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By LogMeIn // Jan 2015

    TSIA 2014 Report: The State of Support Services

    Looking back at 2014 and the major changes in support services, TSIA identifies what they see as the ‘New World for B4B’. With companies around the world making changes to the way they are structured and how they operate. What new capabilities will be added to the arsenal of support...

  • Sponsored By LogMeIn // Jan 2015

    Harvard Business Review: The Truth about Customer Experience

    While Companies often focus on the individual interactions with their customers to ensure that they are satisfied with the service provided to them in that interaction, the companies can often fall sort when looking at the at the complete journey of that customer on their way to purchase and beyond....

  • Sponsored By LogMeIn // Jan 2015

    TSIA 2014 Remote Support Trends

    Based on information gathered in TSIA’s annual Global Technology Survey, this report will look and the trend of remote support services being adopted over many different industry types. Through the continued improvement of remote control, desktop sharing and web collaboration, companies are able to use these capabilities to increase productivity...

  • Sponsored By LogMeIn // Jan 2015

    Selecting the Right Remote Support Solution Tool for your company

    This provides an overview of all the questions that need to be asked when looking at your companies help desk. How to maintain flexibility, simplicity, lower costs while ensuring that your remote support solution allows your support agents to perform advance support task quickly and across multiple platforms and devices....

  • Sponsored By IBM // Jan 2015

    Putting Mobile First: Best Practices of Mobile Technology Leaders - Japanese

    Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how...

  • Sponsored By IBM // Jan 2015

    IT Mobile Worksyle Innovation - Japanese

    Download this resource and learn how the Mobile IT environment have change in the last years.

  • Sponsored By Symantec // Jan 2015

    Datasheet: Symantec™ Email Security.Cloud

    Symantec™ Email Security.cloud filters unwanted messages and protects mailboxes from targeted attacks. The Email Security SLA provides an aggressive set of metrics to protect corporate data. Symantec™ Email Security.cloud provides various features like: • Cloud Security Platform • Email Antivirus and Email Antispam • Email Data Protection • Email Image...

  • Sponsored By HP // Jan 2015

    Grow your small or midsize business with a scalable network

    Small and midsize businesses need a robust, scalable network capable of handling any workload securely and reliably. It's critical to select network switches, routers, and wireless access points with the capabilities needed for today's traffic and tomorrow's growth, including mobile and BYOD computing. As part of HP’s Just Right IT...

  • Sponsored By HP // Jan 2015

    Re-architect your network for BYOD

    This whitepaper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks. Download now and find out how a re-architected network- flexible and scalable- makes BYOD easier to secure and manage, yet...

  • Sponsored By HP // Jan 2015

    Magic Quadrant for Deduplication Backup Target Appliances

    Deduplication backup target appliances have played an instrumental role in reducing or eliminating tape for backup. This research will help storage professionals shortlist 11 vendors that offer such solutions.

  • Sponsored By HP // Jan 2015

    Questions to Consider When Selecting an All-Flash Array

    All-flash arrays have become one of the top choices for improving storage, but with so many options out there it can be difficult to choose the right solution to fit your organisational needs. This exclusive whitepaper breaks the process down into four major categories such as performance, resiliency, efficiency, and...

  • Sponsored By IBM // Jan 2015

    Forrester Report: Bring ROI to your BYOD - Japanese

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program.

  • IBM

    Sponsored By IBM // Jan 2015

    Forrester Engage Audit Professionals For Better Security Assessment Outcomes

    Read this report from Forrester Research to learn how to take advantage of your internal audit team's resources and expertise to develop a more efficient, sustainable compliance program. Read More..

  • IBM

    Sponsored By IBM // Jan 2015

    Extreme File Transfer: Bigger, Faster, Farther

    Read this e-book from Aberdeen Group to learn about extreme file transfer, and discover the solutions that can help you send information faster, enable worldwide access, and automate workflows to drive seamless file transfer. Read More..

  • Sponsored By Symantec // Jan 2015

    Raise your Google Ranking with Symantec

    Google is becoming more sophisticated and ultimately more humanlike with every new release. Search Engine Optimization (SEO) techniques should be balanced with good user experience if they’re to form part of your business’ long term search strategy. This guide from Symantec will give you all the tips on how to...

  • Sponsored By Symantec // Jan 2015

    Always On SSL - Symantec Guide

    Online attacks are becoming more frequent and increasingly easy to execute. Organisations around the world are under increasing scrutiny, to ensure online transactions involving confidential data are secure. Take your organisation’s security to the next level with Always On SSL.

  • IBM

    Sponsored By IBM // Jan 2015

    Using BlueMix to Develop Mobile Applications - Building an Android App using MobileData Cloud

    This webcast focuses on building an Android application using the MobileData service. Walk-through the real process and workflow used to build and link the MobileData service within your application. Download Now..

  • IBM

    Sponsored By IBM // Jan 2015

    Bluemix Mobile Quality Assurance: Continuous Quality for Mobile Apps - Reduce Your Time-to-Feedback

    Join us for this webcast to learn about how IBM offers a solution that enables our clients to use continuous quality as an effective means of mobile application development. Watch Now..

  • IBM

    Sponsored By IBM // Jan 2015

    IBM InfoSphere Guardium Vulnerability Assessment

    IBM InfoSphere® Guardium® Vulnerability Assessment helps harden database infrastructures. It detects vulnerabilities and identifies threats and security holes in databases or the underlying operating system which could be exploited by intruders and hackers. Read More..

  • IBM

    Sponsored By IBM // Jan 2015

    Understanding Holistic Database Security

    This paper outlines 8 essential best practices that provide a holistic approach to safeguarding data from breaches and achieving compliance across distributed enterprise databases, data warehouses, file shares and Hadoop-based big data environments. Read More..