CARVIEW |
Our Blogs
- Feature
Exclusive review: HP BladeSystem Matrix
HP's state-of-the-art blade server system and array of automation tools haven't squeezed all manual labor out of service provisioning, but they show the automated and adaptive datacenter is within reach more
- Feature
The CIO's New Guide to Design of Global IT Infrastructure
Is it possible to eliminate the impact of distance? This paper explores the 5 key principles successful CIOs are using to redesign IT infrastructure of any size. Learn how to be prepared to adapt your environment in a way that supports distributed employees, anytime anywhere collaboration and the need for business continuity during a disaster. more
- More White Papers
- Sustaining SOX Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs
- IDC White Paper: CCM for IT Compliance and Risk Management
- Keep it Clean: Maintaining the Integrity of your CMDB through Change Detection
- The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164
- Configuration Assessment: Choosing the Right Solution
- Beyond PCI Checklists: Securing Cardholder Data with Tripwire's Enhanced File Integrity Monitoring
- Addressing Compliance Initiatives with Tripwire and the Center for Internet Security
- File Integrity Monitoring: Secure Your Virtual and Physical IT Environments
- Feature
How to Reduce Eclipse BIRT Development Effort for Data Visualizations
Web applications can come with a long list of visualization requirements for structured data. By delivering your output through the BIRT Interactive Viewer, you can create a single BIRT design that meets multiple requirements. more
- More Webcasts
- Five Ways to Reduce IT Costs in 2009
- Usability Is Everything
- The Value of Real SaaS at Workday
- SaaS at Flextronics, Inc.
- 5 Best Practice Tips for Managing BlackBerry, iPhone, & Windows Mobile Devices
- Hear from Your Peers: Take Action now to Lower your Database Costs
- How to Reduce Eclipse BIRT Development Effort for Data Visualizations
- Distributed Enterprise Webcast Series

-
Adventures in IT
Hosted by InfoWorld icon Robert X. Cringely®, this Channel aggregates InfoWorld's most engaging content, from interactive quizzes, to Stupid User Tricks, to Off the Record anecdotes, to serious career stories and advice. Here you'll find InfoWorld's awards, including Technology of the Year, CTO 25, and the InfoWorld 100.
- Applications
-
Cloud Computing
Services provided over the Internet, from computing infrastructure to enterprise applications, are changing the face of IT -- as are the technologies and architectures employed to build cloud services. Cloud Computing is hosted by the legendary "whurley," an enterprise architect and technology visionary.
-
Developer World
InfoWorld veteran Neil McAllister hosts Developer World, a content and community Channel for professional programmers of all stripes who turn to InfoWorld reviews, blogs, and feature articles to stay on top of the latest innovations -- and use the discussion forums to exchange techniques, observations, and advice.
-
Mobilize
Gadgetry has its limits, but mobile business applications know no bounds. Blogger Amber Bouman covers the latest developments, while reviews from Tom Yager and others take a business perspective on smartphones and their software. In-depth articles and discussions help IT integrate mobile devices into the IT fabric.
-
Security Central
Hosted by Roger Grimes, one of the leading authorities on security in the industry, Security Central provides a unique resource for IT professionals to make the most of their resources with best practices and discerning technology selection. In its depth and insight, the content of Security Central is unique.
-
Virtualization
InfoWorld was first to highlight the importance of server, desktop, and storage virtualization, with a broad and deep array of product reviews, hands-on advice, and informed opinion from contributors with real-world deployment experience. Blogger Dave Marshall keeps his finger on the pulse of virtualization innovation.


- Application lifecycle management
- Application performance management
- Business rule management systems
- Code analysis
- Code change management
- Code testing
- Collaborative environments
- Development environments
- Development frameworks
- Development methodologies
- Development tools
- Languages and standards
- Mashups
- Open source initiatives
- Rich Internet application development tools
- Web services development
- Application management
- Application testing
- Browsers
- Business intelligence/analytics
- Collaboration
- Content/document management
- Customer relationship management
- Deployment and management
- Desktop productivity
- ERP (enterprise resource planning)
- Games
- Human resources
- Manufacturing and supply chain
- Open source applications
- Project management
- Search
- Supply chain management
- Web applications
- Business process management
- Change management
- Civil lawsuits
- DRM (digital rights management)
- E-commerce
- Financial results
- Funding and finances
- Intellectual property
- Investment
- Mergers and acquisitions
- Outsourcing/offshoring
- Partnerships
- Professional services
- Regulatory compliance
- Risk management
- Software licensing
- Startups
- Tech industry analysis
- Tech support
- User problems
- Web companies
- Anti-spam
- Anti-spyware
- Anti-virus
- Application security
- Authentication and authorization
- Compliance monitoring
- Computer forensics
- Data security
- Encryption
- Endpoint security
- Firewalls
- Hacking
- Identity management
- Insider threat
- Intrusion detection and prevention
- Leak prevention
- Malware
- Mobile security
- Network access control
- Patch management
- Phishing/pharming
- Physical security
- Privacy
- Security event/information management
- Security standards
- Social engineering
- VPNs
- Vulnerability assessment/management
- Wireless security

- IDC White Paper: CCM for IT Compliance and Risk Management | White Paper →
- Keep it Clean: Maintaining the Integrity of your CMDB through Change Detection | White Paper →
- The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164 | White Paper →
- Configuration Assessment: Choosing the Right Solution | White Paper →
- Beyond PCI Checklists: Securing Cardholder Data with Tripwire's Enhanced File Integrity Monitoring | White Paper →