White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By IBM // Jul 2015

    Big Data - Why Transaction Data is Mission Critical to Success: Intelligent Business Solutions Report

    Analyst Mike Ferguson of Intelligent Business Strategies writes about the enhanced role of transactional DBMS systems in today's world of Big Data. Learn more about how Big Data provides richer transactional data and how that data is captured and analyzed to meet tomorrow’s business needs. Access the report now.

  • Sponsored By Cisco Systems // Jul 2015

    Cisco 2015 Midyear Security Report

    As adversaries rapidly refine their ability to develop and deploy malware that can breach network defenses and evade detection, the security industry, as a whole, struggles to innovate at a similar pace. This dynamic creates a significant problem for organizations investing in security products and services: They often end up...

  • Sponsored By IBM // Jul 2015

    IDC White Paper: Affordable, Scalable, Reliable OLTP in a Cloud and Big Data World - IBM DB2 PureScale

    This white paper discusses the concept of shared data scale-out clusters, as well as how they deliver continuous availability and why they are important for delivering scalable transaction processing support. It also contrasts this approach, taken in a relational database context, with clustering approaches employed by NoSQL databases and Hadoop...

  • Sponsored By IBM // Jul 2015

    How to use Embedded Database and Streaming Analytics for Value - Internet of things Data

    The Internet of Things is driven by consumer demand for new services and convenience, as well as by the availability of low cost sensors smart phones, and universal internet access, offering tremendous growth opportunities and new revenue streams. New technologies can enable you to take advantage of this new natural...

  • Sponsored By Hewlett-Packard (HP) // Jul 2015

    Five Imperatives for a big data platform

    Organizations of all sizes face a common set of challenges brought by an onslaught of big data. Architectures are outdated, the flood of data is increasingly diverse, and technology choices have proliferated, resulting in a growing gap between human information and technology. What’s needed is a new approach to the...

  • Sponsored By APC by Schneider Electric // Jul 2015

    Magic Quadrant for Data Centre Infrastructure Management Tools

    Gartner defines the data centre infrastructure management (DCIM) tool market as a space that encompasses tools that monitor, measure, manage and control data centre resources and energy consumption of: • IT-related components, such as servers, storage and network switches • Facilities infrastructure components, such as power distribution units (PDUs) and...

  • Sponsored By Dell // Jul 2015

    Dell Resources Page 2015

    This catalogue of Dell resources offers advice, expertise and best practice to help your business grow and develop. Find the topic area of interest below and download the asset for review. Resources include case studies, whitepapers and eGuides. Visit this site to find all your Dell Information in one place

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization (French)

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization (German)

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - The New Reality of Mac in Business (French)

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - The New Reality of Mac in Business

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

  • Sponsored By Symantec // Jul 2015

    The Evolution of Data Privacy (Spanish)

    Today most organizations handle personal, and other sensitive information. The GDPR will force businesses to take precautions in processing personal data to a new level. It will pay to remember for which data you are Data Controller and Data Processor, bearing in mind you may be both.

  • Sponsored By Symantec // Jul 2015

    The Evolution of Data Privacy (Italian)

    Today most organizations handle personal, and other sensitive information. The GDPR will force businesses to take precautions in processing personal data to a new level. It will pay to remember for which data you are Data Controller and Data Processor, bearing in mind you may be both. Read More..

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - Apple Native Security

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - The New Reality of Mac in Business (German)

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - Apple Native Security (German)

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - Apple Native Security (French)

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

  • Sponsored By Symantec // Jul 2015

    Symantec: Internet Security Threat Report 2015 (Dutch)

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..

  • Sponsored By Symantec // Jul 2015

    Symantec: Internet Security Threat Report 2015 (Spanish)

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..