White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By Eaton // May 2015

    Data center downtime: risk and cost avoidance through service

    Regular maintenance practices dramatically improve UPS reliability and performance while notably deterring downtime. This whitepaper outlines common risks and solutions for your data center.

  • Sponsored By Eaton // May 2015

    Understanding high-efficiency mode UPS return on investment

    This whitepaper shows precisely how and why using high-efficiency mode UPSs can yield savings significant enough to produce a 100 percent return on investment in as little as two years. In addition, utility incentives that are commonly available can provide significant benefit. It also discusses key features to look for...

  • Sponsored By Eaton // May 2015

    Powering Converged Infrastructures

    This whitepaper explores the factors that make converged infrastructures inherently resilient, explains why robust power protection is an essential element of successful converged infrastructure deployments and describes the critical hardware and software components companies must include when designing a converged infrastructure’s power protection scheme.

  • Sponsored By Eaton // May 2015

    Optimising your Infrastructure for Cloud Computing

    This report examines some of the forces behind rising adoption of cloud-based solutions, explores how cloud architectures impact data centres and discusses a series of concrete practices and technologies that can help companies collect the benefits of cloud computing without compromising uptime or overwhelming their power and cooling systems.

  • Sponsored By NetSuite AU // May 2015

    Frost & Sullivan Research: Mobility: The New Opportunity for Australia's Retailers

    Two out of every three Australians now have a Smartphone and one facet, among the many, of everyday life that smartphones are impacting is the shopping process. This white paper therefore describes how consumers are using smartphones as a key part of the shopping process, and how Australia’s retailers are...

  • Sponsored By Hewlett-Packard (HP) // May 2015

    HP ArcSight Logger Data Sheet

    Collect logs and machine data from any device, vendor and source with broadest set of data collection comprehensively at high speeds. To learn more, read the data sheet.

  • Sponsored By Hewlett-Packard (HP) // May 2015

    HP Logger Trial at no charge

    With HP Logger you can improve everything from IT operations, compliance and risk management to security intelligence. This universal log management solution collects machine data from any log-generating source and unifies the data for searching, indexing, reporting, analysis, and retention. HP Logger can be used by organizations of any size...

  • Sponsored By Hewlett-Packard (HP) // May 2015

    How to install HP Logger in 2 hours to provide immediate reports

    HP Logger collects information from any system that generates log data. It can process that information as much or as little as desired, and can produce ultra-fast searching across the data.

  • Sponsored By Hewlett-Packard (HP) // May 2015

    HP Logger Log Management Industry Use Cases

    Using HP Logger to perform forensics on your event log data and syslog data greatly reduces the time it takes to identify an intruder and take action.

  • Sponsored By IBM // May 2015

    Big Data, Big Impact on Procurement : Find Out How Procurement’s Leaders Gain the Edge

    Leveraging big data is a key differentiator for high-performing procurement organizations, as detailed in IBM's Chief Procurement Officer Study released in December 2014. Watch this webinar to learn how you can gain the benefits of in-depth insights that big data can provide.

  • Sponsored By IBM // May 2015

    Infographic: The Journey to Value:Transforming procurement to drive the enterprise agenda

    Inforgraphic highlighting the results of the IBM IBV Chief Procurement Officers (CPO) Study based on a survey of more than 1000 senior procurement executive at Global 2000 companies.

  • Sponsored By IBM // May 2015

    IBM 2014 Chief Procurement Officer (CPO) Study

    The IBM 2014 Chief Procurement Officer (CPO) Study provides insights into best-in-class procurement organizations, and their demonstrated ability to drive strategic value beyond the supply chain for their companies, boosting innovation and revenue growth.

  • Sponsored By Intel & Red Hat // May 2015

    Transforming the Cloud Data Centre

    This report will explore how organisations today are driving greater performance and lower the TCO of enterprise and cloud data centres. With more than a decade working together, Red Hat software and Intel architecture share their insights on getting the most out of your organisation's cloud Infrastructure.

  • Sponsored By Intel & Red Hat // May 2015

    Step-by-Step Configuration Guide

    Security is a major concern for IT professionals when think about the implementation of cloud computing solutions. In overcoming those concerns and enabling the hosting of all workloads, including those that depend on sensitive information, robust security mechanisms play a vital role. Intel and Red Hat come together to provide...

  • Sponsored By Intel Security // May 2015

    Seven Reasons Why McAfee Enterprise Security Is Your Best Choice for Microsoft Windows 8

    McAfee® Enterprise Security—now a part of Intel® Security—is your best choice for Microsoft Windows 8, as Windows 8 offers an extensive array of features as well as improved performance and security. Let’s explore the seven reasons why McAfee is your best choice to secure Windows 8.

  • Sponsored By Intel Security // May 2015

    Protecting Against Mobile App SSL Vulnerabilities

    In these days of “there’s an app for that” and the excitement that goes along with new, groundbreaking mobile app ideas, users rarely think about the ways in which mobile apps may be exposing sensitive information to man-in-the-middle (MITM) attacks—and, as a result, breaking the trust held in these supposedly...

  • Sponsored By Dell Software // May 2015

    Ten Sneaky Things a Spammer Will Do

    Spam will continue to plague Inboxes until it is no longer profitable for the spammer or there is a hack-proof method of prevention that is easy to use. Read this ebook and learn the techniques spammers employ to reach their target audience, and discover the solutions that can help protect...

  • Sponsored By Dell Software // May 2015

    Phishing: When Email is the Enemy

    Assuming your employees or spam filter can detect the difference between legitimate emails and phishing scams is not enough. Discover the challenges of staying ahead of phishing and learn a framework to incorporate anti-phishing actions into your existing security processes.

  • Sponsored By Dell Software // May 2015

    Best Practices Checklist: Email Security Cloud and Virtual Migration

    Looking for best practices to ensure a secure email for cloud and virtual migration? If you are considering migrating email security to the cloud, read this paper and discover best practices for planning and executing an email security migration that minimizes the risk of business disruption.

  • Sponsored By Macquarie Telecom Australia // May 2015

    Disaster Avoidance vs Disaster Recovery

    Disaster Avoidance (DA) and Disaster Recovery (DR) are both critical elements of a general disaster-coping strategy.This paper explores the difference between the two and what each can do to prepare companies for disaster. This report explores such topics as: Why is disaster preparedness important? Stopping disasters before they start Which...