White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By IBM // Jul 2014

    Mobility is moving fast: Seven Questions that Prepare you for BYOD

    Are you ready for BYOD? For successful BYOD operations, organizations must address issues they may not have considered yet, but that can have significant consequences for business and IT operations. Here are seven questions you should answer as you roll out new mobile capabilities

  • Sponsored By Global Knowledge // Jul 2014

    Upgrading Your vCenter Server and ESXi Host to vSphere 5.5

    There are many issues and requirements to consider when you upgrade vCenter server and ESXi hosts to vSphere 5.5. The last thing you want is to have the upgrade fail or to encounter problems that you could have avoided with a little bit of research. This paper highlights the process,...

  • No topic

    Sponsored By Global Knowledge // Jul 2014

    Is Network Functions Virtualization (NFV) Moving Closer to Reality?

    Network Functions Virtualization (NFV) is gaining momentum along with Software-Defined Networking (SDN). This paper examines the history of NFV and explores the prospects for networking to gradually evolve from a hardware-centric approach to a software-driven model. It concludes with an examination of future market implications and how NFV can help...

  • Sponsored By Global Knowledge // Jul 2014

    Ensuring the Availability of Your IBM Tivoli Monitoring Infrastructure

    This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity. Although the principles are the same for each of these systems, the methods for adhering to these principles are different for each of them.

  • Sponsored By Global Knowledge // Jul 2014

    IaaS Public Clouds and the Perceived Security Threat

    Present concerns about cloud security are reminiscent of the fears in the 1980s of LANs and a highly distributed IT infrastructure, and they also echo the efforts in the 1990s to stop Internet usage at work. But the issue really isn't security; it's governance to ensure interoperability and portability. We...

  • Sponsored By Global Knowledge // Jul 2014

    SDN and Cloud Computing

    After a review of Software-Defined Networking (SDN) and its close cousin Network Functions Virtualization (NFV), this white paper addresses three main deployment scenarios: SDN without deploying cloud computing, cloud computing without deploying SDN, and deploying cloud computing in conjunction with SDN. We'll look at use cases, when the approach makes...

  • Sponsored By Fujitsu // Jul 2014

    A secure, scalable and cost-effective Cloud Platform

    This case study explores the challenges faced by Tickethour before to entering to the UK market, and the reasons that took them to consider a Cloud base solution that offered security and scalability while guaranteeing an ease use and efficient maintenance process.

  • Sponsored By Fujitsu // Jul 2014

    Case Study: Cloud Iaas implementation at Ajinomoto Co. Inc.

    This case study is exploring the benefits of a Cloud IaaS pay-per-use Model. Ajinomoto is a japanese organsation with activities in the food industry, they needed to decentralise the production and disaster recovery systems, while reducing costs and time with DR systems maintenance. Download this case to learn what was...

  • Sponsored By Fujitsu // Jul 2014

    Cloud Computing - Creating Value For Business Across the Globe: Frost & Sullivan Report

    The global cloud computing market is expected to reach approximately US$86 billion in 2016 from an estimated US$36 billion in 2013, growing at a compound annual growth rate of 33.4%. While SaaS continues to be the most popular cloud service offerings with users, IaaS is witnessing growing adoption and is...

  • Sponsored By IBM // Jul 2014

    Gartner Magic Quadrant for Enterprise Mobility Management Suites

    The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices. Check this Gartner Report Now!

  • Sponsored By IBM // Jul 2014

    Enterprise Mobility Management - The Big Bang Theory

    The universe of mobility is a complex thing, and it is ever expanding-much like our actual universe. The other mobility shares with our ever- expanding cosmos is the potential that can be realized through a rational, analytic, and comprehensive understanding.

  • Sponsored By IBM // Jul 2014

    Magic Quadrant for Enterprise Mobility Management Suites

    The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices. Check this Gartner Report Now!

  • Sponsored By F5 // Jul 2014

    Five Key Issues for DNS - The Next Network Management Challenge

    The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers).  Because every icon and URL and all embedded content on a website requires a DNS lookup loading complex sites necessitates...

  • Sponsored By F5 // Jul 2014

    Reducing Expenses Starts with the Programming Skills of Operations Groups

    Tools available today make it possible to significantly reduce the daily tasks that consume the time of IT operations groups like automation. And with today’s new cloud and SDN architectures being deployed or just on the horizon, automation is no longer just optional. No matter what we call it the...

  • Sponsored By F5 // Jul 2014

    Three Key Principles to Accelerating Web Applications

    Most organizations are concerned with the speed of their applications. Whether it involves an internal business application or a customer-facing shopping site, web application performance can have a huge impact on business performance. A faster-performing web application results in greater sales, better user engagement and improved productivity. The aim of...

  • Sponsored By F5 // Jul 2014

    Mitigating Multiple DDoS Attack Vectors

    Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture.  It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats.  Download this infographic...

  • Sponsored By HP // Jul 2014

    Accelerate ROI- HP IT Process Automation and Orchestration

    Explore this whitepaper to discover practical examples of how you can realise a rapid return on investment in your IT operations while providing CIO’s, IT managers and support teams a realistic roadmap for success.

  • Sponsored By HP // Jul 2014

    Enterprise-scale IT automation with a disciplined approach

    This report explores the benefits of IT process automation that supports the entire IT environment from traditional IT to cloud-based infrastructure operations. Read this info brief and learn how HP helped organisations reduce operational expenditure and improve service quality.

  • Sponsored By HP // Jul 2014

    The benefits of HP Operations Orchestration

    This info brief explores the benefits of automating the orchestration of processes such as incident management and service request fulfilment leading to a reduction in execution times of 50% or more, with fewer errors.

  • Sponsored By HP // Jul 2014

    Introduction to Operations Orchestration

    This video introduces HP’s Operations Orchestration software and shows how to build a very simple automation flow. Watch now and learn how easy it is to improve deployment time, manage scale, ensure consistency and increase the reliability of IT processes and workflows.