White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By IBM // Jul 2014

    Magic Quadrant for Enterprise Mobility Management Suites

    The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices. Check this Gartner Report Now!

  • Sponsored By F5 // Jul 2014

    Five Key Issues for DNS - The Next Network Management Challenge

    The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers).  Because every icon and URL and all embedded content on a website requires a DNS lookup loading complex sites necessitates...

  • Sponsored By F5 // Jul 2014

    Reducing Expenses Starts with the Programming Skills of Operations Groups

    Tools available today make it possible to significantly reduce the daily tasks that consume the time of IT operations groups like automation. And with today’s new cloud and SDN architectures being deployed or just on the horizon, automation is no longer just optional. No matter what we call it the...

  • Sponsored By F5 // Jul 2014

    Three Key Principles to Accelerating Web Applications

    Most organizations are concerned with the speed of their applications. Whether it involves an internal business application or a customer-facing shopping site, web application performance can have a huge impact on business performance. A faster-performing web application results in greater sales, better user engagement and improved productivity. The aim of...

  • Sponsored By F5 // Jul 2014

    Mitigating Multiple DDoS Attack Vectors

    Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture.  It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats.  Download this infographic...

  • Sponsored By Level 3 Communications // Jul 2014

    Enhancing Cloud Connectivity For Optimal Application Performance

    Increasing dependence on Cloud-based applications hosted in distant data centres makes the quality of backbone networks connecting them increasingly critical. Network quality between Cloud providers and end-users in fact widely varies, and chronically threatens application performance. Differences in carrier network design become more significant as dependence on the Cloud intensifies....

  • Sponsored By Coverity // Jul 2014

    Development Testing for Java

    Learn how the Coverity Development Testing Platform can be used in conjunction with open source solutions to help you fix more of the quality and security issues in your Java code that matter, with your existing resources and a unified process across the enterprise.

  • Sponsored By Coverity // Jul 2014

    Development Testing for Agile Enterprises

    Companies need to get their products to market faster to remain competitive and capitalize on market opportunity. Learn how the Coverity platform seamlessly integrates with Agile development methodologies and tools to help maximize development efficiencies.

  • Sponsored By Coverity // Jul 2014

    Transforming Testing Through Automation

    "Test your code as you write it." That’s a common mantra heard in many development teams today. However, for too many, that practice remains a lofty goal as opposed to a business reality. They lack the appropriate metrics and processes to make and measure progress and often underestimate the effort...

  • Sponsored By Imperva // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

  • Sponsored By Imperva // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

  • Sponsored By Imperva // Jul 2014

    Protect Your Critical Web Applications with Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

  • Sponsored By Imperva // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

  • Sponsored By IBM // Jul 2014

    Introducing Social Business for the Mid-Market.

    Aberdeen has studied the business practices of 229 mid-sized companies surveyed for the 2011 Aberdeen Business Review and 61 mid-sized companies profiled in Aberdeen's 2011 Social Collaboration Research. Mid-market organization can achieve strategic benefits from optimizing their Social Business deployments and achieving Best-in-Class status. This report provides directional guidance for...

  • Sponsored By IBM // Jul 2014

    Three capabilities to fuel today’s dynamic planning and forecasting

    Today’s economy is widely characterized by skittishness and uncertainty about the future. The effect that unpredictable external forces can have on the economy can leave many business leaders feeling helpless. This fact was demonstrated in the IBM Global CFO Study, where many CFOs admitted that they lacked the ability to...

  • Sponsored By IBM // Jul 2014

    The Big Data Zoo—Taming the Beasts

    With so much talk about big data and the possibilities it can offer, the truth behind what big data is—and what it can do for businesses—can be hard to determine. However, according to Dr. Barry Devlin of 9sight Consulting, the truth behind all the talk is not hard to see,...

  • Sponsored By IBM // Jul 2014

    IDC Report: The Future of eMail is Social

    This IDC white paper looks at the current state of enterprise email and perceived and real problems that surround its use. The paper discusses the changing nature of collaboration and work fueled by the social web by examining email trends and the emergence of new social collaboration tools. It reveals...

  • Sponsored By IBM // Jul 2014

    The business of social business.

    A new IBM Institute for Business Value study reveals how organizations can use social approaches to create meaningful business value.

  • Sponsored By IBM // Jul 2014

    Analytics: A blueprint for value in midmarket organizations - Converting big data and analytics insights into results

    The IBM Institute for Business Value conducted a global study to investigate how organizations were creating value from an ever-growing volume of data obtained from a variety of sources. This resulted from data-derived insights, which then guided actions taken at every level of the organization. The findings identified nine levers...

  • Sponsored By IBM // Jul 2014

    Analytics and Big Data for the Midmarket (eBook)

    With so much emphasis in the business world being placed on big data and analytics, it can be easy for midsize businesses to feel like they’re being left behind. These organizations often recognize the benefits offered by big data and analytics, but have a hard time pursuing those benefits with...