Public Policy Making

RSS Feed    Add to Google    Add to My Yahoo!
Public Policy MakingReports
25 Matches
Cloud computing in the public sector
sponsored by ComputerWeekly.com
WHITE PAPER: This report looks at the promise and issues of cloud computing as described today, along with the direction cloud needs to take in order to fulfil on its promise.
Posted: 21 Oct 2011 | Published: 12 Jan 2011

ComputerWeekly.com

BYOPC Strategy: Policies and Problem Solving
sponsored by SearchSecurity.com
EGUIDE: Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

SearchSecurity.com

Defining Your Corporate Mobile Policies
sponsored by SearchSecurity.com
EGUIDE: It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization
Posted: 22 Sep 2008 | Published: 18 Sep 2008

SearchSecurity.com

Creating the hybrid organisation: Making public and private sector organisations relevant in the new economy
sponsored by ComputerWeekly.com
WHITE PAPER: This paper aims to explore the role and relevance of organisations in a future defined by economic uncertainty, changing workforce demographics, globalisation and rapid developments in social and business technologies.
Posted: 24 Oct 2011 | Published: 15 Jun 2010

ComputerWeekly.com

City University London Policy Challenge Report: Removing barriers to government using SME IT suppliers
sponsored by ComputerWeekly.com
WHITE PAPER: The present need to radically cut public expenditure provides a once in a generation opportunity to transform the efficiency of the public sector. In order to achieve this, the public sector needs to radically change its current business processes to achieve greater efficiency.
Posted: 21 Oct 2011 | Published: 18 Aug 2010

ComputerWeekly.com

Public Cloud Security Tips and Best Practices
sponsored by SearchBusinessAnalytics
EGUIDE: This expert E-Guide counts down 10 ways that that you can keep your applications safe in the public cloud. Also inside, uncover essential best practices for protecting your data and applications – read on to learn more.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

SearchBusinessAnalytics

Enterprise Integration with Public Cloud Services using OAuth
sponsored by Forum Systems
WHITE PAPER: This white paper features a deployment strategy for an authentication and authorization solution that requires no third-party access to user credentials – so that your information stays within the company.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

Design Security Policies For #GenMobile
sponsored by Aruba Networks
WHITE PAPER: This white paper highlights the 4 areas that must be addressed when providing secure, reliable access to business applications for mobile users. Click through to explore the essential tools you need for this strategy.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

Aruba Networks

Consumerization 101: Defining & Enforcing a Successful BYOD Policy
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft.
Posted: 21 Jan 2013 | Published: 21 Jan 2013

SearchSecurity.com

It's Just Ops -- DevOps for Windows and Linux
sponsored by OpenMake Software
WHITE PAPER: This informative white paper provides an overview of DevOps history and delves in to how operational procedures need to change for Windows and Linux developers to achieve DevOps success. Learn how to get started by assessing your current production process according to five core factors.
Posted: 29 May 2014 | Published: 29 May 2014

OpenMake Software

The Evolving Public Cloud Landscape
sponsored by NetApp
WHITE PAPER: In order to best use these services read this research paper that explains which organizations are at the forefront of the cloud adoption movement and how these services are being leveraged today.
Posted: 18 Jul 2014 | Published: 30 Jun 2014

NetApp

Standardize the Application Release Process
sponsored by OpenMake Software
WHITE PAPER: Improving the process of application packaging and deployment is a top priority for businesses working with distributed applications, such as Java. Without a centralized, standardized approach, enterprises with a large number of development teams and heterogeneous environments will continue to suffer from inefficiencies.
Posted: 30 May 2014 | Published: 30 May 2014

OpenMake Software

Why Choose Release Engineer for WebSphere Deployments?
sponsored by OpenMake Software
WHITE PAPER: A WebSphere deployment is no easy task, but what if you could automate the release of WebSphere applications, as well as non-WebSphere components? View this white paper to learn how to do exactly that with a release management software.
Posted: 30 May 2014 | Published: 30 May 2014

OpenMake Software

Application Release Automation (ARA) Basics
sponsored by OpenMake Software
WHITE PAPER: A model-driven framework with repeatable processes can help you take control of software release, and application release automation (ARA) can make it possible. This white paper provides and in-depth overview of what ARA software can offer your organization.
Posted: 29 May 2014 | Published: 29 May 2014

OpenMake Software

CW+: Quocirca report: Effective public sector citizen communication
sponsored by ComputerWeekly.com
WHITE PAPER: The UK public sector is in the midst of a period of transformation and improving citizen engagement will be key to the success of this change.
Posted: 21 Oct 2011 | Published: 12 Aug 2010

ComputerWeekly.com

How to Create a Mobile Security Policy
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com offers advice on how to plan and define a successful mobile security policy in your organization to ensure safety and control of your employees and their devices.
Posted: 09 Oct 2012 | Published: 09 Oct 2012

SearchSecurity.com

Analytical reporting: Inside IBM Cognos
sponsored by IBM
WHITE PAPER: The following white paper outlines an analytics solution that can provide a full range of analytic capabilities to your entire organization that will lead to a much stronger competitive presence in today's market.
Posted: 07 Nov 2013 | Published: 07 Nov 2013

IBM

E-Guide: Physical Security Awareness and Smartphone Security Policy
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

SearchSecurity.com

How Key MDM Features Affect Mobile Security Policy Management
sponsored by SearchSecurity.com
EGUIDE: In this expert guide from SearchSecurity.com, find out how to tackle developing your organization's mobile policy around the latest MDM solutions. Discover which features impact security the most and how you can establish a strategy that compliments them.
Posted: 20 Sep 2013 | Published: 20 Sep 2013

SearchSecurity.com

Creating and Enforcing Advanced Access Policies with Citrix XenApp
sponsored by Citrix
WHITE PAPER: IT needs a more granular way to manage and secure user access the right way for every scenario. Read on to find out how you can secure app delivery and achieve advanced access control with XenApp.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

Citrix

Open Group technical document: IT Specialist Certification Accreditation Policy
sponsored by ComputerWeekly.com
WHITE PAPER: A common characteristic of people-certification programs in the marketplace is that most test or validate the existence of relevant knowledge. Few reach beyond this.
Posted: 20 Oct 2011 | Published: 22 Oct 2010

ComputerWeekly.com

Tapping Into the Transformative Potential of Public Clouds
sponsored by Dell, Inc.
WHITE PAPER: Public clouds help speed business results. Discover how the Dell Cloud Partner Program can help rapidly enhance business processes and operational efficiency.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

Dell, Inc.

Fraud Detection and Prevention in the Public Sector
sponsored by Information Builders
WHITE PAPER: Those in the public sector are facing significant fraud, waste, and abuse (FWA) challenges. Check out this informative paper today to learn of these challenges and discover a fraud detection and prevention framework to help combat fraud before it occurs.
Posted: 01 May 2013 | Published: 01 May 2013

Information Builders

Improving Public Safety With Rugged Notebooks
sponsored by Dell, Inc.
CASE STUDY: This exclusive resource examines how a local police force utilized a "rugged" notebook solution built to endure rough conditions in order to improve public safety by boosting community police coverage.
Posted: 13 Jun 2014 | Published: 12 Jun 2014

Dell, Inc.
25 Matches
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement