ComputerWeekly.com Research Library

Powered by Bitpipe.com

Department of Homeland Security Research

  • 5 Ways Technology Can Transform Government Operations

    Sponsored by: Smartsheet

    In this whitepaper, learn how governments and agencies can improve the success rate of their transformation journey by switching to a reliable cloud-based application. Review your software options with Smartsheet, and discover how cloud-based applications can help your organization drive progress towards digital transformation in 5 critical ways.

  • 8 Biggest Mistakes IT Practitioners Make

    Sponsored by: Splunk

    Inside, learn about the eight most common mistakes that IT pros make when it comes to monitoring and troubleshooting – and read through takeaways and examples that explain how to tackle them.

  • Accenture Technology Vision 2014

    Sponsored by: ComputerWeekly.com

    The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.

  • Agile Development: Quickly Create Applications and System Enhancements

    Sponsored by: ServiceNow

    Agile transformation must start somewhere, and at UW Health it was their ITSM Team. Over a two-year period, they completely reloaded the entire ServiceNow platform — which went from being a cumbersome tool to a valued asset. Learn about UW’s experience in this case study.

  • Case Study: Giving Public Defenders the Tools They Need

    Sponsored by: Dell Technologies

    In this case study, find out how the Maryland Office of the Public Defender made the right technology choices to keep up with growing case volumes, keeping their defenders equipped with the right tools to tackle over 225,000 cases per year.

  • Digital Transformation from the Front Lines to Dispatch to the Cloud

    Sponsored by: Dell Technologies

    Click inside to take a closer look at the technology trends shaping public safety's digital transformation journey, including edge computing, multi-cloud, and even virtual and augmented reality.

  • Global Risks 2014

    Sponsored by: ComputerWeekly.com

    Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.

  • Global Sourcing Trends in 2012

    Sponsored by: ComputerWeekly.com

    The latest IT outsourcing trends from global law firm Morrison & Foerster.

  • Government IT Modernization: 5 Questions to Ask

    Sponsored by: Dell Technologies

    Use this resource to uncover the five key questions your organization should be asking to help position IT for modernization success.

  • Advanced Case Management for Government

    Sponsored by: IBM

    How can you tap into today's data growth trend to improve processes? This white paper examines the drastic explosion of data and explores how governments have begun to handle this massive influx of information.

  • Analytics Solution Center (ASC) Website

    Sponsored by: IBM

    The IBM Analytics Solution Center in the Washington, DC area focuses on solving the business and mission problems of public sector agencies, and the U.S. Federal government through the use of analytics. Visit this center online and see how you too can gain access to useful information, industry experts, and technology to reach your mission goals.

  • Boost Government Revenues Without a Tax Increase

    Sponsored by: SAP America, Inc.

    SAP analytics solutions can help today's government agencies overcome the many challenges associated with tax discovery. Read on to learn how SAP's public sector software solutions can benefit government agencies by improving performance, reducing costs and streamlining service delivery.

  • Building Solutions For Smarter Governments: Six Ways to Increase Responsiveness, Service Quality, Accountability and Taxpayer Value

    Sponsored by: IBM

    This paper describes how smarter government means making operations and services truly citizen-centric, integrating their service delivery, coordinating programs and allowing a choice of access channels, as well as placing the most needed transactions on the Web.

  • Clearswift Government Communications 2.0

    Sponsored by: Clearswift

    In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.

  • Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud

    Sponsored by: IBM

    This article briefly describes the procurement challenges and then jumps into advising government cloud service purchasers on the positives and negatives of security in the cloud, and how to manage their potential vendors' security risks. Read on to learn more.

  • Cloud Computing: Get to know the basics

    Sponsored by: Red Hat

    This white paper explains how government IT can enjoy cloud capabilities while keeping existing IT investments and avoiding vendor lock-in. Explore how open source and application portability in the cloud and the relationships between technology providers are critical to building a successful cloud strategy.

  • Continuous monitoring, remediation and CyberScope reporting

    Sponsored by: IBM

    This white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA).

  • Critical Technologies for Compliance and Risk Management

    Sponsored by: Siperian, Inc.

    Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.

  • Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.

    Sponsored by: IBM Software Group

    When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.

  • Endpoint Threat Detection Gets More Response

    Sponsored by: Solarwinds MSP

    This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.

  • Enterprise Content Management for Transforming Government

    Sponsored by: EMC Corporation

    Read this issue brief by Center for Digital Government to learn how the Commonwealth of Massachusetts and the County of San Diego are improving service delivery by managing information electronically.  What benefits could ECM bring to your agency?

  • Essential Supplier Report: Smart City Suppliers

    Sponsored by: IBM

    This report cuts to the chase when it comes to suppliers focusing on smart cities and forwar-thinking municipalities. Read now for evaluations on leading players in the market that have the capacity to provide leadership on large-scale projects spanning multiple city requirements.

  • Gartner Middle East CIO Leadership Forum

    Sponsored by: Gartner

    Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.

  • Get a Better Handle on Unspent Funds

    Sponsored by: SAP America, Inc.

    This paper details SAP's range of public sector solutions, designed specifically to assist government agencies in proactively monitoring their current and future spending. Learn how to get a better handle on unspent funds such as unliquidated obligations (ULOs) by drilling into layers of data to create accurate reports and projections in real time.

  • Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition

    Sponsored by: Hewlett Packard Enterprise

    Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.