IT Agents  >   Government Agencies (U.S.)  >   Department of Defense  >  

Defense Data Network Network Information Center

RSS Feed   
ALSO CALLED: DDN NIC, DDN Network Information Center
DEFINITION: The primary responsibility is the assignment of Internet addresses and Autonomous System numbers, the administration of the root domain, and providing information and support services to the Defense Data Network (DDN). It is also a primary repository for RFCs.
Defense Data Network Network Information Center Reports
51 - 60 of 60 Matches Previous Page  |  Next Page
The definitive IT troubleshooting guide
sponsored by TechTarget
RESOURCE: Applications composed of microservices in containers on distributed resources hardly look like their monolithic ancestors from just a few years ago. Yet, no matter the architecture, IT operations support must quickly identify and rectify any problems in production. Open this guide for best practices on monitoring for container-based applications.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget

The Global Information Technology Report 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from the World Economic Forum remains one of the most comprehensive and authoritative assessments of the impact of ICT on each country.
Posted: 15 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

The State and Local Cybersecurity Crisis
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Ransomware attacks are rising threat for government agencies. In 2019 alone, 22 cities experienced ransomware attacks – causing financial and reputational damage for agencies already facing budgetary constraints. Download this white paper to take a closer look at where the vulnerabilities lie & tactics that can help fill the resource gap.
Posted: 31 Jan 2020 | Published: 31 Jan 2020

Arctic Wolf Networks, Inc.

The State of Texas protects its data with a Defense in Depth cybersecurity strategy
sponsored by Capgemini
CASE STUDY: In this case study, uncover how the State of Texas Department of Information Resources developed a holistic security strategy in order to preserve the privacy of citizen data and protect personally identifiable information for users across the state.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Capgemini

Transforming the Delivery of Government Services the Texas Way
sponsored by Capgemini
CASE STUDY: Inside this publication, learn how the state of Texas’ Department of Information Resources (DIR) utilized a multi-sourcing service integration model to guide its digital transformation efforts – earning the ability to deliver world-class IT services to agencies across the state.
Posted: 19 Dec 2019 | Published: 18 Feb 2019

Capgemini

Visibility to Containers: Measurable outcomes from CMDB
sponsored by ServiceNow
EBOOK: Containers couple both applications and systems dependencies together into a single artifact and introduce a new layer of abstraction, simplifying DevOps. Access this eBook to learn how teams can leverage this efficiency to transform legacy IT into fast IT through automation, reduced costs, and improved productivity.
Posted: 22 Jan 2020 | Published: 22 Jan 2020

ServiceNow

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye
51 - 60 of 60 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info