White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

  • Hiring kit: IT finance manager/budget director

    Tools & Templates // Oct 2017 // provided by Tech Pro Research

    The IT finance manager/budget director position requires a unique skill set that mixes finance and accounting skills with IT experience and knowledge. This hiring kit contains a job description, sample interview questions, and a basic want ad to help you find the best candidates for this challenging position. From ...

    View This Now
  • Wireless networking policy

    Tools & Templates // Oct 2017 // provided by Tech Pro Research

    Wireless networks have given users enormous flexibility and lessened the burden of supporting their connectivity needs. But along with the benefits comes the critical need to make sure wireless networks are properly and securely configured. This policy establishes guidelines, prohibitions, and procedures for both IT and end users. From ...

    View This Now
  • Securing Linux policy

    Tools & Templates // Sep 2017 // provided by Tech Pro Research

    Linux has been the backbone of many businesses for decades. It has powered web servers, database systems, development machines, and employee workstations. And as with any OS, it’s essential to ensure that security standards are met in corporate environments. This policy offers guidelines for securing Linux on company computers and ...

    View This Now
  • Mobile device computing policy

    Tools & Templates // Aug 2017 // provided by Tech Pro Research

    Mobile devices offer convenience and flexibility for the modern workforce—but they also bring associated risks and support issues. This policy establishes guidelines to help ensure safe and productive use of mobile devices by employees, along with recommendations for IT pros responsible for administering and supporting those devices. From the ...

    View This Now
  • Corporate gaming policy

    Tools & Templates // Aug 2017 // provided by Tech Pro Research

    Video games can benefit companies by giving employees a recreational outlet to build cooperation and morale. But they can also create problems if misused. This policy will help you establish the ground rules for permitting or prohibiting the use of company systems and networks for video gaming purposes. From ...

    View This Now
  • Configuration management policy

    Tools & Templates // Aug 2017 // provided by Tech Pro Research

    Implementing a configuration management strategy can involve a lot of work up front, but it will pay off in the long run by making day-to-day administrative life easier. This policy provides guidelines for applying effective, secure, and reliable configuration management techniques, whether in test, development, or production environments. Configuration ...

    View This Now
  • Home usage of company-owned equipment policy

    Tools & Templates // Jul 2017 // provided by Tech Pro Research

    Employees who work from home often use company-supplied systems and devices, which helps ensure that they have consistent, state-of-the-art equipment to do their work. However, organizations should provide usage guidelines, such as this policy, covering the responsibilities of IT staff and employees. From the policy: For an ...

    View This Now
  • Hardware decommissioning policy

    Tools & Templates // Jul 2017 // provided by Tech Pro Research

    When decommissioning hardware, standard and well-documented practices are critical. The steps outlined in this policy will guide your staff methodically through the process. Assets won’t be unnecessarily wasted or placed in the wrong hands, data stored on this hardware will be preserved as needed (or securely purged), and all ancillary ...

    View This Now
  • DHCP usage policy

    Tools & Templates // Jul 2017 // provided by Tech Pro Research

    DHCP makes life easier for IT staff and employees, allowing computer systems and devices to quickly be connected to a network and given necessary access. The alternative of using permanent (or static) IP addresses is time consuming, but static IP addresses can be more secure. So despite the advantages of ...

    View This Now
  • Securing Windows policy

    Tools & Templates // Jun 2017 // provided by Tech Pro Research

    Windows is not without certain issues and flaws. Like any operating system it has been exposed to numerous vulnerabilities, both deliberate (viruses) and unintentional (exploitable holes in programs or processes)—so it’s essential that your company has a policy in place to help protect and secure your Windows machines. This ...

    View This Now