Business of Information Technology  >   Business Environment  >   Political Environment  >   Governments  >  

Town Government

RSS Feed    Add to Google    Add to My Yahoo!
Town GovernmentReports
 
Mesh Network with Capacity to Share
sponsored by Motorola, Inc.
CASE STUDY: Read this case study to find out how a fast growing communications service provider successfully extended their business into new markets.
Posted: 08 Jun 2007 | Published: 01 Jun 2007

Motorola, Inc.

Security in the Face of Disaster
sponsored by Motorola, Inc.
CASE STUDY: Read this white paper to learn how a New Orleans-based systems integrator relied on Motorola's Canopy® wireless broadband platform to bring better communications and security to New Orleans.
Posted: 08 Jun 2007 | Published: 01 Jan 2006

Motorola, Inc.

Process-Centred Government - The Road to 2010
sponsored by Metastorm
WHITE PAPER: This paper argues that the i2010 programme needs to go further, and deeper, in its thinking on how to reengineer Europe's government machine for the twenty-first century global economy.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Metastorm

ComputerWeekly Special Report: Government’s digital strategy could cut red tape
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access the following special report on the public interest to uncover how the government plans on harnessing digital technology to make public services more efficient and generate significant cost savings. Read on to learn how this initiative may affect you in the near future.
Posted: 05 Feb 2014 | Published: 05 Feb 2014

Hewlett-Packard Limited

Protecting Government Information While Reducing Complexity and Ongoing Cost
sponsored by Dell
WHITE PAPER: Access this white paper to discover how virtualization and cloud computing are creating secure end user access to desktop resources.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Dell

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Are You Ready For a New Era in B2B Collaboration?
sponsored by IBM
WHITE PAPER: This white paper examines what companies can do to modernize their approach to business-to-business collaboration in response to trends like globalization, consumerization, and mobility.
Posted: 03 Sep 2014 | Published: 31 Mar 2014

IBM

Live Chat: Data Integration and Analytics in Healthcare: Unleash the Power of Your Information
sponsored by Orion Health
PRESENTATION TRANSCRIPT: Join Micky Tripathi, President and CEO of the Massachusetts eHealth Collaborative as he tackles data integration and analysis in health care. Turn your data challenges into opportunities with tips and advice from one of the industry's foremost experts.
Posted: 07 Feb 2013 | Published: 07 Feb 2013


Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement