IT Agents  >  

Government Departments

RSS Feed    Add to Google    Add to My Yahoo!
Government Departments Reports
Global Risks 2014
sponsored by
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

Implementing a Data Integration Strategy For Legacy Modernization
sponsored by Information Builders
WHITE PAPER: This white paper explains why federal agencies need to prioritize legacy modernization and the creation of a fully unified data quality and integration infrastructure in order to gain a unified view of business data.
Posted: 25 Mar 2015 | Published: 25 Mar 2015

Information Builders

A Modern Disaster Recovery Approach Fit for US Government Security Standards
sponsored by NTT America, Inc.
CASE STUDY: In this business impact summary, find out how one government organization formed a flexible, fast, and cloud-based disaster recovery strategy that held up under strict regulations.
Posted: 17 Sep 2015 | Published: 30 Apr 2015

NTT America, Inc.

California Sets New Standard For IT With Shared Services
sponsored by NetApp
CASE STUDY: This case study explores how a large state agency implemented a cloud infrastructure to help unite 29 IT departments, lower costs, and increase data storage capacity.
Posted: 09 Jul 2015 | Published: 31 Dec 2014


The Six Critical Skills for Leading Complex Federal Projects
sponsored by Global Knowledge
WHITE PAPER: Managing a project within a government entity can be difficult with the sheer magnitude of the red tape involved. There are, however, several steps that you can take as a project manager to get ahead of the curve and anticipate previously unforeseen risks and issues with your project team.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Global Knowledge

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009


Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
Posted: 09 May 2014 | Published: 31 Dec 2013


Protecting Critical Data is a Main Priority for the U.S. Army
sponsored by GlobalScape
CASE STUDY: In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
Posted: 22 May 2014 | Published: 31 Dec 2013


Asset and service management solutions to manage government assets
sponsored by IBM
BROCHURE: Read this brochure and find out how IBM Maximo Asset Management helps government agencies address accountability with asset optimization.
Posted: 15 Apr 2011 | Published: 15 Apr 2011


Social Media in Government: 5 Key Considerations
sponsored by Hootsuite
WHITE PAPER: Government agencies have begun to follow private-sector companies in leveraging social media, but may still have questions regarding the tools, processes, and organizational changes required to make social media work. This informative resource details the five top considerations for government agencies looking to deploy social media strategies.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement