CARVIEW |
Our Blogs
- Feature
Exclusive review: HP BladeSystem Matrix
HP's state-of-the-art blade server system and array of automation tools haven't squeezed all manual labor out of service provisioning, but they show the automated and adaptive datacenter is within reach more
- Feature
The CIO's New Guide to Design of Global IT Infrastructure
Is it possible to eliminate the impact of distance? This paper explores the 5 key principles successful CIOs are using to redesign IT infrastructure of any size. Learn how to be prepared to adapt your environment in a way that supports distributed employees, anytime anywhere collaboration and the need for business continuity during a disaster. more
- More White Papers
- Sustaining SOX Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs
- IDC White Paper: CCM for IT Compliance and Risk Management
- Keep it Clean: Maintaining the Integrity of your CMDB through Change Detection
- The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164
- Configuration Assessment: Choosing the Right Solution
- Beyond PCI Checklists: Securing Cardholder Data with Tripwire's Enhanced File Integrity Monitoring
- Addressing Compliance Initiatives with Tripwire and the Center for Internet Security
- File Integrity Monitoring: Secure Your Virtual and Physical IT Environments
- Feature
How to Reduce Eclipse BIRT Development Effort for Data Visualizations
Web applications can come with a long list of visualization requirements for structured data. By delivering your output through the BIRT Interactive Viewer, you can create a single BIRT design that meets multiple requirements. more
- More Webcasts
- Five Ways to Reduce IT Costs in 2009
- Usability Is Everything
- The Value of Real SaaS at Workday
- SaaS at Flextronics, Inc.
- 5 Best Practice Tips for Managing BlackBerry, iPhone, & Windows Mobile Devices
- Hear from Your Peers: Take Action now to Lower your Database Costs
- How to Reduce Eclipse BIRT Development Effort for Data Visualizations
- Distributed Enterprise Webcast Series



- View Company List

Sign up to receive Infoworld Resource Alerts

The CIO's New Guide to Design of Global IT InfrastructureIs it possible to eliminate the impact of distance? This paper explores the 5 key principles successful CIOs are using to redesign IT infrastructure of any size. Learn how to be... Sponsor: Riverbed ![]() |
Thinking Beyond Tape: The Case Against Tape BackupDownload this free whitepaper to learn about netBoot/i - a cost-effective and flexible solution that will allow you to better manage desktops or servers by booting them from... Sponsor: Double-Take Software ![]() |
More Power Savings, Increased ROIDon’t leave money on the table. Activate PCs with Intel® vPro™ technology and enjoy bottom line benefits with remote manageability, security, and energy efficient performance. Sponsor: Intel ![]() |
All White Papers
Sustaining SOX Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs
Discover how to make SOX efforts more effective today!

IDC White Paper: CCM for IT Compliance and Risk Management
Learn from industry analysts how IT organizations are using configuration management to meet compliance requirements and instill best practices.

Keep it Clean: Maintaining the Integrity of your CMDB through Change Detection
Learn how configuration drift can challenge configuration management database integrity.

The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164
Learn how you can meet the detailed technical requirements of HIPAA and delivers continuous compliance.

Configuration Assessment: Choosing the Right Solution
Learn why configuration assessment is so important.

Beyond PCI Checklists: Securing Cardholder Data with Tripwire's Enhanced File Integrity Monitoring
How do organizations pass their PCI DSS audits yet still suffer security breaches?

Addressing Compliance Initiatives with Tripwire and the Center for Internet Security
Learn the basics about security benchmarks today!

File Integrity Monitoring: Secure Your Virtual and Physical IT Environments
Learn how integrity monitoring software solutions enable IT organizations to achieve and maintain configuration control.

Using Symark PowerBroker™ to Enrich Your Organization’s RBAC Model
This white paper will discuss how integrating Symark’s PowerBroker with the basic RBAC implementations of Sun, HP and the Linux community, provides an all encompassing solution to privileged access control on UNIX and Linux platforms.

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
This white paper explores insider attacks and insider risk, and shows how to control them by controlling and monitoring access. The paper describes the more common vulnerabilities exploited by insider attacks and a method for assessing insider risk.

