Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

government management

Results 51 - 65 of 65Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 09, 2015
Government revenue management agencies are using computer technology to capture and harvest data and extract value from it. This paper explains the importance of being data-droven and outlines a way forward in the journey of getting there.
Tags : 
ibm, government, data, records, legal, information, benefits
    
IBM
Published By: Safari Books     Published Date: Jun 08, 2009
ITIL Version 3 Best Practices has expanded the concept of IT service delivery from day-to-day operations of those services to the Service Lifecycle. ITIL Version 3 Best Practices includes five lifecycle phases (each with its own guidebook): Strategy, Design, Transition (which covers implementation and change), Operations and Continual Improvement.
Tags : 
safari books online, government, it service management, itil, version 3, best practices, strategy, design, transition, maintenance, office of management and budget, omb, sox, sarbanes-oxley, it operations, service strategy, service design, service level management, slm, operational level agreements
    
Safari Books
Published By: Safari Books     Published Date: Jun 08, 2009
IT and business leaders today can no longer look at IT simply as a cost center, it is now a vital part of business success. Improving the efficiency of IT and improving the measurement of its impact on business performance are at the forefront of managers' concerns. Access to ITIL books can be instrumental in providing the methodology for IT improvement. Learn more today!
Tags : 
safari books online, government, it service management, itil, version 3, best practices, strategy, design, transition, maintenance, office of management and budget, omb, sox, sarbanes-oxley, it operations, service strategy, service design, service level management, slm, operational level agreements
    
Safari Books
Published By: Clearvale by BroadVision     Published Date: Aug 21, 2009
This white paper considers the drivers behind the move to e-government, the need for relationship management and the complexity of e-government value chains. It also outlines a solution that government entities can deploy to address this top priority of information management and sharing.
Tags : 
collaboration, egovernment, government, e-government, customer relationship management, constituent, constituents, citizens, citizen, information management, broadvision
    
Clearvale by BroadVision
Published By: Quocirca     Published Date: Nov 09, 2006
This paper looks at the particular challenges in public sector IT – the need to find efficiency savings at the same time as offering better service to citizens – and discusses the particular circumstances in which blade computing will be right for the public sector IT manager.
Tags : 
blade, blade server, blade servers, government, citizen, constituents, server selection, server implementation, service management, quocirca, infrastructure, server hardware, servers, power and cooling
    
Quocirca
Published By: Quocirca     Published Date: Nov 13, 2006
IT in the UK public sector is under intense scrutiny and needs to deliver better results:  much investment has been made which has too often failed to deliver. Projects have a history of being protracted and complex, offering significant challenges to all involved.
Tags : 
public sector, it management, government, project management, efficiency, productivity, quocirca
    
Quocirca
Published By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : 
spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security, network security, intrusion, intrusion detection, intrusion prevention, trojan, risk management, cyberwarfare, cyber warfare, technolytics
    
Technolytics
Published By: IFS     Published Date: Aug 11, 2011
Learn to select ERP for Aerospace and Defense Manufacturing, including requirements like PBL, government reporting, and government-owned inventory management.
Tags : 
ifs, defense manufacturing business, erp, enterprise resource planning, aerospace, pbl, government inventory management, mro, enterprise software
    
IFS
Published By: IFS     Published Date: Aug 11, 2011
Learn how to get certified in earned value management (EVM) and compete for government aerospace and defense contracts.
Tags : 
ifs, evm, earned value management, government aerospace, defense contracts, project management
    
IFS
Published By: LogRhythm     Published Date: Sep 26, 2008
Get the facts you need to know about how the collection, management and analysis of log data are integral to meeting many GCSx requirements. Read this whitepaper to learn more…
Tags : 
uk gcsx, uk compliance, gcsx, government connect secure extranet, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, department of homeland security, us government, military agency, civilian agency, military
    
HP - Enterprise
Published By: HP and Intel® Xeon® processors     Published Date: Dec 20, 2012
Download this rich media whitepaper to learn how and to hear from up to 3 customer references, IDC analysts and access additional reference articles on HP's converged infrastructure and more.
Tags : 
strategy guide, converged government, intel, data management, data center
    
HP and Intel® Xeon® processors
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
Learn how government and educational institutions are reducing their need for upfront storage capacity and making more efficient use of resources by eliminating stranded storage capacity using autonomic management and more.
Tags : 
strategy guide, public institutions, hp intel, it management, data center
    
Sponsored by HP and Intel® Xeon® processors
Published By: IBM     Published Date: Nov 05, 2013
Providing a superior experience for citizens and constituents is not easy, and gone are the days when problematic customer interactions can be smoothed over by empathetic service representatives. In an omni-channel world, the number of citizen touchpoints is not only increasing, but is increasingly automated, and governments will not get many chances to take the steps that are required to make things right. Unlike at any other time in history, the quality of your operations will shine through, in virtually every interaction with the citizen. A Smarter Process approach helps you to reinvent business operations in the era of the citizen.
Tags : 
government, smarter process approach, agility, business process management, bpm, cities, efficient government
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace. Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations.
Tags : 
(delete)mobile application, malware protection, mobile security, application security, proprietary software, open source software, cloud services, source code testing
    
IBM
Start   Previous    1 2 3     Next   End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.