What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepapers


GIS: The Gateway to Innovation and Collaboration

Download this informative Viewpoint to hear from Christopher Thomas, Director, Government Market at Esri to gain an interesting perspective on the upcoming opportunities for innovation and collaboration in the industry as it relates to GIS.


The Rise of Project Intelligence: When Project Management is Just Not Enough

Given ongoing budget constraints and the push to deliver a better product in less time, project intelligence will be essential to the success of federal PMO. Learn to make the PI process an integral part of project management for everyone involved in an organization and utilize the power of historical knowledge for the implementation of future projects.


Business Process Management for Dummies

In today’s dynamic business environment, organizations need to be agile so they’re ready to respond to the litany of challenges coming their way. Business Process Management (BPM) provides that agility by ensuring the full utilization of technology; helping your agency to become far more responsive and meet your goals. Read this eBook to learn more about how BPM enables a more flexible, agile and scalable business model.


Operational Decision Management for Dummies

Everything your agency does relies on decisions. Operational decision management (ODM) is a set of technologies and methods that allow you to automate your day-to-day business decisions without compromising their accuracy and effectiveness. This eBook examines how ODM ensures responsible governance by assuring proper decision approval, securing the library, providing authorization for changes, measuring decision outcomes, and creating a feedback loop to identify further improvements and refinements.


Extending Access Control to the Cloud

Organizations are consuming software-as-a-service applications at an exponential rate. While the advantages of SaaS applications are great, so are the potential pitfalls of unauthorized access. Download this whitepaper and learn about the risks of cloud computing, how you can control those risks and a few things to keep in mind when selecting a vendor for your cloud solutions


Staying Secure in a Cloudy World

Organizations that deploy public, private or hybrid cloud infrastructures—which today is virtually all of them—must mitigate inherent security risks while also maintaining compliance with industry and government regulations. This paper contains three simple steps for maintaining visibility and control when moving to the cloud.


Privileged Users: Managing Hidden Risk in Your Organization

While insider breaches have happened for years, many organizations find themselves asking: Are we at risk? The answer comes down to a group known as “privileged users” within your organization. This whitepaper explains 4 simple rules to cut privileged user access issues.


Why It Pays to Take a Business-Centric Approach to Compliance

A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance; particularly with identity management and access governance. Read this whitepaper to learn more.


Linux Enterprise Server Solutions with Expanded Support for the Federal Government

Two types of IT infrastructures are in place today: those that leverage Linux to control systems—and the cost of operating them—and those that do not. This white paper outlines the details of Linux offerings for the Federal government, common misconceptions about changing an IT environment, and additional solutions that reduce operating costs and increase innovation.


The DDoS Threat Spectrum

Bolstered by favorable economics, today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and low-bandwidth threats, plus new threats likely to target emerging service platforms.


Solving Substantiation with SAML

Organizations are deploying distributed, hybrid architectures that can span multiple security domains. At any moment, a user could be accessing the corporate data center, the organization’s cloud infrastructure, or even a third party, SaaS web application. SAML can provide the identity information necessary to implement an enterprise-wide single sign-on solution.


The Dynamic DNS Infrastructure

Between the proliferation of mobile devices and the ever increasing amount of content on the web, DNS usage has seen a huge increase in recent years. Meanwhile DNS continues to be a target for attackers. F5’s full-proxy architecture provides a complete solution.


Top Considerations When Choosing an ADC

The Application Delivery Controller (ADC) chosen as the foundation for a flexible, efficient application delivery strategy can significantly affect network performance, availability, and security while providing opportunities to add business value.


Infoposter: Constituent Care

Federal contact center agencies are facing a seismic generational shift as an estimated 40 million baby boomers approach retirement and a growing number of millennials, whose communications needs are ever changing, enter the workforce. But recent advances in commercial contact centers provide insights into how agencies can both improve constituent satisfaction and boost the operational efficiency of their contact centers.


Building a Scalable Big Data Infrastructure for Dynamic Workflows

Federal big data is creating new IT infrastructure challenges by increasing performance demands and adding management complexity. An ideal solution tightly integrates servers, storage, and network elements to optimize performance and reduce administrative chores.


GameChanger: Document Management

The prediction that the paperless office will one day be a reality dates as far back as 1975. Clearly, much progress has been made since that time, thanks to massive amounts of computer-based storage, sophisticated software for document workflow and other technological gains, but the true paperless office is still an elusive concept. Download this informative whitepaper to gain further insight into the ROI of document management, including how mobility is vital to the overall success of document workflow.


Infoposter: Escalating Cyber Threats

As many agencies are learning, it is possible to spend a lot of money in cybersecurity and still end up with significant vulnerabilities. Here is just a snapshot of the current cyber threat landscape, based on research conducted by cybersecurity experts across the public and private sectors. Whatever the source, the research consistently reveals the complex nature of today’s cyber threats, which cannot be addressed by any simple set of solutions. What is needed is a comprehensive approach that secures the network from end to end and provides real-time, actionable information on emerging threats.


Weathering the Storm: How Cloud Management Can Align Competing Federal C-Suite Priorities

Though many C-suite executives are involved in any agency’s decision to adopt a cloud computing solution, two of the most prominent decision-makers are the chief financial officer and the chief information officer.


Understanding Cloud for Today and the Future

Steps to migrating and managing the new cloud technology include researching its benefits specific to a given agency, adjusting IT management to accommodate new services and fool-proofing SLAs. Download this informative digital dialogue to learn more about the range of cloud types including the five main characteristics of cloud and the three forms of cloud services.


Empowering Analysts with Big Data

The paper focuses on the technologies and capabilities organizations should arm their analysts with, so they cannot just ingest big data, but uncover difficult evidence and turn it that big data into actionable intelligence.


Transitioning to a new era of human information

When we consider human information and its dominance in today’s enterprise, it is natural to wonder how we can effectively search and find the information we need. Typically, people search or analyze data using an attribute such as the date a video was taken, who is in a photo, or whether a blog gives a positive view of a product. Since computers have historically used databases to increase search efficiency, finding human information raises a number of new questions regarding how we can organize, process, and search it.


Network Optimization: Networks in Motion

For years, agencies have optimized their networks primarily by adding capacity and perhaps fine-tuning their architecture. But the surging demand for capacity driven by such trends as cloud computing and teleworking, and from bandwidth-hogging applications such as video, are quickly increasing the pressure on network performance. Agencies can no longer afford to respond by simply throwing more bandwidth at the problem. Instead, they are turning their attention to network optimization.


Testing the Business Ruggedness and Reliability of HP EliteBook Notebooks PCs

HP business notebooks are designed with reliability in mind, which is why all HP business notebooks undergo the HP Total Test Process consisting of over 115,000 hours of testing. Our comprehensive and proven testing program delivers superior quality and reliability and includes 50,000 test steps with 240 industry-standard hardware and software products tested for compatibility.


Roadmap to a Contact Center of Excellence

When it comes to government IT-based programs, the technology itself rarely seems to be a stumbling block. Agency culture is most often the culprit. The need for improved communication and collaboration are not the only factors preventing your agency from achieving contact center excellence. Download this special report to learn how to get your agency’s contact center on the right path through mobility, social media, cloud services and performance management.


GameChanger: Deep Analytics

The world creates 2.5 quintillion bytes of data per day from unstructured data sources like sensors, social media posts and digital photos. Clearly, unstructured data is growing exponentially, and government is no exception. Download this informative report to gain further insight into the world of deep analytics as well as learn a new approach to analysis.


Mobile Strategies: All Systems Go

Although there are countless mobile apps available in the market, the number of feasible options is reduced considerably because of agency concerns about security and privacy. Still, the Digital Government Strategy calls for “developing models for the secure, yet rapid, delivery of commercial mobile applications into the Federal environment.” Download this special report to learn more about mobile strategies including the four steps to successful mobile development.


Protecting Legacy Host Systems with Authentication & Authorization Technologies

This powerful add-on from Attachmate works with your existing terminal emulator to boost your host security and centralized management capabilities.


Former Air Vehicles Directorate Increases Efficiency with Optimized Printer Deployment

Integrity first. Service before self. Excellence in all we do. These core values of the U.S. Air Force (USAF) permeate every decision of the world’s preeminent aerospace power. The Air Force Information Technology Commodity Council (ITCC) Digital Planning and Imaging (DPI) initiative is no exception. The initiative sets targets to modernize, standardize and consolidate the USAF print infrastructure to help lower operational costs, reduce environmental impact and increase office efficiency—all while enhancing information security.


Optimizing Technology Refresh

HP’s Distinguished Technologist, Bruce Michelson, takes a unique look at the IT refresh of desktops, notebooks, and servers; discussing the megatrends and the impact they have on the technology refresh cycle.


How to eat an elephant:Strategies for portfolio modernization

There’s an elephant in the room that nobody’s talking about. This is the legacy portfolio that supports business-critical operations, but threatens your organization’s ability to respond to change. The need for organizations to modernize their application portfolios has never been clearer.


Make the connection between the cloud and application modernization

Businesses that want a continued competitive advantage in the market often rely on the latest technology to help them get there. Two key trends in the IT space are requiring enterprises to rethink the best way to run their businesses: cloud computing and application modernization.


Guide for Reducing Data Center Physical Infrastructure Energy Consumption in Federal Data Centers

In an effort to create a clean energy economy, recent US presidents and congress have issued a series of legislation and executive orders requiring federal agencies to increase energy efficiency and reduce carbon emissions in government facilities. Vivek Kundra, Federal Chief Information Officer, is supporting that effort by establishing a Federal Data Center Consolidation Initiative to help reduce energy consumption in over 1,100 Federal data centers. US Federal data center managers are on a timeline to respond with their final consolidation plan. This paper analyzes the implication of these mandates and offers recommendations for how to improve energy efficiency in Federal data centers.


From ‘To Work’ to Telework: Small and Smart Mobile Solutions for Public Servants

Learn how smartphones are becoming the mobile device of choice for generations of workers more accustomed to the possibilities of telework with the flexibility to choose how and where they do their work.


Research Report: Emerging Strategies for Managing Mobility

In August 2013, FCW surveyed defense, civilian and state and local agency decision-makers about their mobile management strategies. The survey covered topics regarding workforce deployment of mobile devices, BYOD vs. agency-issued device policies, usage and security concerns that stem from the use of mobile devices and architectural considerations including virtualization strategies. Download this informative report to uncover the research findings and broaden your scope of knowledge on mobile management.


Research Report: The Virtual Public Sector

For more and more government agencies, desktop virtualization is proving to be the right solution at the right time. The technology, which makes it possible to deploy, manage and optimize desktop-based applications and data from a central console, can help agencies extend desktop computing resources to a wide range of end-user devices securely and cost effectively, whether users are in the office, on the road or working at home. Download this report to discover further research findings on virtualization trends and the shape of things to come.


Five Critical Security Controls for Continuous Diagnostics and Mitigation

Federal agencies know that while nearly impossible to mitigate every conceivable cyber risk, the goal is to solidify protections against foreseeable attacks, while providing security expects with time, and the timely intelligence, to prevent unknown threats and minimize the damage to their networks. Download this solution brief to understand how Department of Homeland Security’s newly awarded CDM program is helping agencies prioritize cyber efforts and explore the five security controls deemed most crucial for effective cyber-defense.


Questions to Ask Before Buying Big Data Tools

You don’t have to be in IT to care about big data analytics. Proper analysis of big data can uncover hidden patterns that offer insights into the various faucets of your business. This information can ultimately aide in increased knowledge and more informed decision making. Download this whitepaper to learn more about purchasing the right analytic tools for your agency.


What the Federal Government is Doing Better Than Businesses

What could businesses gain by emulating the federal government’s best practices? $Millions more than you may think. This data-rich white paper details how the largest, global organization (the DoD) is setting the standard for significant cost savings and process efficiency.


Critical Infrastructure Protection Needs Holistic Approach

The nature of ongoing cyberattacks is changing. Attackers are shifting from directly targeting government and military networks to targeting networks in the defense industrial base and commercial critical infrastructure. The attacks are also increasing in frequency and severity. Download this whitepaper to learn the emerging best practices in protecting your organization’s critical infrastructure network.


Emerging Cyber Threats Demand New Thinking

Government agencies need a better approach to dealing with cybersecurity threats, and they know it. A recent survey by the 1105 Government Information Group found that government agencies are not satisfied with current efforts to protect their information from the dynamic threat environment. Download this research report to uncover more findings, including what agencies view as the top threat to their organization.


Making Data Meaningful

Information can make or break a government program, so knowing how to properly collect, manage and report it is crucial. Two main components to making big data useful are standardization and distillation. Download this whitepaper to learn more on improving your agency's data analytics, including the three steps to handling data correctly.


A Perfect Storm? Cloud, Mobility and Information Sharing for the Federal Government

Many federal organizations are now fulfilling the Cloud First policy mandate, which directs organizations to prioritize the use of cloud computing offerings to reduce costs, among other things. The movement is also facilitating collaboration, something that is becoming increasingly important within enterprises as well as public organizations and agencies. View this interactive eBook to read more on how federal organizations such as the U.S. Army War College are addressing the government’s requirement to enhance collaboration.


Implementing Messaging and Directory Services in Federal Agencies:The Real Cost of Inactivity

Dell Software commissioned a government market research provider to poll federal IT workers on awareness of, and attitudes toward, the use of cloud technology for messaging and directory services in federal agencies, especially the process and timelines associated with provisioning and de-provisioning users.


A New Approach to Document, Data Security

Given the rise of mobility and cloud computing and the paperless flow of data, you might think multifunction devices would be relegated to the periphery. But it turns out, the modern enterprise environment is anything but paperless. Moreover, MFDs have evolved a great deal. They’ve become network-connected hubs in the workflow of documents and data. Download this whitepaper and learn how multifunction device capabilities produce real gains in mobility, flexibility and efficiency.


Research Report: Data Security

In May 2013, FCW surveyed DOD, civilian, and state and local agency business and IT decision makers about data security issues and solutions. The survey covered topics regarding cybersecurity, protection from insider threats, safeguarding Big Data initiatives, and improving cloud security. Download this informative research report to read the survey results.


Don't Take Mobile Security for Granted

The key requirement of a mobile security plan is to adopt a centralized set of policies and controls. Mobile device management and anti-virus software are stand-alone solutions that may not cover all the different issues on varied operating systems and devices. But it doesn’t have to be that way. You can implement a solution that looks at security holistically from an organizational point of view. Download this informative whitepaper to gain expert insight on centralized mobile security strategies.


Guide: Solutions Emerge as Federal Government Pushes Agencies to the Cloud

In this Solution Guide, World Wide Technology reveals its data center cloud model in-depth and presents solutions around cloud computing with a standardized product set and advancing to an integration stage. The guide takes a close look at the VMware® Enterprise vCloude Suite on the EMC® VSPEX® converged infrastructure platform , examining storage and infrastructure components as well as cloud operations and management services.


Detecting Unknown Threats and Reducing Response Times

The industry has finally realized the need to shift its focus to detecting unknown threats and reducing response time. Learn organizations are achieving these two critical goals by integrating analysis and enabling real-time collaboration.


Enhance ROI with RSA Archer Federal Solutions

This paper outlines the challenges faced by Federal Information Assurance professionals and offers solutions to those challenges, including the ROI for each.


The Road to Enterprise PaaS

Cloud Computing Platform-as-a-Service (PaaS) solutions, such as OpenShift by Red Hat, leverage automation technologies and a cloud architecture to make developers more productive by helping them focus on creating applications rather than dealing with infrastructures. Download this informative whitepaper to learn about the many benefits of PaaS for the enterprise.