White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By NetApp // Mar 2015

    NetApp FAS2500 Series: Delivering best-in-class value and capability

    NetApp FAS2500 hybrid storage arrays provide more value for your money than any other systems in their class. FAS2500 simplifies the task of managing growth in house and in the cloud by providing support for a broader range of workloads along with seamless scaling of performance and capacity. Read the...

  • Sponsored By NetApp // Mar 2015

    IDC: The Business Benefits of Unified Storage

    Data storage in the corporate environment has become increasingly complex. IT leaders face significant challenges in effectively storing and managing data. This report takes a detailed look into the challenges of data storage and examines how NetApp offers the capabilities that can benefit businesses and maximise efficiency.

  • Sponsored By Intel Security McAfee // Feb 2015

    25 years of Firewall. What's Next?

    Over the past 25 years Firewalls have evolved to become one of the must-have cyber security solutions of today. But, are they ready to deal with the security threats of the next 25 years? Join James Turner, Senior Advisor and IT Security Analyst at IBRS Australia, and examine the new...

  • Sponsored By Brother // Feb 2015

    DON'T SUPERSIZE. OPTIMIZE. Is your printing solution too big?

    With all the new and exciting digital technologies on the market, it can be easy for IT departments to forget about more established elements of their infrastructure, such as printers, multifunction printers (MFPs), and document management systems. Nevertheless, it is important that they continually evaluate all aspects of their IT...

  • Sponsored By Box // Feb 2015

    An Alternative to Today’s Distributed Content Security Chaos

    Many enterprise organizations have sensitive files stored cross the enterprise using a variety of technologies and security controls. As bad as this is, environments are actually getting worse as today's complex IT architecture is expanded with cloud and mobile computing. Addressing this problem with status quo solutions won't work, so...

  • Sponsored By Box // Feb 2015

    Splunk Boosts Day-to-Day Operational Intelligence, Secures its IP with Box

    Known for extracting meaning and 'operational intelligence' out of mountains of customer machine data, San Francisco-based Splunk knew it had a challenge. The big data software company needed a better and more secure way to track its intellectual property (IP). Previously, Splunk's documents were stored in several consumer cloud services....

  • Sponsored By Box // Feb 2015

    Securing Business Information in the Cloud

    Since the rise of the client-server model, IT has steadily moved from a centralized computing model to a highly decentralized one. This shift has dramatically accelerated in the last several years, fueled by mobility, cloud services and service-oriented platforms. This has created immense value for IT and end users, but...

  • Sponsored By Zerto // Feb 2015

    A comparison of Hypervisor-based Replication vs. Current and Legacy BC/DR Technologies

    Zerto’s innovative, hypervisor-based replication is a new technology developed to provide a true enterprise-class, yet fully virtual-aware BC/DR solution to protect virtualised, mission-critical applications. This document outlines the fundamental differences between Zerto’s hypervisor-based replication and other current and legacy technologies.

  • Sponsored By Zerto // Feb 2015

    Mission-Critical Disaster Recovery in the Virtual World

    Enterprise App virtualisation is no longer an emerging technology. Enterprises of all sizes are deploying applications on virtualised IT infrastructures and clouds, and reaping the benefits of ease of management, simplicity, mobility, and cost-effectiveness. But there’s a speed bump on the virtualisation highway. Traditional replication and DR solutions were not...

  • Sponsored By Zerto // Feb 2015

    Protect Applications, Not Just Data – BC/DR for Virtualised Applications

    When organisations are considering a disaster recovery strategy, they look for a solution that not only protects and recovers data, but also provides application consistency. Learn how Zerto enables automated replication and recovery with application awareness to align with the business’ needs – application protection and availability. Download this resource...

  • Sponsored By NetApp // Feb 2015

    The Cost Advantages of NetApp FlexPod Datacenter with VMware

    This whitepaper focuses on the NetApp FlexPod Datacenter offering. It compares NetApp’s capabilities to both VCE and EMC at a high level as well as demonstrating value via the Total Cost of Acquisition (TCA) and Total Cost of Ownership (TCO) analyses.

  • Sponsored By NetApp // Feb 2015

    ESG Report: Extending the Data Center to the Cloud

    This ESG whitepaper was commissioned by NetApp discusses that 41% of ESG research respondents reported that the cloud enabled them to realise IT cost reductions with 26% seeing improvements in productivity. Learn how you can achieve these benefits by reviewing common IT scenarios detailed in private and hybrid cloud, data...

  • Sponsored By NetApp // Feb 2015

    Forrester Report: Cloud Management in a Hybrid Cloud World

    In this report, it explains how the Infrastructure and Operations role changes in a hybrid cloud world, how I&O professionals need to accelerate the cloud application delivery life cycle to exceed business expectations of cloud, and which cloud management capabilities I&O must master to take on the role of hybrid...

  • Sponsored By Dell Software // Feb 2015

    Data Protection : Quality Plus Fast ROI

    Too many organizations today struggle with backup and recovery solutions that not only fail in their primary mission of reducing the risk of data loss but also cost far too much. Find out how Dell Data Protection from Dell Software can help deliver a sound return on investment, while dramatically...

  • Sponsored By Workday // Feb 2015

    The Freedom to Run Your Business Your Way

    Workday is responsible for maintaining the core application so that customer IT staff do not have to get involved. Traditionally, IT costs more than it earns, undermining company profits rather than contributing to them. If IT professionals spend more time advancing the organisation’s mission, they do more than help trim...

  • IBM

    Sponsored By IBM // Feb 2015

    Power Systems Cloud Infographic

    A company that is looking to get ahead must take every possible advantage. And today, that means creating a comprehensive cloud strategy that let’s you focus on performance and efficiency—without sacrificing security.

  • Sponsored By IBM // Feb 2015

    Big Data without the Big Bang or Bucks (Gabriel Consulting)

    While some organizations are already utilizing Big Data or various large enterprise analytics techniques, many more are still working to grasp how these new usage models might help them. There’s a lot of undiscovered value in the vast amounts of data they currently have and the data that they can...

  • IBM

    Sponsored By IBM // Feb 2015

    Introduction to Enabling and Developing Java applications on PowerLinux Servers - a PowerLinux whitepaper

    This paper introduces IBM Java on the IBM PowerLinux 7R2 server and describes IBM's implementation of the Java platform, which includes IBM's Java Virtual Machine and development toolkit.

  • IBM

    Sponsored By IBM // Feb 2015

    IBM Power Systems Solution Edition for Scale-Out Cloud

    IBM Solution Edition for Scale-Out Cloud is a customizable offering built on POWER8 systems with software based on OpenStack, along with optional implementation services to quickly and easily deploy a cloud.

  • IBM

    Sponsored By IBM // Feb 2015

    IDC Whitepaper: Innov. To Power Systems for Virtualization, multi-tenancy & Cloud demands of the 3rd platform

    This IDC paper explores the transformational challenges created by Big Data, cloud, and mobile and offers insight on how POWER is designed to address these new business as it integrates core business applications and new, 3rd platform applications.