government it

Results 276 - 300 of 345Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jun 09, 2015
Government revenue management agencies are using computer technology to capture and harvest data and extract value from it. This paper explains the importance of being data-droven and outlines a way forward in the journey of getting there.
Tags : ibm, government, data, records, legal, information, benefits
     IBM
By: IBM     Published Date: Jun 09, 2015
Making sound security decisions in today’s environment is of paramount importance. This infographic highlights the connection between economic vitality and security and how both can be achieved.
Tags : ibm, government, cyber, security, intelligence, information, vulnerability, fraud, threat, predictive
     IBM
By: Neustar     Published Date: Sep 15, 2010
How Nonprofit Organizations can use SMS to mobilize Millions of Volunteers, Dollars, and Supporters.
Tags : neustar, sms, mobile networks, text message, call to action, mobile marketing, government, non profit, csc
     Neustar
By: Dice     Published Date: Jul 01, 2015
As the federal workforce nears retirement age, it is crucial for the government to hire members of the millennial generation, particularly in the mission-critical fields of science, technology, engineering and math where there is stiff competition with the private sector.
Tags : recruiting, management, talent, connectivity. culture, millenial
     Dice
By: Dice     Published Date: Feb 10, 2016
As the federal workforce nears retirement age, it is crucial for the government to hire members of the millennial generation, particularly in the mission-critical fields of science, technology, engineering and math where there is stiff competition with the private sector. These results are a must-read for government officials who want to stay up-to-date with developing trends in recruiting.
Tags : reachmail dice, tech candidate sentiment, government officials, recruiting trends, millenials
     Dice
By: Cornerstone OnDemand     Published Date: Jun 29, 2018
As employers, government agencies face a unique set of challenges. Fierce competition to find, keep, and develop the best talent, along with an increasingly intense level of scrutiny is placing human capital front and center. Not having enough staff, not having them properly trained, or having a noncompliant workplace can trigger a public crisis.
Tags : management, talent, organizations, communication
     Cornerstone OnDemand
By: Q1 Labs     Published Date: Feb 02, 2012
In this study, IANS interviewed two Q1 Labs customers using QRadar to assess their Return On Security (ROS). The two customers were providers of service to the U.S. Government and had highly secure environments dealing with extremely sensitive data. The data yielded from the interviews showed substantial benefit to the organizations for the cost, both in money and staff time.
Tags : siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, continuous monitoring
     Q1 Labs
By: Viavi Solutions     Published Date: Mar 21, 2016
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users—from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : viavi solutions, hybrid clouds, networking, it management, wireless, enterprise applications, data management
     Viavi Solutions
By: Onvia     Published Date: Feb 10, 2015
Onvia’s 3 Trends Shaping State & Local Contracting Growth in 2015 reflects on important trends that are expected to shape government contracting this year. Highlights from the report: Onvia’s 3 Trends Shaping State & Local Contracting Growth in 2015 reflects on important trends that will shape government contracting over the coming year. Highlights from the report: • 2014 Review: A “slowing trend” in competitive opportunities, due to macro political-economic factors, with context for expected changes in 2015. • 2015 Trend 1: Potential for stronger growth driven by an expected rebound in government tax revenue and greater bond income for large debt-financed infrastructure projects. • 2015 Trend 2: Technology contracting volume gains traction in non-IT industry sectors, with insight into five niche technologies shaping 2015 procurement. • 2015 Trend 3: Cooperative purchasing influences the overall state and local agency market, with implications for both local and national competitors.
Tags : government procurement, government contracts, state contracts, local contracts, government opportunities, public sector contracts, cooperative purchasing, government it, government marketing, government business intelligence, local contracting, state contracting, government bids, government rfps, sled contracts, term contracts, vendor intelligence, government agency intelligence, competitive intelligence, state and local contracts
     Onvia
By: Safari Books     Published Date: Jun 08, 2009
ITIL Version 3 Best Practices has expanded the concept of IT service delivery from day-to-day operations of those services to the Service Lifecycle. ITIL Version 3 Best Practices includes five lifecycle phases (each with its own guidebook): Strategy, Design, Transition (which covers implementation and change), Operations and Continual Improvement.
Tags : safari books online, government, it service management, itil, version 3, best practices, strategy, design, transition, maintenance, office of management and budget, omb, sox, sarbanes-oxley, it operations, service strategy, service design, service level management, slm, operational level agreements
     Safari Books
By: Safari Books     Published Date: Jun 08, 2009
IT and business leaders today can no longer look at IT simply as a cost center, it is now a vital part of business success. Improving the efficiency of IT and improving the measurement of its impact on business performance are at the forefront of managers' concerns. Access to ITIL books can be instrumental in providing the methodology for IT improvement. Learn more today!
Tags : safari books online, government, it service management, itil, version 3, best practices, strategy, design, transition, maintenance, office of management and budget, omb, sox, sarbanes-oxley, it operations, service strategy, service design, service level management, slm, operational level agreements
     Safari Books
By: GeoTrust     Published Date: Aug 09, 2013
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : web security, web threats, ssl, secure sockets layer, technology, solution, security, business technology
     GeoTrust
By: GeoTrust     Published Date: Oct 06, 2014
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : cloud provider, cloud computing, economic benefits, safeguard information assets, ssl, confidence
     GeoTrust
By: MCH     Published Date: Jan 29, 2007
Learn how local governments operate, who makes the purchasing decisions, what criteria influence buying decisions, and how timing can play a critical role in the success of your marketing campaigns.
Tags : government, local government, mch, mailings.com, database and list managers
     MCH
By: Clearvale by BroadVision     Published Date: Aug 21, 2009
Government agencies today are focused on collaboration and how they can best share information and make it available to those who need it, while maintaining security. This white paper discusses the necessary elements of a personalized portal and how they are leveraged to enable e-intelligence. Includes case studies of the U.S. Air Force Portal and the U.S. Coast Guard Portal.
Tags : egovernment, e-government, government, usaf, agency, agencies, portal, broadvision, knowledge management
     Clearvale by BroadVision
By: Clearvale by BroadVision     Published Date: Aug 21, 2009
This white paper considers the drivers behind the move to e-government, the need for relationship management and the complexity of e-government value chains. It also outlines a solution that government entities can deploy to address this top priority of information management and sharing.
Tags : collaboration, egovernment, government, e-government, customer relationship management, constituent, constituents, citizens, citizen, information management, broadvision
     Clearvale by BroadVision
By: IBM     Published Date: Mar 11, 2008
Self-service Web portals enable governments to help citizens obtain information, apply for services and complete transactions more quickly than ever before.  Download this paper to find out how, through the power of Web portals, IBM can help your government agency make information more accessible, and processes more efficient for citizens, businesses and government employees.
Tags : ibm, corporate portal, portal, portals, knowledge management
     IBM
By: PassGo     Published Date: Oct 23, 2007
Looking at IT security history, the bad guys were always far more sophisticated than the people who tried to stop them. Even if companies or the government could conceive of IT security it was almost impossible to achieve it because of the lack of knowledgeable security professionals out there and the lack of security protection tools in the marketplace.
Tags : risk assessment, hacker, hackers, hacker detection, cyber crime, cybercrime, cybercrimes, intrusion, intrusion prevention, intrusion detection, network security, azoogle, azoogle ads
     PassGo
By: Pointsec     Published Date: Aug 21, 2009
Strong security policy, procedures and technology are major requirements, especially for protecting the remote systems used for telework and the sensitive information stored on those devices.
Tags : network security, security policy, government, security policies, policy based security, information security, data security, telecom, secure communications, pointsec
     Pointsec
By: Safe Software     Published Date: Aug 21, 2009
Spatial data warehouses are becoming more common as government agencies, municipalities, utilities, telcos and other spatial data users start to share their data. This paper illustrates some of the issues that arise when undertaking data replication and data sharing.
Tags : data warehousing, share data, data management, data distribution, data sharing, replication, safe, safe software
     Safe Software
By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : network architecture, network management, sarbanes oxley compliance, compliance, sox compliance, hipaa compliance, configuration management, government agency, secure computing, securecomputing
     Secure Computing
By: Quocirca     Published Date: Nov 09, 2006
This paper looks at the particular challenges in public sector IT – the need to find efficiency savings at the same time as offering better service to citizens – and discusses the particular circumstances in which blade computing will be right for the public sector IT manager.
Tags : blade, blade server, blade servers, government, citizen, constituents, server selection, server implementation, service management, quocirca
     Quocirca
By: Quocirca     Published Date: Nov 13, 2006
IT in the UK public sector is under intense scrutiny and needs to deliver better results:  much investment has been made which has too often failed to deliver. Projects have a history of being protracted and complex, offering significant challenges to all involved.
Tags : public sector, it management, government, project management, efficiency, productivity, quocirca
     Quocirca
By: RiskWatch     Published Date: Feb 05, 2007
The integration of information security and physical security is an important trend that is becoming more widespread across both private corporations and government agencies. Read more about how and why you should implement a more holistic security strategy in this whitepaper.
Tags : security, network security, access control, compliance, secure content management, information security, physical security, holistic, riskwatch
     RiskWatch
By: Palm, Inc.     Published Date: Mar 15, 2007
Smartphones and other handheld devices support government continuity of operations (COOP) by enabling its central tenets: decentralization and redundancy. Read this white paper to learn all benefits of using smart phones when an emergency strikes.
Tags : government, disaster recovery, disaster, terrorism, terrorist attacks, smartphone, smart phone, pda, handheld, wireless, mobile computing, palm
     Palm, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com