IT Agents  >   Government Agencies (U.S.)  >  

Federal Geographic Data Committee

RSS Feed   
Federal Geographic Data Committee Reports
51 - 63 of 63 Matches Previous Page  |  Next Page
The definitive IT troubleshooting guide
sponsored by TechTarget
RESOURCE: Applications composed of microservices in containers on distributed resources hardly look like their monolithic ancestors from just a few years ago. Yet, no matter the architecture, IT operations support must quickly identify and rectify any problems in production. Open this guide for best practices on monitoring for container-based applications.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget

The Global Information Technology Report 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from the World Economic Forum remains one of the most comprehensive and authoritative assessments of the impact of ICT on each country.
Posted: 15 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

The On-Call Survival Guide
sponsored by PagerDuty
EBOOK: With the right approach, a culture of collaboration, infrastructure insight, and the right tools in place, being on-call doesn’t have to be so bad—and this e-book can help! Read on to key into 5 on-call responsibilities vs. what’s not your responsibility, on-call etiquette, and more.
Posted: 18 May 2020 | Published: 18 May 2020

PagerDuty

The State and Local Cybersecurity Crisis
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Ransomware attacks are rising threat for government agencies. In 2019 alone, 22 cities experienced ransomware attacks – causing financial and reputational damage for agencies already facing budgetary constraints. Download this white paper to take a closer look at where the vulnerabilities lie & tactics that can help fill the resource gap.
Posted: 31 Jan 2020 | Published: 31 Jan 2020

Arctic Wolf Networks, Inc.

The State of Texas protects its data with a Defense in Depth cybersecurity strategy
sponsored by Capgemini
CASE STUDY: In this case study, uncover how the State of Texas Department of Information Resources developed a holistic security strategy in order to preserve the privacy of citizen data and protect personally identifiable information for users across the state.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Capgemini

Transforming the Delivery of Government Services the Texas Way
sponsored by Capgemini
CASE STUDY: Inside this publication, learn how the state of Texas’ Department of Information Resources (DIR) utilized a multi-sourcing service integration model to guide its digital transformation efforts – earning the ability to deliver world-class IT services to agencies across the state.
Posted: 19 Dec 2019 | Published: 18 Feb 2019

Capgemini

Visibility to Containers: Measurable outcomes from CMDB
sponsored by ServiceNow
EBOOK: Containers couple both applications and systems dependencies together into a single artifact and introduce a new layer of abstraction, simplifying DevOps. Access this eBook to learn how teams can leverage this efficiency to transform legacy IT into fast IT through automation, reduced costs, and improved productivity.
Posted: 22 Jan 2020 | Published: 22 Jan 2020

ServiceNow

Technical Guide on Government Security
sponsored by SearchSecurity.com
EGUIDE: Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats.
Posted: 26 May 2011 | Published: 23 May 2011

SearchSecurity.com

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye
51 - 63 of 63 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info