Public Policy Making

RSS Feed    Add to Google    Add to My Yahoo!
Public Policy MakingReports
25 Matches
Cloud computing in the public sector
sponsored by ComputerWeekly.com
WHITE PAPER: This report looks at the promise and issues of cloud computing as described today, along with the direction cloud needs to take in order to fulfil on its promise.
Posted: 21 Oct 2011 | Published: 12 Jan 2011

ComputerWeekly.com

Creating the hybrid organisation: Making public and private sector organisations relevant in the new economy
sponsored by ComputerWeekly.com
WHITE PAPER: This paper aims to explore the role and relevance of organisations in a future defined by economic uncertainty, changing workforce demographics, globalisation and rapid developments in social and business technologies.
Posted: 24 Oct 2011 | Published: 15 Jun 2010

ComputerWeekly.com

BYOPC Strategy: Policies and Problem Solving
sponsored by SearchSecurity.com
EGUIDE: Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

SearchSecurity.com

Defining Your Corporate Mobile Policies
sponsored by SearchSecurity.com
EGUIDE: It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization
Posted: 22 Sep 2008 | Published: 18 Sep 2008

SearchSecurity.com

Technology Tools and Policies for Corporate Compliance
sponsored by SearchCompliance.com
EBOOK: In this SearchCompliance handbook, we examine the technology tools and policies organizations are implementing as part of a wide-ranging corporate compliance program.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

SearchCompliance.com

City University London Policy Challenge Report: Removing barriers to government using SME IT suppliers
sponsored by ComputerWeekly.com
WHITE PAPER: The present need to radically cut public expenditure provides a once in a generation opportunity to transform the efficiency of the public sector. In order to achieve this, the public sector needs to radically change its current business processes to achieve greater efficiency.
Posted: 21 Oct 2011 | Published: 18 Aug 2010

ComputerWeekly.com

Public Cloud Security Tips and Best Practices
sponsored by SearchBusinessAnalytics
EGUIDE: This expert E-Guide counts down 10 ways that that you can keep your applications safe in the public cloud. Also inside, uncover essential best practices for protecting your data and applications – read on to learn more.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

SearchBusinessAnalytics

A Cloud Model that Maximizes the Benefits of the Public and Private Cloud
sponsored by VMware
WHITE PAPER: This exclusive whitepaper covers a third cloud model that brings together the on-premise control of the private cloud with the off-premise flexibility of the public cloud.
Posted: 05 Aug 2014 | Published: 10 Sep 2013

VMware

Cloud Security FAQs: Migrating applications to the public cloud
sponsored by CA Technologies.
EGUIDE: This expert e-guide explores the steps to take before migrating data applications into the public cloud. In addition, gain insight on cloud app development and cloud APIs in our useful FAQ.
Posted: 24 Jan 2013 | Published: 24 Jan 2013

CA Technologies.

The Insider’s Guide to New Era Policy-Based Governance
sponsored by VMware
WHITE PAPER: This whitepaper offers a software-defined-data-center as solution for fixing antiquated IT infrastructure and making the IT department more agile.
Posted: 28 Mar 2014 | Published: 22 Mar 2013

VMware

Enterprise Integration with Public Cloud Services using OAuth
sponsored by Forum Systems
WHITE PAPER: This white paper features a deployment strategy for an authentication and authorization solution that requires no third-party access to user credentials – so that your information stays within the company.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Making the Case for a BYOD Alternative
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to find out why your business should implement COPE and learn how to cut down device chaos, reduce costs, tighten content control, and more!
Posted: 03 Jun 2014 | Published: 30 Jul 2014

CA Technologies.

BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

Consumerization 101: Defining & Enforcing a Successful BYOD Policy
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft.
Posted: 21 Jan 2013 | Published: 21 Jan 2013

SearchSecurity.com

Best Practices for Making BYOD Simple and Secure
sponsored by Citrix Systems, Inc.
WHITE PAPER: This white paper presents practical guidance and best practices for using desktop virtualization, a self-service app store and secure file sharing and synchronization to deliver on-demand files, apps and desktops to any type of device, allowing organizations to leverage the full power of consumerization.
Posted: 19 Nov 2012 | Published: 30 Mar 2012

Citrix Systems, Inc.

The Evolving Public Cloud Landscape
sponsored by NetApp
WHITE PAPER: In order to best use these services read this research paper that explains which organizations are at the forefront of the cloud adoption movement and how these services are being leveraged today.
Posted: 18 Jul 2014 | Published: 30 Jun 2014

NetApp

Managing Complex Decision-Making Processes in the Financial Services Industry
sponsored by IBM
WHITE PAPER: In this whitepaper, you'll learn what strategies and technologies financial institutions can adopt in order to attain new levels of efficiency and competitive differentiation.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

IBM

CW+: Quocirca report: Effective public sector citizen communication
sponsored by ComputerWeekly.com
WHITE PAPER: The UK public sector is in the midst of a period of transformation and improving citizen engagement will be key to the success of this change.
Posted: 21 Oct 2011 | Published: 12 Aug 2010

ComputerWeekly.com

From MSP to CSP: Making the Transition
sponsored by Egenera
WEBCAST: Watch this webcast to find out how MSPs and enterprises can simplify and automate the delivery of IT services through the implementation of public, private and hybrid cloud services.
Posted: 12 Aug 2014 | Premiered: Jan 22, 2014

Egenera

How to Create a Mobile Security Policy
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com offers advice on how to plan and define a successful mobile security policy in your organization to ensure safety and control of your employees and their devices.
Posted: 09 Oct 2012 | Published: 09 Oct 2012

SearchSecurity.com

Analytical reporting: Inside IBM Cognos
sponsored by IBM
WHITE PAPER: The following white paper outlines an analytics solution that can provide a full range of analytic capabilities to your entire organization that will lead to a much stronger competitive presence in today's market.
Posted: 07 Nov 2013 | Published: 07 Nov 2013

IBM

E-Guide: Physical Security Awareness and Smartphone Security Policy
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

SearchSecurity.com

How Key MDM Features Affect Mobile Security Policy Management
sponsored by SearchSecurity.com
EGUIDE: In this expert guide from SearchSecurity.com, find out how to tackle developing your organization's mobile policy around the latest MDM solutions. Discover which features impact security the most and how you can establish a strategy that compliments them.
Posted: 20 Sep 2013 | Published: 20 Sep 2013

SearchSecurity.com

Creating and Enforcing Advanced Access Policies with Citrix XenApp
sponsored by Citrix
WHITE PAPER: IT needs a more granular way to manage and secure user access the right way for every scenario. Read on to find out how you can secure app delivery and achieve advanced access control with XenApp.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

Citrix

Open Group technical document: IT Specialist Certification Accreditation Policy
sponsored by ComputerWeekly.com
WHITE PAPER: A common characteristic of people-certification programs in the marketplace is that most test or validate the existence of relevant knowledge. Few reach beyond this.
Posted: 20 Oct 2011 | Published: 22 Oct 2010

ComputerWeekly.com
25 Matches
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement