State & Local

 
  • Seattle opens funding pool to civic tech innovators

    Seattle opens funding pool to civic tech innovators

    Seattle has set up a technology matching fund to provide capital to residents with innovative ideas for improving city services and public access to digital resources.

  • Voting technology: Is it secure yet?

    Voting technology: Is it secure yet?

    With the presidential election coming up in 2016, many constituencies are considering how they can use technology to secure and streamline the voting process.

  • Baltimore drafts guidelines for police body cams

    A recent draft report addresses the tech concerns cities might have in implementing police body camera programs.

Topic Resources

  • Mining Gold from Machine Data

    Holistic visibility is more important than ever because most IT services— including email and web services— consist of a series of connected applications and infrastructure components. Download this whitepaper to learn the best ways to enhance your IT operations management strategy and gain insightful understanding and visibility into your organization’s data center.

  • Store Less, Spend Less: Managing Data According to Its Economic Value

    The term “big data” is now passing into the common vernacular. Although initially as much about the power of business analytics and data mining, the semantics have now swung to encapsulate data that is just big and of course, resource hungry, whether in terms of management, sheer storage capacity, or budgets. In that respect, the numbers are getting increasingly alarming: Estimates suggest that 90% of the world’s information was created in the last two years, and 2.5 quintillion bytes of data are created daily. Download this informative whitepaper to gain further insights into the conflicting demands of storage management.

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Consolidated Security Management for Mainframe Clouds

    IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.