IT Agents  >   Government Agencies (U.S.)  >   Department of Defense  >  

Defense Advanced Research Projects Agency

RSS Feed   
ALSO CALLED: Advanced Research Projects Agency, DARPA, ARPA
DEFINITION:  A cloak of invisibility is a method of rendering physical objects undetectable or invisible. Researchers from the United States and England have developed a prototype for a cloaking device that can hide an object approximately 30 centimeters (1 foot ) in diameter. The device works by producing a mirage, in a manner similar to the way a layer of heated air causes reflection or refraction of light to  … 

Defense Advanced Research Projects Agency definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Defense Advanced Research Projects Agency Reports
51 - 66 of 66 Matches Previous Page  |  Next Page
Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by SearchCRM
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchCRM

State of Georgia Becomes an Adaptive Provider of Modern IT Services
sponsored by Capgemini
CASE STUDY: Inside, learn how the Georgia Enterprise Technology Services (GETS) program, the IT infrastructure and network services provider for the state’s 89 executive branch agencies, consolidated its server and network resources to create an efficient, multi-service IT ecosystem.
Posted: 19 Dec 2019 | Published: 19 Dec 2019

Capgemini

The Global Information Technology Report 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from the World Economic Forum remains one of the most comprehensive and authoritative assessments of the impact of ICT on each country.
Posted: 15 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

The Government of Arlington Keeps Dreaming Thanks to IT Modernization
sponsored by Dell Technologies
WHITE PAPER: Arlington, Texas, a city of over 370,000 residents, proudly calls itself "The American Dream City." In this one pager, find out how the city used sophisticated strategy and governance practices to build an incredibly modernized IT infrastructure to help them live up to their name.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Dell Technologies

The State and Local Cybersecurity Crisis
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Ransomware attacks are rising threat for government agencies. In 2019 alone, 22 cities experienced ransomware attacks – causing financial and reputational damage for agencies already facing budgetary constraints. Download this white paper to take a closer look at where the vulnerabilities lie & tactics that can help fill the resource gap.
Posted: 31 Jan 2020 | Published: 31 Jan 2020

Arctic Wolf Networks, Inc.

The State of Texas protects its data with a Defense in Depth cybersecurity strategy
sponsored by Capgemini
CASE STUDY: In this case study, uncover how the State of Texas Department of Information Resources developed a holistic security strategy in order to preserve the privacy of citizen data and protect personally identifiable information for users across the state.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Capgemini

Transforming the Delivery of Government Services the Texas Way
sponsored by Capgemini
CASE STUDY: Inside this publication, learn how the state of Texas’ Department of Information Resources (DIR) utilized a multi-sourcing service integration model to guide its digital transformation efforts – earning the ability to deliver world-class IT services to agencies across the state.
Posted: 19 Dec 2019 | Published: 18 Feb 2019

Capgemini

Understanding the Economics of In-cloud Data Protection: Designed for Today with Tomorrow in Mind
sponsored by Dell EMC
WHITE PAPER: By using cloud-based data protection, organizations can provide enterprise-level protection at a reasonable cost and maximize their cloud resources. Read this ESG white paper to see the results of an annual IT spending intentions survey which outlines 3 major benefits of incorporating in-cloud data protection into your strategy for cloud workloads.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Dell EMC

Visibility to Containers: Measurable outcomes from CMDB
sponsored by ServiceNow
EBOOK: Containers couple both applications and systems dependencies together into a single artifact and introduce a new layer of abstraction, simplifying DevOps. Access this eBook to learn how teams can leverage this efficiency to transform legacy IT into fast IT through automation, reduced costs, and improved productivity.
Posted: 22 Jan 2020 | Published: 22 Jan 2020

ServiceNow

Workforce Transformation: A Guide and Checklist for Change
sponsored by Dell Technologies
WHITE PAPER: Discover how government organizations can take steps to align their workforce culture with modernization efforts. Inside, you’ll also find a best practices checklist to gauge the status of your workforce.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Dell Technologies

Technical Guide on Government Security
sponsored by SearchSecurity.com
EGUIDE: Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats.
Posted: 26 May 2011 | Published: 23 May 2011

SearchSecurity.com

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye
51 - 66 of 66 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info