All Deep Dives

Resources available: 66
Download the Cloud Applications Deep Dive report

The path to launching a cloud service is not so straightforward. Here’s how to find likely services among your existing applications -- and get them ready to roll

Download the Windows Server 8 Deep Dive special report

Microsoft rolls out one of its most significant updates with the next version of Windows Server 8; find out what it means for your company.

Download the Business Mac Deep Dive report

As the Macintosh becomes a common tool in today's enterprise, IT has much to learn about effectively working with the Apple platform

Download the Windows 8 Deep Dive special report

Find out what Microsoft's forthcoming OS means for developers, admins, network security, mobile usage, and more in InfoWorld's comprehensive guide

Download the HTML5 Deep Dive How-to Megaguide Report

In this 20-page PDF, InfoWorld experts explain all key HTML5 specs, from canvas to local storage, plus the latest browser benchmarks and report cards on HTML5 support

Download the Private Cloud Deep Dive

Both business and IT need the agility enabled by the private cloud. Now you can apply technologies and processes pioneered by public cloud services to your own data center.

Download the Whitelisting Deep Dive

When handled intelligently, whitelisting is a tremendous asset to any business looking for a cost-effective means of bolstering its security. Here are the features you need to look for in whitelisting software and the steps you must take for successful deployment.

Watch the Shop Talk Video: Virtualization Networking

Server virtualization vastly increases efficiency - but deployed improperly, it also magnifies the effects of equipment or configuration failure. InfoWorld contributors Paul Venezia and Matt Prigge explain how to lay a rock-solid networking foundation for server virtualization, drawing on their joint experience deploying virtualization infrastructure across hundreds of sites.

Download the Data Loss Prevention Deep Dive

In the world of computer security, the ultimate goal is to prevent sensitive data from falling into the wrong hands. Everything else is secondary. InfoWorld contributing editor and recognized security expert Roger Grimes explains the challanges and solutions related to data loss.

Download the Backup Deep Dive

Does your backup system feel about as modern as the 8-track stereo sitting in your garage? Is it just as reliable? Maybe it’s time to bring your backup and recovery system into the 21st century.

Download the Operational BI Deep Dive Report

Operational BI provides a new weapon for line-of-business managers, serving up fresh, accurate data to optimize business processes from the supply chain to customer service. InfoWorld Contributing Editor David Linthicum, an experienced business intelligence consultant, outlines the benefits, offers planning tips, and explains how to avoid common problems.

Watch the Shop Talk Video: Fighting Today's Malware

How bad is it? Worse than you think. Security expert and InfoWorld contributing editor Roger Grimes offers a guided tour of the latest threats and explains what you can do to stop them.

Download the Data Deduplication Deep Dive Report

The data explosion threatens to overwhelm storage systems, particularly the backup tier. Here's how data deduplication can help

Download the HTML5 Strategy Deep Dive

Preparing your website and Web apps for HTML5? Here's what you need to know

Download the Authentication and Authorization Deep Dive

The security mechanisms of authentication, authorization, and accounting keep modern Internet-connected computing humming. In this 11-page PDF, InfoWorld contributing editor and security expert Roger Grimes offers a short course on the topic, including clear explanations of identity, access control, and the forensics of user activity -- with a special section on the latest developments.

©1994-2014 Infoworld, Inc.