You've requested...

Share this with your colleagues:

Workforce Modernization Technologies Give Maryland's Public Defenders More Time in the Local Community

If a new window did not open, click here to view this asset.

Download this next:

Government Modernization Technologies Give Maryland's Public Defenders More Time in the Local Community

The Maryland Office of the Public Defender (OPD) is a statewide agency that provides legal representation to people charged with crimes but cannot afford a lawyer of their own. But with only about 600 public defenders and an excess of 225,000 cases per year, the OPD was quickly finding its infrastructure and devices pushed to the limit.

In this case study, find out how Maryland’s OPD made the right technology choices to keep up with growing case volumes, keeping their defenders equipped with the right tools to increase productivity, efficiency, and ultimately ensure top-of-the-line representation.

Download this white paper from Dell EMC and Intel® to learn more.

These are also closely related to: "Workforce Modernization Technologies Give Maryland's Public Defenders More Time in the Local Community"

  • How to launch a mainframe SIEM initiative

    SIEM systems have long been the industry standard for enterprise network security, but the mainframe has mostly been left out of this predominantly distributed discipline.

    This siloed friction between the “two worlds of IT” has resulted in a lack of security cohesion across both platforms, and has weakened what must be a unified front against the growing threat of cybercrime.

    In this white paper, learn how to launch a mainframe SIEM initiative. Also explore 4 steps to ensure malicious mainframe activity triggers a notification to the appropriate security systems and personnel in real-time.

  • Low-code vs. manual coding: Tackling 5 key development challenges

    Many organizations are adopting low-code rapid app development (RAD) platforms to create everything from small user apps to fully integrated core systems.

    To understand why this shift is occurring and explore the benefits of RAD fully, it’s important to look at how low-code development avoids some of the challenges of traditional coding.

    Discover 5 development challenges organizations face when hand coding or using Waterfall methodologies over a RAD platform, including:

    • Apps typically require 10x more work today
    • Relevant skillsets are in short supply
    • And 3 more

Find more content like what you just read:

  • How to reconnect physicians with their love of medicine

    For physicians, practicing medicine today isn't what it was 20 years ago. In this e-book, find out why healthcare organizations must act aggressively to reconnect physicians with their love of medicine – for the sake of their business performance, quality of patient care and overall vitality of the healthcare system.


  • Tactics to combat insider threat

    This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.


  • Defend against 5 common threats with customized detection

    Find out why many existing security practices struggle to keep up with 5 of the leading cyberthreats, and learn about the important roles played by a security operations center and customized threat detection in maintaining compliance.


  • CW ANZ: Rise to the big data challenge

    In this month's issue of CW ANZ, we look at how Aussie organisations are fine-tuning their storage strategy to keep up with the demands of big data without compromising performance and service levels.


  • UK steps towards “Digital Britain” with the introduction of the Digital Economy Act 2010

    In this article, we describe how some key Digital Britain proposals have been implemented in the Digital Economy Act 2010.


  • Legal briefing: The Draft EU General Data Protection Regulation

    This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation.


  • E-Guide: Preventing and detecting security vulnerabilities in Web applications

    The extent of fundamental security flaws in most applications often requires a re-architecture, but there are some secondary measures information security teams can take to safeguard faulty applications. This expert tip maps out the steps security professionals should take to lock down their Web applications.


  • What does HIPAA prescribe for health IT?

    Download this expert guide to find out why HIPAA compliance is not guaranteed with ePHI security and uncover how strengthening you cybersecurity strategy can better protect patient data from attacks.


  • Social Engineering in IT Security

    This extract from Sharon Conheady's book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves.


  • Managed detection and response: Case study results

    Maslon, a Minneapolis law firm, recognized that active monitoring was a requirement and they needed to ensure they had the tools and resources to find potential threats 24/7. Read on to learn how Maslon found exceptional results using Managed Detection and Response (MDR).


  • SD-WAN benefits in a distributed business

    In this resource, find out the WAN requirements for legal services and how SD-WAN offers benefits to the network including reliability, predictable application performance and improved security.


  • How to comply with the California privacy act: Data privacy guide

    In this e-guide, get a better understanding of data privacy through two expert articles about the intersection of marketing and data privacy as well as everything you need to know about the California Consumer Privacy Act.


  • How to improve online engagement across multiple channels

    How did one media company overcome the unnecessary complexity of their CMS and editorial workflow? In this case study, explore how Cloudinary helped this media company eliminate unnecessary workflows, manage their images, and boost customer engagement by 20%. Delve into this case study to learn more.


  • Recommendations on rolling back government surveillance

    Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.


  • What happens when you set up traps for cyberattackers?

    As the cloud gains momentum, protecting sensitive data no longer means simply safeguarding on-premises infrastructure. Take a look at this resource to uncover the results from a real-world demonstration that shows the types of attacks targeting public cloud environments for small and midsized businesses.


  • How PBS built a content delivery platform that's future-proof

    View this case study to learn how 3Pillar helped PBS rebuild its multitenant CMS and enhance its digital ecosystem. Learn how 3Pillar can help accelerate development and deployment across your organization, and decide if 3Pillar is right for you.


  • 5 key tools for digital transformation

    In this e-book, discover the ways in which technology has reshaped the retail industry. Explore how Alibaba Cloud is helping retailers achieve digital transformation, and learn how to build digital success in retail by unlocking 5 key tools to retail transformation.


  • How to ensure your organization is audit-ready

    Compliance regulations originated as efforts to ensure data security, but they have morphed into overwhelming challenges for IT and security teams. In this white paper, learn how Cymulate's Breach and Attack Simulation can ensure your organization is audit-ready while also measuring the level of risk across your threat vectors and infrastructure.


  • How to manage privileged accounts

    Managing privileged accounts is becoming more critical as security and compliance initiatives grow. This white paper explores the risks associated with privileged accounts, and offers an easy-to-use risk mitigation strategy, which enables granular access control and accountability.


  • How contact centers can improve compliance with interaction analytics

    In this white paper, discover how companies are increasing compliance with interaction analytics, and explore how interaction analytics can help organizations improve contact center performance while increasing compliance with regulations from TCPA, HIPAA, EFTA, CFPB, and more.


  • Using IT initiatives to save money and reinforce green credentials

    Analyst Group Quocirca explains how organisations can use web data caching software to save money and improve their green credentials.


  • Phishing fraud: A Dr. Seuss storybook

    In this Dr. Seuss style storybook, discover how numerous types of fraud, such as credit card, phishing, account takeover, and more can affect your organization.


  • How law firms protect their most sensitive data

    Domański Zakrzewski Palinka, the leading law firm in Poland, needed to protect sensitive client data from increasingly sophisticated cyberattacks. Learn about the modern security strategy that provided them an ability to detect both known and unknown threats.


  • MSSP vs. SOC-as-a-service: What's best to combat today's threats?

    Find out how the IT staff at the Pennsylvania Housing Finance Agency (PHFA) realized they needed to do more to address today's threat landscape, and why they selected a SOC-as-a-service to meet their security needs. Continue reading to uncover the challenges PFHA faced that led them to a new first line of defense.


  • How the Columbia County Sheriff's Office is able to authenticate users

    The Columbia County Sheriff's Office has evolved its approach to protecting information by verifying the identities of everyone who accesses the network or the agency's computers. In this case study, learn how they turned to HID Global to help them comply with the FBI's security policy, increase overall security and improve user experience.


  • Solving API management issues around scalability, security, and support

    Open this whitepaper on an API solution that will help your organization solve the most common API management issues around the 3 S's: scalability, security, and support.


  • How to stay on top of the rapidly evolving communications landscape: Risk guide

    How can firms improve their supervision workflows to better reveal risk? In this guide, examine some strategies for staying on top of the rapidly evolving communications landscape, and the new vectors for risk it offers.


  • Configuration Management for Virtual and Cloud Infrastructures

    The top seven things to consider when managing configuration for virtual and cloud infrastructures.


  • Analyst's take: Surety's AbsoluteProof protects data integrity

    Surety’s AbsoluteProof provides organizations with a means to ensure the veracity and integrity of electronic records, files, and other digital content over time, strengthening intellectual property protection while reducing risk.


  • MicroScope: Hatch a plan for retirement

    An issue looking at the issues around business management and retirement and how distribution plays a crucial role with cloud and IoT.


  • How to protect your business against fraudulent activity

    Threat actors are constantly discovering new ways to commit fraud to exploit a wide range of online services. Companies and their customers face the risk of losing money, ruining reputations and protecting the integrity of programs. In this white paper, learn how to protect your business against fraudulent activity.


  • Virtual Data Center: Health Care IT Edition, Sept. 2011

    Cloud computing holds a lot of promise for the healthcare industry, since infrastructure costs can hinder the adoption of EHR systems. However, many providers shy away from cloud services because of security concerns. Inside this e-zine, gain insight on how to utilize the cloud while still ensuring patient data security and HIPAA compliance.


  • Lean ITSM Methods in Lean Times

    As IT shops continue to look for ways to cut costs, increase efficiency and improve service, many turn to IT Service Management frameworks for guidance. Learn how to adopt or advance your use of ITSM practices to streamline IT and build an efficient, service-oriented organization.


  • Expert Tips: Making ITSM Part of Your IT Strategy

    In this e-guide learn how to protect your organization’s overall value by utilizing ITSM. Discover why it is important that your IT strategy and service desk operations go hand-in-hand, which three ITIL service operations to use to ensure value throughout the service lifecycle, and learn how service desk can prepare to support these activities.


  • UKtech50 2018: The 50 most influential people in UK IT

    In this e-guide, you will find our definitive list of the movers and shakers in UK IT – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy. This is our top 50 most influential people in UK IT for 2019.


  • NSA insiders reveal what went wrong

    Former NSA employees explain how the agency missed vital intelligence on 9/11, broke the US constitution through mass surveillance against US citizens, and wasted billions of dollars on technology.


  • Managed WAN vs. SD-WAN vs. 4G/5G: Compare your service options

    This ISG research report takes a look at the network services currently leading the market – both the new and the old, but with a particular emphasis on SDN-based approaches. To learn more about your options for WAN, SD-WAN, 4G/5G mobility, and other managed networking services, explore the report's key findings.


  • Vulnerability disclosure policies – Understand the basics

    Download this article to find out what a vulnerability disclosure policy (VDP) is, what's included in a good policy, which organizations have a VDP today, and which government agencies have published guidance on VDPs.


  • Top 10 IT security stories of 2018

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.


  • E-Book: New Enterprise Desktop Chapter 3: Windows 7 Security: Strengths and Weaknesses

    Each new OS is touted as the “Holy Grail” of features that every IT pro has been waiting for. Windows 7 is no different. This chapter looks at the Windows 7 security features such as BitLocker and Action Center, and separates those that really count from those that sound better on paper.


  • Explore the power of personalization

    View this white paper to learn why "sit and get" workshop-based professional development (PD) isn't enough. Explore how a personalized PD program can help educators, students, and districts achieve higher success rates, and decide if a personalized PD program is right for your organization.


  • How to optimize your digital marketing efforts

    View this white paper to learn how Alibaba Cloud can help your marketing team run more efficient marketing campaigns, improve customer-brand interaction, upscale their advertisements, and more.


  • HD video and audio for interactive webinars

    Read this white paper to learn about a video communications system that is designed to be easy to use and intuitive—enabling you to engage your audience through HD video and audio, broadcast your event to Facebook Live and YouTube, identify quality leads with reporting and analytics, and more.


  • Data management: How to avoid management pitfalls

    CIOs are turning to emerging forms of data management, including predictive business intelligence and information architectures, to harness the power of their data. Inside this expert e-book, gain insight on data management topics such as storage and retention policies, data protection and lifecycle management.


  • CW+: Online in the afterlife

    There is no escaping technology – even in death. Technology is woven into now almost every part of ourlives and as a consequence is something we need to consider when preparing a will in the event of death.


  • Overburdened with growing app dev requests?

    Download this resource to learn how a no/low code development platform can help your developers quickly, build, test, and deploy applications without writing a line of code – saving time and money.


  • 6 simple steps to modernizing your public records

    Ensuring your recordkeeping efforts are cutting edge is your best strategy for avoiding fines and litigation resulting from public records gaps. In this crash-course guide, explore how modernizing your public recordkeeping solutions can help protect your organization from costly fines and bridge critical data gaps.