White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By Hewlett-Packard (HP) // Apr 2015

    10 Fast Facts to Safeguard Sensitive Data

    Protecting personally identifiable information (PII) is a growing challenge, with more risks and regulations than ever. See this infographic to learn why data theft is a growing problem and how you can protect the PII in your charge.

  • Sponsored By Hewlett-Packard (HP) // Apr 2015

    10 Fast Facts about Endpoint Protection in a Cloud World

    Workers are increasingly mobile and savvy cloud consumers, and that can put your high-value business data at risk. See this infographic to learn how to get enterprise-clad protection and peace of mind.

  • Sponsored By Google Apps for Work // Apr 2015

    People Who Care, Share: Creating a Collaboration Mentality for Innovation

    Every day, more companies are opting to use hosted productivity tools, such as Google Apps, instead of traditional office suites. Hosted apps combine word processing, spreadsheets, and presentations with intuitive and easy to use collaboration features, and they're adding enterprise security and management features, as well. The result is a...

  • Sponsored By Citrix Systems // Apr 2015

    62 Tips for Using Webinars for Internal Communications

    Using webinars to spread information inside your organization will save money, save time, improve the speed of knowledge transfer and help employees feel connected to your vision and mission. This eBook by Roger Courville, author of The Virtual Presenter’s Handbook, identifies 62 ways to improve the effectiveness of your internal...

  • Sponsored By Citrix Systems // Apr 2015

    How to Build Your Content Marketing Hub

    Let’s face it: it’s competitive out there in the content marketing crowd. You need a strong content strategy to help you stand out. Building a plan that places webinars at the hub of your marketing is the most sensible approach and this DemandGen report explores how you can leverage webinars...

  • Sponsored By Citrix Systems // Apr 2015

    Osterman Research - Making the Case for Business Webinars

    To understand which marketing events are most effective for your organisation, you first have to calculate the true costs of each type of event and cost per lead. This Osterman Research white paper presents four types of events marketers are using today, explores how to calculate the true cost of...

  • Sponsored By Citrix Systems // Apr 2015

    How B2B Marketers Use Webinars and White Papers As Secret Weapons

    For decades, trade shows were the events in the B2B business for developing new business contacts and strengthening customer relationships. With webinar and white paper marketing tools, customer relationships are no longer dependent on the trade show ticket office. In the white paper futurologist Joachim Graf describes how marketers get...

  • Sponsored By Citrix Systems // Apr 2015

    102 Tips for Better Online Meetings - eBook

    Nothing gets done if people aren't paying attention during an online meeting. Discover 13 ways to improve attention - plus 89 other smart ideas for accelerating your meeting success. This eBook by TheVirtualPresenter.com provides a comprehensive collection of quick tips that will take your online meetings to the next level....

  • Sponsored By Citrix Systems // Apr 2015

    Executive Brief - How to Make Business Introductions Online

    How does a good, old-fashioned handshake translate to an online interaction? This brief by Bill Cates, author of Beyond Referrals, shows you how to make online introductions effectively in both email and face-to-face video conferences. Download the brief to learn: • Easy tips for extending an electronic handshake • Two...

  • Sponsored By Citrix Systems // Apr 2015

    Power Collaboration - Share Ideas, Lead Teams and Get Things Done

    In today’s mobile work world, the ability to collaborate at a moment’s notice and across thousands of miles is a business necessity. In this eBook, award-winning author Pamela Slim shares key insights about creating truly great collaboration experiences that cross borders - both functional and geographical. Download the eBook to...

  • Sponsored By Citrix Systems // Apr 2015

    Handbook - Learn to Lead Right

    What makes a great leader? Don’t wait to become the leader you were born to be. "A leader provides the necessary framework and makes it available to employees so they can perform their tasks independently and efficiently." This handbook reveals the new meaning of leadership, exploring how you can better...

  • Sponsored By Citrix Systems // Apr 2015

    The Modern Way to Extend Your Company Culture - eBook

    If you want to get a message across, you speak the local language—or in the case of reaching and engaging employees, you use the communication channels they like and use. Web conferencing and private social networks for companies are better at keeping employees in the know and this eBook by...

  • Sponsored By Citrix Systems // Apr 2015

    3 Simple Steps to Move Training Online

    Organisations are moving training online to reduce costs, eliminate travel and reach an increasingly distributed workforce. Are you ready to make the jump? With the advances in technology, growth of mobile devices and the increased mobility and globalisation of the workforce, virtual training just makes sense. This white paper by...

  • Sponsored By IBM // Apr 2015

    The Total Economic Impact of IBM PureApplication System

    IBM PureApplication System converges compute, storage, networking components, and software into a preconfigured and pretested system. This Forrester paper helps to better understand the benefits, costs, and risks associated with the IBM PureApplication System.

  • Sponsored By IBM // Apr 2015

    eBook: DevOps for Dummies 2nd Edition

    This book helps you understand DevOps and how your organization can gain real business benefits from it. You also discover how a holistic view of DevOps that encompasses the entire software delivery life cycle.

  • Sponsored By IBM // Apr 2015

    Deploy and Move Enterprise Applications in the Cloud

    What if your organisation could take advantage of emerging business opportunities by deploying new applications dramatically faster than you ever could before? What if you could increase the value of your existing application investments by leveraging them in the cloud—and easily move your apps across off-premises and on-premises cloud options?...

  • Sponsored By Symantec // Apr 2015

    Internet Security Threat Report 2015 - Key Findings

    If there is one thing that can be said about the threat landscape, and cyber security as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code...

  • Sponsored By Tangoe // Apr 2015

    6 Best Practices of Managed Mobility Services

    The constant change in the mobility landscape often leads to a convoluted, ineffective process of mobility management. Mobility Managed Services (MMS) is emerging as a response to this complexity. MMS can address the varying levels of challenge through an objective-based setting for management in the enterprise. MMS pre-integrates solutions...

  • Sponsored By Symantec // Apr 2015

    Internet Security Threat Report 2015 - eGuide

    This annual Symantec Internet Security Threat Report, gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future. If there is one thing that can be said about the threat landscape, and Internet security as a whole, it is that the only constant...

  • Sponsored By Symantec // Apr 2015

    Internet Security Threat Report 2015 - Infographic Path of a Cyberattacker

    2014 has been a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code than in previous years. This report looks from the attacker's perspective to understand the path of their attacks. Download this report to learn more.