Skip to main content
 

government

Results 351 - 375 of 483Sort Results By: Published Date | Title | Company Name
Published By: Quocirca     Published Date: Nov 13, 2006
IT in the UK public sector is under intense scrutiny and needs to deliver better results:  much investment has been made which has too often failed to deliver. Projects have a history of being protracted and complex, offering significant challenges to all involved.
Tags : 
public sector, it management, government, project management, efficiency, productivity, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : 
quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations, ngos, network centric warfare, ncw, standardized battlespace, common operating picture, cop, access points, networking
    
Quocirca
Published By: Rackspace     Published Date: Jan 19, 2016
Founded in Austin, Texas, in 2001, Troux Technologies performs enterprise portfolio management and enterprise architecture for Global 2000 customers including leading global financial institutions, multinationals in various industries and governmental clients.
Tags : 
rackspace, troux, client success, private cloud
    
Rackspace
Published By: Recorded Future     Published Date: Feb 13, 2019
There has been much speculation (not to mention exaggeration) over recent years about the fabled dark web. We’ve heard how this shady underworld is the refuge of the cybercriminal elite, and even nation-state threat actors. That this is their “Wolf’s Lair,” where they gather to plot the breaching of businesses, the downfall of governments, and the hacking of celebrities. As with much mainstream reporting of technology, and cyber threats in particular, there’s a grain of truth here. This less accessible and more volatile corner of the internet as we know it does offer those with less honourable motive a secret marketplace for their wares. The confusing terminology around what the dark web is or isn’t shouldn’t be a barrier to defenders realizing the anonymous communities, and how it can be used to produce valuable threat intelligence.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
There has been much speculation (not to mention exaggeration) over recent years about the fabled dark web. We’ve heard how this shady underworld is the refuge of the cybercriminal elite, and even nation-state threat actors. That this is their “Wolf’s Lair,” where they gather to plot the breaching of businesses, the downfall of governments, and the hacking of celebrities. As with much mainstream reporting of technology, and cyber threats in particular, there’s a grain of truth here. This less accessible and more volatile corner of the internet as we know it does offer those with less honourable motive a secret marketplace for their wares. The confusing terminology around what the dark web is or isn’t shouldn’t be a barrier to defenders realizing the anonymous communities, and how it can be used to produce valuable threat intelligence.
Tags : 
    
Recorded Future
Published By: Recruiting.com     Published Date: Jul 08, 2015
In this white paper, we’ll share some of our key discoveries to help you attract more technical candidates and fill your technical roles.
Tags : 
tech talent, private sector employers, talent acquisition, employment brand, recruiting, hiring, recruitment, benefits, human resources
    
Recruiting.com
Published By: Red Hat     Published Date: Jan 21, 2011
Gunnar Hellekson - Chief Technology Strategist, US Public Sector, Red Hat The government was an early advocate of open source and Red Hat. Red Hat is now ubiquitous, in every state, every branch of the Department Of Defense, and in every cabinet-level agency. After ten years, we no longer hear about security or whether open source is ready for the enterprise. So what's next? How is Red Hat driving the next wave of innovation in government?
Tags : 
red hat virtual tradeshow, live event, us government, public sector, department of defense
    
Red Hat
Published By: Red Hat     Published Date: Jun 23, 2016
Cisco is a leading provider of networking solutions that transform how people connect, communicate, and collaborate. A US $47 billion global company, Cisco develops intelligent networks and technology architectures for customers in industries ranging from government and military to healthcare and transportation. To help keep pace with rapidly changing customer demand, Cisco built its internal Lightweight Application Environment on OpenShift Enterprise by Red Hat. With this solution, Cisco IT delivers application middleware quickly and easily to internal developers through a self-service portal. Cisco has decreased time to market for new applications, streamlined the infrastructure using containers, increased operational efficiencies, and improved the developer experience.
Tags : 
cisco, best practices, networking, software development, productivity
    
Red Hat
Published By: Red Hat Government     Published Date: Jul 21, 2011
This whitepaper describes the various forms that cloud computing can take and how different types of technology relate to each other.
Tags : 
red hat, open source, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, jboss
    
Red Hat Government
Published By: Red Hat Government     Published Date: Jul 21, 2011
An IDC executive report examines the future of cloud computing, focusing on design goals that support portability of applications and data, which will certainly avoid expensive and time-consuming fixes.
Tags : 
cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government
    
Red Hat Government
Published By: Red Hat Government     Published Date: Jul 21, 2011
Learn how your organization can deliver self-service application provisioning, flexible and standardized application deployments, and integrated management, without losing control or radically change existing management and development processes.
Tags : 
red hat, open source, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, jboss, government
    
Red Hat Government
Published By: Red Hat Government     Published Date: Jul 21, 2011
Learn how CloudForms fully delivers on your requirements to increase business agility, efficiency, innovation, and simplified IT management.
Tags : 
cloudforms, red hat, iaas, infrastructure, service, open source, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, jboss, government, cloud
    
Red Hat Government
Published By: Red Hat Government     Published Date: Jul 21, 2011
The Red Hat Cloud Quickstart consulting engagement leverages Red Hat's Cloud Foundations Reference Architecture Edition One to speed up assessing the viability of a cloud environment for your enterprise, and, if chosen, it can demonstrate a tangible implementation of a private cloud for testing purposes.
Tags : 
cloud quickstart, cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government
    
Red Hat Government
Published By: Red Hat Government     Published Date: Jul 21, 2011
Do you have an effective cloud governance plan? This whitepaper guides you through best practices for ensuring your applications and data can safely move between clouds - whether they are private, public or hybrid.
Tags : 
cloud governance, governance, consistency, portability, consistant, portable, cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government
    
Red Hat Government
Published By: Red Hat Government     Published Date: Jul 21, 2011
Organizations around the world are benefiting from public clouds. But, when production applications or critical data is involved, it's important to extend on-premise governance to your public or hybrid cloud resources. Effective cloud governance is possible.
Tags : 
cloud governance, governance, cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government
    
Red Hat Government
Published By: Red Hat Government     Published Date: Jul 21, 2011
Virtualization and cloud computing are sometimes discussed interchangeably. But gaining the full benefits of cloud computing requires approaches and processes that often aren't in place where ad hoc virtualization is the norm. Join us and learn how to make a smooth transition.
Tags : 
cloud governance, governance, cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government
    
Red Hat Government
Published By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation, is a piece of legislation that was approved and put in to place by the European Parliament in April 2016. As European Law, it will fully take effect after a 2-year transition ending May 25th 2018. GDPR, replaces the previous Data Protection Directive (DPD), adopted in 1995, and will in the UK, replace and strengthen the Data Protection Act 1998 (DPA). One of the initial differences between GDPR and DPD, is that GDPR is a regulation not a directive; as a regulation, no additional enabling legislation will have to be passed by governments of member states. Redstor have the ability to give insight into the data organisations have on their networks, advise on best practice to protect data and then implement strategies around backup, archiving and disaster recovery. Data is searchable through an intuitive console making compliance simple and achievable for all organisations protecting data through the Backup Pro Platform.
Tags : 
    
Redstor UK
Published By: RelayHealth     Published Date: May 31, 2013
Join RelayHealth for a recorded Healthcare Finance News webinar, Accelerating Service-to-Payment Velocity. With all of the changes happening in healthcare today, some things do remain the same. Your two primary sources of cash are still patients and third-party payers. While patient financial responsibility is rapidly increasing, a large percentage of revenue still flows in via governmental payers and commercial health plans.
Tags : 
accelerate payment, payment resolution, service-to-payment velocity, claims data, continuing education credit, financial / revenue cycle management, claims processing, electronic health records, enterprise content management
    
RelayHealth
Published By: RiskWatch     Published Date: Feb 05, 2007
The integration of information security and physical security is an important trend that is becoming more widespread across both private corporations and government agencies. Read more about how and why you should implement a more holistic security strategy in this whitepaper.
Tags : 
security, network security, access control, compliance, secure content management, information security, physical security, holistic, riskwatch
    
RiskWatch
Published By: Riverbed     Published Date: Jul 17, 2013
This guide includes a demonstration on how you can accelerate troubleshooting, gain end-to-end visibility, and solve intermittent performance problems without having to recreate them; a detailed case study that shows how a large-scale federal government and defense consultant solved a months-long problem in just 15 minutes; and an on-demand webinar that introduces you to Cascade Shark and Cascade Pilot.
Tags : 
network, troubleshooting, speed of thought, performance, network
    
Riverbed
Published By: Riverbed ANZ DWA IT Leads GTM     Published Date: Nov 22, 2017
In this report 1,500 Australians describe how they currently use and rate digital public sector services across all levels of government, and what they expect from them today and into the future. The survey shows that Australians regularly engage with government through digital services, with half of respondents saying they do so on a quarterly basis, and 30 per cent accessing them fortnightly; but that the quality of the digital experience is paramount.
Tags : 
digital, experience, australia, public, sector, transition, hardware, software
    
Riverbed ANZ DWA IT Leads GTM
Published By: Riverbed ANZ DWA IT Leads GTM     Published Date: Nov 22, 2017
What do Australians think? 1,500 Australians described how they use and rate digital public sector services across all levels of government and outlined current and future expectations for the platforms.
Tags : 
australians, confidence, experiences, public sector, improvement, government, digital
    
Riverbed ANZ DWA IT Leads GTM
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Safari Books     Published Date: Jun 08, 2009
ITIL Version 3 Best Practices has expanded the concept of IT service delivery from day-to-day operations of those services to the Service Lifecycle. ITIL Version 3 Best Practices includes five lifecycle phases (each with its own guidebook): Strategy, Design, Transition (which covers implementation and change), Operations and Continual Improvement.
Tags : 
safari books online, government, it service management, itil, version 3, best practices, strategy, design, transition, maintenance, office of management and budget, omb, sox, sarbanes-oxley, it operations, service strategy, service design, service level management, slm, operational level agreements
    
Safari Books
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.