Vertical Industries  >  

Government and Public Administration

RSS Feed    Add to Google    Add to My Yahoo!
Government and Public Administration White Papers (View All Report Types)
 
Process-Centred Government - The Road to 2010
sponsored by Metastorm
WHITE PAPER: This paper argues that the i2010 programme needs to go further, and deeper, in its thinking on how to reengineer Europe's government machine for the twenty-first century global economy.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Metastorm

Smartphones: A Savvy Strategy for Government Employees
sponsored by BlackBerry
WHITE PAPER: There is no reason why government agencies shouldn’t take advantage of all that smartphones have to offer. Employed efficiently, smartphones can address several organizational imperatives, including cost savings, greater mobility, increased telework options and sensitivity to environmental concerns. Continue reading to learn more.
Posted: 12 Jan 2011 | Published: 11 Jan 2011

BlackBerry

Out of the Cubicle and into the Field - Mobility Matters in Extending Public Service Delivery
sponsored by BlackBerry
WHITE PAPER: This paper from the Center for Digital Government explores the drivers and benefits for going mobile in the public sector. It also includes success stories from early adopters, as well as suggestions for getting started.
Posted: 18 Mar 2008 | Published: 01 Jan 2007

BlackBerry

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Enhance Security Intelligence for Your Energy or Utilities Company
sponsored by IBM
WHITE PAPER: This white paper explores ways to protect smart grids, automate compliance and risk management, and regulate threats with security intelligence integrated into log management, SIEM, and network behavior analysis. View now to learn more.
Posted: 21 Aug 2013 | Published: 31 Jul 2013

IBM

Recommendations on rolling back government surveillance
sponsored by ComputerWeekly.com
EBRIEF: Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

ComputerWeekly.com

Open Trusted Technology Provider Standard (O-TTPS)
sponsored by ComputerWeekly.com
WHITE PAPER: This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

ComputerWeekly.com

A Complete Identity Service: The RadiantOne Solution for the FICAM Initiative
sponsored by Radiant Logic, Inc.
WHITE PAPER: In this white paper, explore the ways you can leverage identity virtualization to meet the goals of the FICAM Initiative. Additionally, learn 14 common design characteristics of the Authoritative Attribute Exchange Service (AAES) capability, AAES planning and coordination considerations, and more.
Posted: 14 Dec 2015 | Published: 31 Dec 2014

Radiant Logic, Inc.

Legal briefing: The Draft EU General Data Protection Regulation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

ComputerWeekly.com

Accenture Technology Vision 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

ComputerWeekly.com

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Global Sourcing Trends in 2012
sponsored by ComputerWeekly.com
IT BRIEFING: The latest IT outsourcing trends from global law firm Morrison & Foerster.
Posted: 05 Mar 2012 | Published: 05 Mar 2012

ComputerWeekly.com

Improving Government Performance: Making the Case for Technology Investment
sponsored by Workday
WHITE PAPER: This informative report on improving government performance with smart technology investments reveals the jurisdictions, innovators, and technologies that are giving agencies the most bang for their buck.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

Workday

The Global Information Technology Report 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from the World Economic Forum remains one of the most comprehensive and authoritative assessments of the impact of ICT on each country.
Posted: 15 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Mimecast

CW Special report on Atos
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 9 page special report, updated for 2014, gives you the facts on Atos, its strategy, products and services and financial performance.
Posted: 01 May 2014 | Published: 05 May 2014

ComputerWeekly.com

Food & Beverage Helps Manufacturers Prepare for COOL Compliance and Recall Readiness
sponsored by Infor
WHITE PAPER: After reading this white paper, you'll be inspired to better prepare for compliance regulations by reading about how food and beverage manufacturers follow country of origin labeling (COOL.) Access now and become one step closer to creating detailed documentation that helps protect your brand integrity.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

Infor

Case Study: Local Government Finds Cybersecurity that Meets its Budget
sponsored by AlienVault
WHITE PAPER: This white paper tells the story of how the IT managers for the City of Lewiston found a security solution that worked for them, keeping their network secure without incurring additional costs or requiring additional manpower.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

AlienVault

Fighting fraud in government
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Public sector organisations are experiencing increasing levels of economic crime, including cybercrime, and are particularly at risk from being defrauded by their own employees and their suppliers, according to findings from PwC’s latest Global Economic Crime Survey.
Posted: 13 Jan 2012 | Published: 13 Jan 2012

ComputerWeekly.com

Global profiles of the fraudster
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Computer Weekly networking case studies
sponsored by ComputerWeekly.com
CASE STUDY: Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for networking.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

ComputerWeekly.com

Airport IT Trends Survey
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Airports are spending a larger slice of their revenues on technology as they look to improve the passenger experience, this major study  from SITA reveals.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

Mobile NFC in Transport
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER: This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

IT in Europe - May 2012
sponsored by SearchSecurity.com
EZINE: While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.
Posted: 22 Jun 2012 | Published: 15 Jun 2012

SearchSecurity.com

A Case for IT Security: The Future of New EU Data Protection
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

Mobility in Government Services
sponsored by BlackBerry
WHITE PAPER: Access this white paper to learn how to get the most out of your EMM compliance strategy. View now to explore a helpful checklist.
Posted: 15 Apr 2015 | Published: 17 Dec 2014

BlackBerry

The Total Economic Impact of SQL Server
sponsored by Microsoft
WHITE PAPER: The purpose of the following study is to provide readers with a framework to evaluate the potential financial impact of SQL Server for mission-critical applications and their organizations. See the results of interviews with six businesses and let their experiences drive your decision-making.
Posted: 04 Feb 2016 | Published: 31 Jul 2014

Microsoft

Can New Security Tools Keep Your Network Clean?
sponsored by SearchSecurity.com
EZINE: This issue provides network and security IT pros with step-by-step guidance so they can decide what advanced security monitoring tools are right for their network's particular needs.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement