Whitepapers


Army ITES: Recharging the Enterprise

The manner in which the Army procures its technology to run the Army enterprise continues to evolve almost as rapidly as the technology itself. New and revised contract vehicles provide sensible, cost-effective means of equipping the Army with the latest technologies, including cybersecurity and mobile technology. As Army Chief of Staff General Mark Milley says, new and emerging technologies could “deeply change the character of war.”


Improving Data Quality and IT Portfolio Management for Federal Agencies

Are you looking to improve data quality and IT Portfolio Management within your organization? Check out InQuisient’s white paper on improving data quality, and how their software is managing programs, projects and applications through a single system, creating order from chaos. InQuisient’s 100% web-based Platform is a proven solution, currently implemented across the Federal Government.


Human Outcome Analytics

It is becoming increasingly difficult for caseworkers and care providers to ensure healthy and productive lifestyles for individuals and families. The combination of assessing individual risk and aligning programming helps promote satisfying, productive family environments; adjust or reinforce positive individual behavior; aid in overcoming trauma and reduce or avoid risk. As a result, there is a pressing need for solutions to assess specifically what services are required at a given time for an individual or family. But by using predictive analytics technology, combining best practices in risk assessment with best-in-class analytic tools to better assess risk and determine near real-time outcome pathways, Human Outcome Analytics help practitioners provide the quality care families and individuals need.


Operational Intelligence is a Game-Changer

Too often agencies are managing the performance and security of their systems based on the limited set of data targeted by system and network monitoring tools. Here’s how agencies can translate that data into true operational intelligence that can transform the performance and security of the enterprise.


NETCENTS-2: Bringing Convergence to Defense

The relatively new NETCENTS-2 contract vehicle is a true evolution of earlier iterations. It is intended to provide faster, more flexible and more comprehensive access to a variety of technology categories. The contract aims to provide agencies with network-centric IT, networking, security, voice, video and data communications solutions and services not available through other mandatory-use DoD or Air Force contract formats.


Analytics: The upside of disruption

Powerful disruptions have occurred within the global marketplace. Long-standing business practices and interactions – particularly between the business and IT functions – have fundamentally changed. We find that a majority of organizations are embracing marketplace disruptions as opportunities, intensifying their adoption of big data and analytics technologies. More than before, organizations see the upside of acting quickly to innovate their business models and analytics strategies, and improve the information infrastructure to support a future view. Download to learn more!


Reimagining the Citizen Experience

Agencies have embraced technology as a way to reengage the citizens they serve on a more personal level and to enhance the way they deliver services. When citizens interact with government agencies, they expect the experience to be easy, fast, and efficient. Download this event summary to learn how the Acquia Drupal platform can help your agency.


Warrior Canine Connection: Innovating Building Renovation with Autodesk

With Building Information Models (BIM), stakeholders are empowered to make smarter decisions on maintenance repair and operations (MRO) projects. See how Autodesk is helping public sector agencies, such as Warrior Canine Connection, with MRO and BIM.


Considerations for Modernizing the Government Data Center

This white paper looks at how federal government organizations can modernize their data centers to meet new data center requirements.


IT Consolidation and Modernization Put Spotlight on Virtualization

IT managers are turning to state-of-the-art solutions such as cloud computing and virtualization to help with their consolidation and modernization efforts. As a result, agencies are operating more smoothly and at lower costs. Download this digital dialogue to read more on highlights from a recent webcast series on virtualization.


Don't Risk IT Infographic

Are you entrusting your organization’s crucial data to aging, end-of-life infrastructure? Don’t Risk IT! Cisco security-driven network offerings are built from concept to completion and include built-in security to protect sensitive data.


Cisco WebEx Web Conferencing

Go ahead. Create and join meetings easily from your computer or mobile device. Invite participants to share content in real time. See who you’re talking to. All in a highly secure environment.


Meet with Anyone, Anywhere — Securely

Be more productive, collaborative, and get more done faster using Cisco WebEx Meeting Center — the proven industry leader in web and video conferencing. As a FedRAMPcompliant service, you can use Cisco WebEx to hold regular meetings with anyone — regardless of location. Manage projects, host meetings, and make faster, more informed decisions by keeping everyone on the same page with meetings that allow everyone to see, hear, and view the same information at the same time. And host engaging and creative sessions with colleagues, internal teams and other agencies.


All Systems Are Go for SEWP V

The latest iteration of NASA's governmentwide acquisition contract opened for business about a year ago. Download this informative Contract Guide to learn what that means for agency customers.


IT Portfolio Management for Federal Agencies

Are you looking to improve IT Portfolio Management within your organization? Check out InQuisient’s short overview on how their software is managing programs, projects and applications through a single system, creating order from chaos. InQuisient’s 100% web-based Platform is a proven solution, currently implemented across the Federal Government.


Facing Down Cyberthreats

The Continuous Diagnostics and Mitigation (CDM) program makes tools and services— such as network sensors and dashboards—available to agencies via a government-wide contract. These tools and services help them identify cybersecurity risks on an ongoing basis, prioritize these risks based on potential threats, and mitigate them. The goal is to reduce breaches, improve visibility and move agencies away from a compliance focus and toward a continuous monitoring approach to security. See what government and industry experts had to say at the May 11th event CDM: Building Advanced Cyber Strategies.


The Rise of Hyperconvergence

Moving to a hyperconverged infrastructure addresses many of the issues facing federal government agencies these days. It can be more cost-effective, provide greater capacity, increased flexibility, rapid scalability, and promote innovation. This report — presented by Dell, Intel® and Tracewell — details several aspects of the move to hyperconvergence; from establishing a “future-ready” architecture capable of handling massive data stores and the durability requirements of field operations to software-based and virtualized infrastructure


The Big Picture View of Security

Cyber analytics focuses on improving intrusion detection and response. It’s most effective when considered as a single aspect of a larger cybersecurity game plan. To get the most out of cyber analytics, agencies should build their systems securely from the ground up. Take a holistic and layered approach, promote visibility, think strategically, be able to scale, promote security awareness and enforce basic security practices. Learn more about Cyberanalytics from this event overview based on the April 27th event Cyber Analytics, Compliance, and Business Agility.


What Agencies Need to Know About HCI

Hyper-converged infrastructure is the latest incarnation of a time-tested concept of distributed systems. Download this informative special report to learn what it really means — and why government IT leaders should care.


Samsung on Android: The Secure, Defense-Grade Alternative

Samsung and Google have undertaken a number of initiatives to build security into the core Android operating system, provide robust application screening and provisioning, and deliver innovative hardware-based security platforms. Together, these enhancements have positively affected perceptions of Android security and underscore Android’s enterprise worthiness. Download this informative whitepaper to learn how Google’s ongoing commitment to providing monthly Android security patches, robust security services, and diligent application vetting with strict review processes, combined with Samsung’s device-based security features, position Android-based Samsung devices as the secure and logical choice for businesses and government agencies wishing to realize the potential of a digital enterprise.


Five Things to Consider When Evaluating Flash Storage

The performance benefits of all-flash storage might be clear, but there are other critical criteria when evaluating flash technology. Here are 5 insights that will help you ask the right questions during your evaluation.


ITES-3H: The New Face of Defense Contracts

The most recent iteration of the U.S. Army’s IT Enterprise Solutions contract—ITES-3H—is a notable step forward in the evolution of this contract. After the ITES-2H contract, originally award in 2014, was extended several times and had more than $1 billion added to its ceiling, it was time for a new format. Under ITES-3H, the contract is open to other defense agencies, although the Army is expected to account for the majority of the awards. This special report will present a series of articles explaining the evolution of ITES, the broad reaching impact of the new contract, its impact of cybersecurity, and what’s next for this contract format.


A Better Storage Alternative For Federal Agencies

Under the Federal Data Center Consolidation Initiative and the Cloud First initiative, agencies are being asked to evaluate cloud storage among their modernization options. While some cloud storage services have a reputation for being an economical option, many agencies are understandably reluctant to transfer control and management of their IT infrastructure to a cloud storage provider because of concerns over security, access, and meeting critical SLAs. But there is another option. High-density flash storage offers agencies an unbeatable combination of high performance and cost competitiveness. This white paper compares the cost, control, security, and performance between the two options.


Mind the Gap Study - Oxford Economics

Discover how common application delays affect company performance in this study sponsored by Nimble Storage and produced in collaboration with Oxford Economics. Learn how to remove the frustration caused by downtime and unanticipated delays across the increasingly complex grid of cloud-based infrastructure, data networks, storage systems, and servers that power our work.


InfoSight Report: Can Machine Learning Prevent Application Downtime

Download this informative research report to discover key findings from a recent survey conducted focusing on storage and the app-data gap. Learn about some of the common causes of the app-data gap, what infrastructure solutions there are available and the importance of why your solution should utilize data science and machine learning.


Single View of Citizen Demo

This demonstration provides 3 specific examples of how government agencies can utilize a single 360 degree view of the citizen to improve service delivery while reducing cost and preventing fraud.


Get to Know Lenovo Health by the Numbers

Success means choosing a proactive IT partner who understands your role, the challenges you face, and how to build reliable solutions for Healthcare. Discover why you need Lenovo™ Health on your side to provide the best mobility, security, and cloud solutions to your healthcare professionals and patients, today.


Power Patient Engagement with Technology

Involved, informed patients are better able to manage their own care. Today’s technology plays a big role in helping patients to take ownership of their health and collaborate more closely with providers to achieve better outcomes.


Your Partner for End-to-End Health IT Solutions

When it comes to providing the best level of patient care, satisfaction, and engagement, you need a single-source IT partner that can span the care continuum with technologies to help


Connected Government in Action

With exponentially growing data demands driving the development of an ever more robust digital infrastructure, government agencies like yours often struggle to keep pace.Learn how Lenovo helps government agencies transform themselves. This insightful eBook—featuring examples from the transportation, healthcare, and public safety sectors—demonstrates how we can help your agency use big data to strike the perfect balance between ensuring operational efficiency and driving innovation.


Coordinating Health and Human Services
Digital White Paper

Learn how outcomes can improve when Federal, State and Local organizations work together to create a more complete view of the citizen. See how integration of systems and data have changed outcomes for citizens with specific examples in San Diego, Camden and Clark County.


The New Desktop Normal: Evolving Agencies Demand New PC Possibilities

Discover the next generation of desktop computing. Today’s government organizations need to do more with less: less space, less budget and less time to waste.


Get Connected: A Checklist for Smarter, More Effective Government

It’s been said that throughout history, the only constant is change — and nowhere is that more true than within the government. Demands change on a daily basis, and only the most well connected agencies will be able to keep up.


Take an Enterprise Approach to Meet Records Management Directive Deadlines

Several recent high-profile incidents have revealed records problems at federal agencies. Some make national headlines, while others slip under the radar. They all demonstrate a disturbing lack of effective process and technology. Download this informative white paper to learn how a comprehensive information governance program is the best way for Federal agencies to meet M-12-18 objectives while also reducing costs, improving security, and promoting transparency.


The Rise of Object Storage

This analysis outlines the necessity of object storage in today's digitally-oriented market while highlighting Cleversafe as a solution. Scott Sinclair writes about ideal use cases for object storage and considerations for purchasing such technology. He concludes that Cleversafe's object storage solves for archive/content repository, compliance archives, content distribution, data lake/hub, backup target, collaboration, and on-premises cloud use cases. This article concludes that object storage offers a "superior method to protect and scale data" (12) and recommends that customers stay ahead of the data explosion curve and implement object storage sooner, rather than later.


The Total Economic Impact of Cleversafe, An IBM Company

Cost Savings And Business Benefits Enabled By Cleversafe Object Storage


Hackers have an effective plan to get to your privileged accounts – here’s a three-step plan to prevent their success

Gaining access to privileged accounts is key to a hacker’s success because of the unlimited access that they provide. Read this paper to learn a framework for creating a Privileged Account Management (PAM) governance plan and a three-step process for taking control of your privileged accounts.


Beyond Meeting the NARA Mandates

Despite a deadline of December 31st, about one third of federal agency leaders are still unsure how they will achieve compliance with NARA requirements. However, satisfying requirements are just one of the many reasons agencies should change and improve their processes. Download this report to read more on the latest strategies for effectively managing agency records and information.


Preparing for Private Cloud and Hybrid IT with Red Hat Cloud Infrastructure

Red Hat Cloud Infrastructure (RHCI) provides a datacenter platform for traditional applications and OpenStack for next-generation cloud applications, as well as a cloud management platform (CMP) to unify the management across both workload types, running on-premise or in public clouds. It is clear that enterprises will require a full solution to realize the many benefits of cloud while maintaining control and governance. RHCI is a prime example of a cloud solution that can help enterprises make the migration.


Mobile Security: Agency Workers on the Move

The proliferation of mobile devices has changed the modern workplace. Employees can stay fully engaged and connected no matter where they’re working. However, supporting a seamless mobile workforce requires enterprise-grade mobile security. Keith Fuentes, VP of Samsung KNOX, tells FCW how advanced mobile security technology, and the processes to match, can pay off in increased employee productivity, cost savings and a truly secure mobile workforce.


Barriers to the Cloud Remain

About six years ago, the White House launched its Cloud First initiative. This was intended to encourage agencies to consider cloud computing as a platform for their IT operations because of the flexibility and the opportunity for cost savings. During an event on March 30, speakers addressed security concerns about cloud computing platforms. Download this eBook to learn more about how security is handled on cloud computing platforms.


Old PCs Put Your Business at Risk

Protect against hackers by upgrading to new desktops featuring Intel’s hardware-enhanced security and supporting software. Innovative hardware enhancements, built into Intel®-powered desktops since mid-2013, “harden” key information and commands normally executed in software, giving your business maximum protection. Read this paper to learn what your organization can do to overcome security challenges.


Four Ways to Win by Replacing Legacy Laptops and Desktops

Security. That’s what keeps IT leaders up at night. Yet security is not the only concern – to it, you can add incompatible platforms and operating systems, limited technical/IT resources, and ever-shrinking budgets. Research from IDG shows a direct correlation between the mitigating these challenges and upgrading client hardware and OS’s. Read this 2 page paper to learn more about how replacing legacy client systems can help alleviate security risks while improving end user productivity.


6 Benefits of Upgrading to Windows 10

This paper details the benefits of switching to Windows 10 and the best new features of the new OS for business. Explore the benefits of moving to modern operating systems and get a quick list of actions you can take to ease the way.


Modern Manufacturing Comes to Federal Agencies

Call it 3D printing, call it additive manufacturing; by any name, it’s transforming fields as diverse as biological engineering and aircraft part production. Fields like that require precise tolerances in component production, which digital 3D printing provides. They also have significant degrees of flexibility and versatility, since 3D printer output is generated directly from digital files you can instantly edit or revise as needed.Download this exclusive Executive Insights to learn how 3D printing is emerging as the answer for many complex government production and prototyping projects.


The Rugged Truth: TCO of Rugged vs. Non-Rugged Computing Devices

Are you trying to determine if a rugged notebook or tablet is right for your business? Technology Business Research, Inc.(TBR) found in their recent research, purchasers should understand the true value of their mobile computing by calculating the total cost of ownership to see if a switch to rugged systems is worthwhile. In order to help IT and organizational purchasers make the right computing investment, Dell and Intel® recently worked with VDC Research to understand the true total cost of ownership for rugged vs. non–rugged notebooks and tablets in harsh work environments. Read this white paper to see the costs associated with each scenario and to help you determine if a rugged solution would benefit your business.


3 Must-Haves for Rugged Devices

A rugged notebook or tablet is just one piece of a mobile solution for highly demanding, tough work environments. When combined with the right level of support, security, and manageability, the comprehensive solution will keep employees in the field, on the road, and thriving in the harshest conditions. Download this whitepaper to learn more about how to find the right combination of rugged notebooks, which feature Intel® Core vPro technology, and the appropriate services needed to meet the demands of your end users.


Security Mandate: Evolving Response to Evolving Threats

After years of well-publicized and damaging data breaches at major agencies, there’s no question the federal government faces a massive cybersecurity challenge. The traditional methods of securing agency networks and systems often prove ineffective against the newest rapidly evolving generation of cyberthreats. Download this article to learn more on what steps agencies are taking to combat this new advanced category of cyberthreats.


Contract Guide: Facing Down Cyberthreats with CDM

When the Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) program was first launched several years ago, the intent was to strengthen the overall security posture for federal agency IT across the board. It hasn’t been without its challenge, but it has enjoyed some success as well. Following several very public and damaging attacks this year at the Office of Personnel Management and the IRS, the pace of this program rollout will most likely increase. There is certainly pressure to do so. The first two phases of the three-phase rollout are well underway, and phase three is beginning. Federal agencies are realizing how to integrate this into their procurement strategies and priorities.


Information Warfare Evolves With The Times

Download this informative Event Overview from the recent event titled "Network-Centric Warfare: Next Steps to Achieving the Vision" to learn how the navy takes an enterprise-level view to deliver new technologies and data to the warfighter.