IT Agents  >   Government Agencies (U.S.)  >  

DOT

RSS Feed    Add to Google    Add to My Yahoo!
DOT Reports
 
IT Without Boundaries: Choosing Between Conventional or Agile IT?
sponsored by Red Hat
WHITE PAPER: Why should you have to choose between conventional and agile IT? News just in: you don't have to anymore. This white paper explains how organizations can operate more efficiently and become more agile at the same time. Access this research to see how you can balance conventional and agile IT.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

Red Hat

State-sponsored Hacking troubles US Government
sponsored by LogicNow
EGUIDE: This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
Posted: 01 Feb 2016 | Published: 25 Jan 2016

LogicNow

Accenture Technology Vision 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

ComputerWeekly.com

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye

Maryland Government Agency Case Study: Growing Beyond the Limits
sponsored by Dell, Inc.
CASE STUDY: In this case study, you'll learn how a Maryland government agency responds to user needs faster thanks to a server and storage virtualization solution from Dell.
Posted: 02 Jul 2010 | Published: 01 Oct 2008

Dell, Inc.

Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud
sponsored by IBM
TECHNICAL ARTICLE: This article briefly describes the procurement challenges and then jumps into advising government cloud service purchasers on the positives and negatives of security in the cloud, and how to manage their potential vendors' security risks. Read on to learn more.
Posted: 13 Sep 2010 | Published: 17 Aug 2010

IBM

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Protecting Critical Data is a Main Priority for the U.S. Army
sponsored by GlobalScape
CASE STUDY: In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
Posted: 22 May 2014 | Published: 31 Dec 2013

GlobalScape

Reduce Fraud, Waste and Abuse with Flexible Analytics
sponsored by SAP America, Inc.
WHITE PAPER: This paper examines how SAP's latest analytics solutions can analyze multiple databases in real-time to identify and prevent improper government payments before they happen. Read on to learn how government agencies can leverage this technology to speed up the process of accessing multiple data sources, reduce the burden on IT staff and much more.
Posted: 27 Jun 2012 | Published: 27 Jun 2012

SAP America, Inc.

Improving Communications in Emergency Situations: Mobile Business Continuity Planning Solutions That Help Mitigate Risks and Improve Responsiveness to Emergency Situations
sponsored by BlackBerry
WHITE PAPER: This white paper addresses the ways in which organizations can ensure preparedness by deploying wireless software solutions based on the BlackBerry Enterprise Solution and BlackBerry applications from Wallace Wireless.
Posted: 08 Apr 2008 | Published: 01 Jan 2007

BlackBerry
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
DOT White Papers | DOT Multimedia | DOT IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement