IT Agents  >  

Government Departments

RSS Feed    Add to Google    Add to My Yahoo!
Government DepartmentsReports
 
U.S. Army Relies on GlobalscapeĀ® to Protect Critical Data
sponsored by GlobalScape
CASE STUDY: In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
Posted: 22 May 2014 | Published: 31 Dec 2013

GlobalScape

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risksĀ  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Put an End to Unplanned Outages
sponsored by Cox Communications, Inc.
WHITE PAPER: This white paper introduces one company's solutions to the critical issue of unplanned IT outages, ensuring maximum uptime and minimal losses in the event of a disruption.
Posted: 17 Jul 2014 | Published: 31 Dec 2013

Cox Communications, Inc.

Global Sourcing Trends in 2012
sponsored by ComputerWeekly.com
IT BRIEFING: The latest IT outsourcing trends from global law firm Morrison & Foerster.
Posted: 05 Mar 2012 | Published: 05 Mar 2012

ComputerWeekly.com

The Six Critical Skills for Leading Complex Federal Projects
sponsored by Global Knowledge
WHITE PAPER: Managing a project within a government entity can be difficult with the sheer magnitude of the red tape involved. There are, however, several steps that you can take as a project manager to get ahead of the curve and anticipate previously unforeseen risks and issues with your project team.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Global Knowledge

Maryland Government Agency Case Study: Growing Beyond the Limits
sponsored by Dell, Inc.
CASE STUDY: In this case study, you'll learn how a Maryland government agency responds to user needs faster thanks to a server and storage virtualization solution from Dell.
Posted: 02 Jul 2010 | Published: 01 Oct 2008

Dell, Inc.

Modern Cyber Threats and Government Agencies
sponsored by M86 Security
WHITE PAPER: View this paper to explore how and why targeted attacks work, modern cyber attacks in the real world, the rise in public sector attacks, Web and email security solutions and more.
Posted: 18 Nov 2011 | Published: 18 Nov 2011

M86 Security

Optimizing the PC Segment of California's IT Infrastructure
sponsored by Intel Corporation
CASE STUDY: Researchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.
Posted: 27 May 2009 | Published: 27 May 2009

Intel Corporation

Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER: This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007

IBM Line of Business

Cloud Computing: Get to know the basics
sponsored by Red Hat
WHITE PAPER: This white paper explains how government IT can enjoy cloud capabilities while keeping existing IT investments and avoiding vendor lock-in. Explore how open source and application portability in the cloud and the relationships between technology providers are critical to building a successful cloud strategy.
Posted: 23 Jan 2012 | Published: 05 Jan 2012

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement