White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By Dell and Intel® // Mar 2015

    Developing a new user agreement for BYOPC programs

    Many organizations are implementing bring-your-own-device (BYOD) or bring-your-own-PC (BYOPC) programs to increase work flexibility, improve employee productivity and reduce enterprise costs. Before your organization allows employees to use personally owned laptops, tablets or smartphones for work, consider how these programs will affect corporate privacy, data protection and e-discovery policies. ...

  • Sponsored By Dell and Intel® // Mar 2015

    Critical Factors to Endpoint Security

    The modern threatscape of today is very different from the one that existed even five years ago in that organized crime and government operatives are aggressively funding, organizing and building significant offensive capabilities all focused on generating revenue or gaining a competitive advantage in the global economy. “Crimeware” can be...

  • Sponsored By Dell and Intel® // Mar 2015

    Mobile Devices in Education

    Many K-12 school districts and institutions of higher learning are embracing the reality of increased mobile device usage and bring your own device (BYOD) initiatives on their campuses, and the impact this will have on IT. This paper outlines an approach that Dell has developed and tested to meet the...

  • Sponsored By Dell and Intel® // Mar 2015

    Implementing mobility/BYOD programs while maintaining regulatory compliance

    Organisations are readily launching bring-your-own-device (BYOD) programs to boost employee productivity and reduce costs. To maximize mobile flexibility for employees without jeopardizing compliance, reevaluate your mobile strategy. Adopt best practices that can help you successfully deploy — or expand — a BYOD program while remaining compliant with regulations. Make sure...

  • Sponsored By Dell and Intel® // Mar 2015

    Accelerating applications and virtual desktops with GPUs

    The performance demands of visual and high-performance computing call for a powerful engine to keep pace. Dell computers use NVIDIA® graphics processors to enhance business and scientific processing as well as the virtual desktop user experience. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel...

  • Sponsored By Dell and Intel® // Mar 2015

    Mobile Devices in the Enterprise:A Comprehensive Management Approach

    Many organizations are embracing the reality of increased mobile devices and bring your own device (BYOD) initiatives, and the impact this will have on IT. This paper outlines an approach that Dell has developed and tested to meet the unique needs of the enterprise. Ultrabook, Celeron, Celeron Inside,...

  • Sponsored By Dell and Intel® // Mar 2015

    Agile security for the mobile workforce

    Flexible, end-to-end security enables enterprises to speed adoption of transformative technologies for a competitive edge. Best-practice deployments help deliver on the business promise of mobility with integrated protection throughout the workplace. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel...

  • Sponsored By Dell and Intel® // Mar 2015

    Mobility: Going your way

    Constant connectivity is the new norm — causing a shift in worker expectations that may not align with enterprise requirements. An effective mobility strategy empowers users and improves business performance without compromising essential IT controls. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom...

  • Sponsored By Dell and Intel® // Mar 2015

    Nine Conversations for Successful BYOD Decision Making

    In recent years, BYOD in the business world has taken on a new aspect: that of mobile devices, particularly driven by the popularity of tablets and SmartPhones. In the last four decades, educational systems have frequently attempted to adopt trends in business to the educational process. The BYOD trend is...

  • 4G

    Sponsored By Dell and Intel® // Mar 2015

    Seamless cellular connectivity: A new freedom for mobile workers

    The mobile workforce needs dependable, high-speed network connectivity to get the job done. Refreshing client fleets with built-in 4G LTE technology lets employees take the internet with them — boosting flexibility, productivity and cost-efficiency. This report will examine the greater flexibility and efficiency granted by the emerging high-speed connection capabilities...

  • Sponsored By Dell and Intel® // Mar 2015

    Transforming mobility management through a unified approach

    As the mobile workplace and the nature of business itself continue to evolve, IT teams must support a multiplicity of devices, operating systems and work habits. Dell Enterprise Mobility Management helps simplify administration and secure vital data. In this report you will learn how it is being done. ...

  • Sponsored By Google for Work // Mar 2015

    The Evolving Role of the CIO - A Google for Work Collection (Spanish)

    Mobility and the cloud rank as the most critical technologies in the workplace today. They also transform the role of the CIO as IT becomes a strategic partner in the business and shifts from enforcer to enabler. In this Google for Work collection, we harness the collective experience of Google’s...

  • Sponsored By Google for Work // Mar 2015

    The Art and Science of Delighting Customers - A Google for Work Collection (Spanish)

    Cloud-based tools are helping organizations with both strategic business challenges and daily operations. They spur growth, innovate culture, engage the workforce and help put customers at the forefront of all business decisions. In this Google for Work Collection, we’ll share how technology is driving leadership, and how innovative companies are...

  • Sponsored By Cisco Systems // Mar 2015

    Cisco Annual Security Report 2015

    Despite advances by the security industry, criminals continue to evolve their approaches to break through security defenses. New threat intelligence and trend analysis in the Cisco 2015 Annual Security Report show that attackers are realizing that bigger and bolder are not always better. Understand how attackers are using gaps between...

  • Sponsored By Cisco Systems // Mar 2015

    Frost Industry Quotient - Asia- Pacific Network Firewall Vendors 2014

    A new paradigm shift in IT security is starting to emerge as enterprises begin to accept the possibility that their organizations may be breached, even after they have invested significantly in security technologies to prevent such incidents from happening. As a result, more enterprises are looking beyond a preventive approach,...

  • Sponsored By Cisco Systems // Mar 2015

    Continuous Endpoint Threat Detection and Response in a Point-in-Time World

    The only way to defeat today’s security threats is to address them holistically across the full attack continuum - before, during, and after an attack. Cisco’s approach of continuous endpoint analysis in combination with a big data architecture is foundational to this model. Our innovations in advanced malware protection include:...

  • Sponsored By Cisco Systems // Mar 2015

    IDC Brief - Assessing the Business Value of the Secured Datacenter

    With recent high-profile breaches at some of the largest retailers and financial institutions worldwide, there has been an increase in awareness, rising to the executive and even board levels. This IDC Brief explores the shift to "3rd Platform" era which is built on a foundation of mobile, social, Big Data,...

  • Sponsored By Trend Micro // Mar 2015

    Visibility into data center security and operations management with Trend Micro and VMware

    VMware and Trend Micro have partnered to deliver the first security and operations management solution designed for virtualized environments. Read More..

  • Sponsored By Trend Micro // Mar 2015

    Optimized security for the modern data center

    Virtualization and cloud computing can help your organization achieve significant savings in data center hardware costs, operational expenditures, and energy demands whilst achieving improvements in quality of service and business agility. Read More..

  • Sponsored By CA Technologies // Mar 2015

    Greater Strategic Effectiveness through Perpetual Planning

    Businesses face volatility everywhere they look. Increasing globalization is a major factor, with economic and environmental issues in one part of the world readily impacting supply and demand elsewhere. Making a successful shift to perpetual planning helps employees bridge the gap between innovation and your ability to support related efforts....