White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By EMC // Sep 2014

    Expand your horizon with XtremIO

    Within End-User Computing, Virtual Desktop Infrastructure (VDI) holds the promise not only of consolidating desktops into the data centre for improved manageability, efficiency, and security, but also shaping and evolving next-generation services such as bring-your-own-device, Windows on Mobile, and workforce mobility.

  • Sponsored By EMC // Sep 2014

    VDI Storage Considerations

    While considering storage solutions for VDI, enterprise buyers should ask their vendors the following questions to ensure the success of their VDI deployment. Does it offer the best user experience? How flexible is the deployment model? Does it offer administrative flexibility? And more…

  • EMC

    Sponsored By EMC // Sep 2014

    XtremIO powers VMworld 2014

    VMware is the leader in virtualisation and cloud infrastructure solutions that enable businesses to thrive in the cloud era. Every year, VMware showcases its latest solutions at the company’s VM world conference. A key feature of the conference is solving critical business challengers in the hands on labs environment.

  • Sponsored By OpenText // Sep 2014

    Executive Summary: The Gathering Threat

    Enterprises today are seeing a rapid growth of unstructured content and an increased variety of content types, making consistent and secure management of corporate information increasingly difficult. As data continues to expand, it threatens to overwhelm IT infrastructures and leave organizations vulnerable to risk and non-compliance.

  • Sponsored By OpenText // Sep 2014

    Infographic: The Gathering Threat

    A dangerous storm is threatening to swap IT infrastructures. Massive growth of unrestricted content and multiplying content types make it increasingly difficult to consistently manage and identify what to keep. Email, file systems content, digital assets, social, web, ERP data... the list is endless and the threat is real.

  • Sponsored By EMC // Sep 2014

    Redefine VDI with XtremIO

    Within End-User Computing, Virtual Desktop Infrastructure (VDI) holds the promise not only of consolidating desktops into the data centre for improved manageability, efficiency, and security, but also shaping and evolving next-generation services such as bring-your-own-device and desktop mobility.

  • Sponsored By EMC // Sep 2014

    Case Study- Keolis Orléans

    The Lyon metro; The Lille, Le Mans, or Melbourne tram systems? Keolis helped to design these transport systems and operates them on a daily basis. Keolis Orléans wanted a solution that is able to anticipate business evolution: the number of virtualized desktops will not be known in advance, and the...

  • Sponsored By EMC // Sep 2014

    Case Study- Boston Scientific

    Serving 24,000 employees in more than 40 countries and supporting over 2,500 different applications Boston Scientific needed a cost-effective solution that would improve the end user experience and facilitate greater administrative responsiveness, including the ability to deploy virtual desktops during business hours. Find out how they were able to do...

  • Sponsored By Global Knowledge // Sep 2014

    Failover Strategies on the Cisco UCS B Series Chassis

    Cisco Unified Computing Solution (UCS) has experienced an enormous growth trend in the last several years, becoming the standard server hardware platform in many enterprises and cloud service providers alike. One of the main differentiators in Cisco's server solution is the capacity for two totally redundant failover paths for every...

  • Sponsored By Global Knowledge // Sep 2014

    The Packet Delivery Process: Remotely Connected Hosts

    Moving data from one networked device to another requires several different functions. Each function has its own protocol or protocols that define how it is accomplished. Also, the process of delivering data from one device to another can vary. The main factor in data delivery is determining whether the two...

  • Sponsored By Global Knowledge // Sep 2014

    The Packet Delivery Process: Locally Connected Hosts

    Moving data from one networked device to another requires several different functions. Each function has its own protocol or protocols that define how it is accomplished. Also, the process of delivering data from one device to another can vary. The main factor in data delivery is determining whether the two...

  • Sponsored By Hitachi // Sep 2014

    IT Service Provider Breaks Into Storage Services With Disaster Recovery as a Service for Hitachi Content Platform Owners

    To retain their share of the market in a fast-changing technology landscape, IT service providers need to find cost-effective ways to expand the services they offer their customers. At first glance, branching out into cloud storage services might appear to be a risky proposition, considering the formidable competitors who occupy...

  • Sponsored By Global Knowledge // Sep 2014

    How Mobile Management Services Fill a Critical Security Need

    According to the GSMA (the global mobile industry trade group), the total number of devices in 2012 will double from six billion to 12 billion by 2020. For organizations considering Mobile Management Services (MMS), such an increase demonstrates why it's critical to address MMS adoption and deployment now, before unchecked...

  • Sponsored By Global Knowledge // Sep 2014

    Horizon View 6 Blast Performance Features

    With VMware's recent release of the Horizon Suite (specifically View 6), VMware has taken the performance and usability features and put them all under the Blast moniker. This category of features is grouped from a marketing perspective but will retain their technical terms in the documentation, similar to how the...

  • Sponsored By Hitachi // Sep 2014

    Checklist for Cloud Mobility Readiness

    Today’s mobile worker want real-time, remote and secure access to your company’s fast-growing information. To ensure the right data is in the right place at the right time, your organization needs a solution that provides your workforce with data and cloud mobility. This white paper from Hitachi provides a checklist...

  • Sponsored By Global Knowledge // Sep 2014

    Security and the Rise of Machine-to-Machine (M2M) Communications

    Increased interconnectivity via machine-to-machine (M2M) communications, the IoE, and smart systems holds profound implications for how business trends continue to evolve. In terms of M2M growth, key developments in security will be essential, from the design and manufacture of devices to more robust cloud security and ensuring the integrity of...

  • Sponsored By Global Knowledge // Sep 2014

    Troubleshooting Fibre Channel Boot from SAN on the Cisco UCS B Series Chassis

    Cisco Unified Computing Solution (UCS) has experienced an enormous growth trend in the last several years becoming the standard server hardware platform in many enterprises and cloud service providers alike. One of the main differentiators in Cisco's server solution is the implementation of stateless computing, which allows all the hardware...

  • Sponsored By Hitachi // Sep 2014

    Workforce Mobility Without Giving Up Visibility and Control Over Content

    With Hitachi Content Platform Anywhere, your employees can safely create and share content from their mobile devices without compromising the security of your organization’s data. Unlike solutions built for consumer use, HCP Anywhere is built by Hitachi Data Systems to accommodate the needs of enterprises. It works with the highly...

  • Sponsored By Citrix Online // Sep 2014

    Comprehensive Enterprise Mobile Management for iOS 8

    The new iOS 8 release includes new features to facilitate device and application management but a third-party enterprise mobility management platform is still necessary for enterprises to gain full control over all their mobile devices and to capitalize on productivity features that enable workflow integration among apps. This white paper...

  • Sponsored By MobileIron // Sep 2014

    Security for the Mobile First Era

    Sandboxed mobile operating systems are secure. Threats, such as malware, are mitigated by OS design. Preventing data loss on mobile requires focus on a different set of risk vectors. Download to read more.