What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here

Whitepaper List

Delivering on the Promise of Virtualization

With budgets pressures increasing, agencies are looking for anything that can help them maintain mission capabilities. As virtualization technologies continue to prove their worth in providing cost savings, boosting performance and operating efficiencies, they are increasingly showing themselves to be an essential technology to help agencies meet their IT goals. Download this special report to learn more on the growth of virtualization, containers, and software-defined platforms.

Enhancing a City's Ability to Plan, Protect and Manage with Intelligent Video Analytics

Innovative leaders are creating smarter, safer, more secure cities - protecting citizens and the city’s economic value. Download this article to learn how intelligent video analytics solutions extend the capabilities of existing video assets, and enhance the effectiveness of safety and traffic management personnel.

Data-driven Government: Challenges and a Path Forward

Governments have never suffered from a lack of data. In fact, one could argue that, historically, they have suffered from an excess of data, much of which was rarely used. Governments are using computer technology to capture and harvest this data and extract value from it. However, more can be done to apply it to agency missions. This paper explains data-driven government and challenges related to it and outlines a way forward in the journey to a data-driven government.

i2 Enterprise Insight Analysis Solution Brief

Whether they are part of a business or working for a government organization, today’s investigators, security specialists and intelligence analysts are facing extraordinary pressure to respond quickly to a wide range of threats — from cyber attacks, terrorist threats, criminality, and unethical and immoral activities. These attacks are especially challenging as societies are increasing their reliance on cyberspace for economic growth, societal well-being, government operations and critical infrastructure monitoring and management. Concurrent with the increase in cyberspace reliance is an increase in cyberspace vulnerability. This vulnerability is amplified by an increasing frequency and complexity of attacks and highly variable, diverse and rapidly evolving threats. As such, there is a greater burden on organizations to respond in real time.

Value of Smarter Public Safety & Security

Politicians and citizens consistently rank safety and security as a high priority. Agencies are now utilizing data to assist in the new challenges facing public safety. With the right capabilities, agencies can go beyond simply managing data to exploiting it. Download this article to find out how this can be done without significantly increasing operating costs.

21st Century Emergency Management

Download this article to learn how an Emergency Management solution provider can address the technological complexity found in the emergency management environment. Recognizing that the needs of regional and local Emergency Management professionals include specialized capabilities, IBM has established several key partnerships with industry leaders to provide such capabilities for clients. These partnerships allow IBM solutions to integrate with leading GIS providers, and include specialized analytics and intelligence capabilities in the toolbox.

High-Performance Law Enforcement

Getting the right information into the right hands at the right time is not only critical in law enforcement – it can be a matter of life or death. To ensure critical data is available to officers – whether in an office or in the field – law enforcement agencies have been making significant investments in technology. But to get the most out of the new tools available to fight crime, law enforcement agencies need an integrated, end-to-end technology strategy — one that delivers the capabilities they need to protect and serve the public in a cost-effective manner. Read this paper to find out how law enforcement agencies can improve public safety outcomes by developing an integrated technology strategy that supports the wide variety of specific capabilities needed to prevent and solve crime.

Make Decisions Easier

Delivering health and human services benefits is a critical and challenging task for state and local health departments. To support overburdened systems and case workers, officials are increasingly turning to technology. Download this digital dialogue to learn how business rules engines are leading the way to help officials reach conclusions about residents’ health and human services quickly and accurately.

How to Deal with the Trickle-Down Effect of Change

Changes happen. And along with that comes even more changes. Nowhere has this been more evident than in the state and local health and human services arena over the past three years. When the Affordable Care Act (ACA) altered the way people apply for and receive Medicaid and Children’s Health Insurance Program (CHIP) benefits, states found that their existing eligibility systems were no longer sufficient. Download this digital dialogue to learn more on how The Center for Medicaid and CHIP Services helped states modernize their benefits eligibility systems to comply with the Affordable Care Act.

Transforming Child Welfare Service Delivery

Child welfare professionals are making life and death decisions about children and their families every day. Caseworkers are typically juggling caseloads of 20, 30 or more children and families at any given time and the agency they work for might be serving tens, if not hundreds, of thousands of individuals. Each individual in a family might be receiving multiple services with varying eligibility requirements, and any child or family might have more than one caseworker from more than one government organization. This solution brief examines the ways in which technology can enable the transformation of child welfare service delivery by supporting a multi-disciplinary approach to child welfare and by enabling prevention and remediation strategies that help protect children and facilitate permanency, while also improving resource utilization.

What Child Welfare Caseworkers Need to Go Mobile

The typical caseworker only spends about 18 percent of their time in face-to-face contact with children and families while over 12 percent of their time is spent traveling and over 33 percent of their time is spent preparing documentation. Mobility and access to mobile devices are part of our personal lives, but have not become a regular part of the caseworker’s professional career. In fact, acceptance of mobile technology by social workers has been slow compared to other industries. This white paper examines the ways in which mobile access to case management systems, data and information, assessment and referral capabilities and other tools could go a long way toward reducing child welfare caseloads and workload, and improving caseworker efficiency. It also details the specific capabilities that child welfare caseworkers need from mobility tools.

Pay Attention IT: A New Convergence Is Afoot

A new convergence of IT infrastructure is forcing rapid change in the digital world. With networks getting faster and the whole world going mobile, the number of digital connections is growing at an unprecedented rate. In response, government IT must become more agile, or be left behind. But how can your organization gain, and more importantly, maintain, an advantage at such speeds? What impact does this new convergence have on your IT infrastructure? And which IT strategies can maximize your team’s opportunities?

The Importance of the Internet of Things for Communities

Download this white paper to learn how the Internet of Things (IoT) stands to fundamentally transform public sector service delivery in the following ways: first, by delivering smart government services where and when the citizen wants them; second, by enhancing public safety; third, by allowing increasingly resource-strapped government agencies to identify and manage operational cost savings; and lastly, by addressing social and environmental returns.

The Importance of the Internet of Things For Elected Officials

Download this white paper to learn how the Internet of Things (IoT) stands to fundamentally transform public sector service delivery in the following ways: first, by delivering smart government services where and when the citizen wants them; second, by enhancing public safety; third, by allowing increasingly resource-strapped government agencies to identify and manage operational cost savings; and lastly, by addressing social and environmental returns.

State and Local Innovation Series: September 2015

As technology becomes more integrated with our every day business, data suddenly becomes essential to managing our duties. Download this series of articles showing how data is able to help government agencies with day-to-day tasks. Learn about Boston builds on open data initiatives, 7 steps to securing open government, 8 cities win innovation support, and many more!

Mobile Security: Foster Telework Through Secure Remote Access

Federal and state agencies have worked hard to implement telework, and it's paying off. According to official reports at both levels of government, it has resulted in lower costs, higher employee satisfaction, improved productivity and better preparation for continuity of operations plans. Agencies understand that teleworking conveys many advantages, but also introduces increased security concerns. Download this gamechanger report to see how you can stay ahead of these security threats.

From Chaos to Control: Creating a Mature File Transfer Process

Moving files in the extended enterprise requires not only support for higher scale with fewer resources, but also dealing with the relentless challenges of security; compliance; errors, exceptions, and problems; and the time and opportunity cost of problem resolution. Download this ebook now and discover Aberdeen Group’s analysis found that mature, managed file transfer processes experienced 26% fewer issues and 4.8-times faster time to correct them, among many other benefits.

DevOps: Drving Organizational Charge and Agility with PaaS

Creating and managing applications and processes using the Platform as a Service model has always been an excellent way for developers to work faster and more productively, while letting the operations team reduce the time it takes to get important services and applications to users. Agencies that have been using PaaS to achieve these benefits know well that while the productivity, cost and scalability advantages have been significant, there are sometimes roadblocks to achieving even greater benefits. Download this free eBook to find out how PaaS can better assist you!

The Cost of an Unintentional Insider Threat

All workplaces share the same security threat: the well-meaning but careless employee who may be more focused on productivity than protecting the company’s sensitive or confidential information. Often, without thinking of the potential consequences, they leave confidential documents in plain view, share passwords, circumvent security procedures and transfer sensitive data to the public cloud without company approval – ultimately costing much more to your organization’s bottom line than the employee hoped to save in time. IT professionals agree that more security incidents are caused by negligence than malicious acts. This paper considers the causes for negligence in the workplace such as multitasking, workplace stress, training and culture and points the way to solutions for alleviating the cost of UIT to the organization.

Internet Security Threat Report

Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 57.6 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services such as Symantec DeepSight™ Intelligence, Symantec™ Managed Security Services, Norton™ consumer products, and other third-party data sources.

Securing Data in an Unsecure World

Individuals and organizations today are generating more sensitive data than ever before. For most, it is not a question of if you suffer a breach, but when. This ebook provides specific information on the state of security today and practical steps you can take to secure your sensitive data.

Comparing IBM FlashSystem to Traditional Performance Disk Systems

Using a detailed, in-depth cost analysis model validated by actual customer interviews, this Economic Value Validation white paper from ESG demonstrates how IBM FlashSystem is less expensive than equivalent disk-based enterprise storage systems. Download this article to find out more!

Flash Array Deployment for Dummies

Download now to learn the history, business values and fundamentals of deploying a flash system at a basic level.

IDC Peerscape: Practices for Next-Generation IT Asset Management

The increasing number and maliciousness of cybersecurity threats pose undue business risk to both commercial corporations and government agencies, particularly with regard to the protection of proprietary corporate and personal data. Download the IDC PeerScape: Practices for IT Asset Management report to learn about the five ITAM best practices that are critical to an effective cybersecurity strategy.

Wideband Multimode Fiber - What is it and why does it make sense?

Multimode fiber (MMF) cabling is the workhorse media of local area network (LAN) backbones and data centers because it offers the lowest cost means of transporting high data rates for distances aligned with the needs of these environments. Channel capacity has been multiplied through the use of parallel transmission over multiple strands of fiber. Learn about Wideband Multimod Fiber (WBMMF), a new cabling system that increases the capacity of each fiber by at least a factor of four!

Reducing Infrastructure Complexity through Converged Systems

Remote offices, branch offices and small businesses have dramatically stepped up their adoption of new technology to help them run everything from typical business applications to cutting-edge solutions that differentiate their organizations; however, that rapid run-up in new technology deployments has often come with a cost: increased infrastructure complexity that has become harder and more expensive to manage. Read on to learn how converged systems reduce infrastructure complexity.

Systems Management Getting Complicated?

In today’s IT landscape, data centers and their networks are the lifeline to your business. Although the idea is simple, the execution is not – leaving IT departments looking for new ways to optimize data center and network performance. This informative guide explores the importance of infrastructure convergence and outlines the key benefits of this strategy, including: - Enhanced data center efficiency - Simplified systems management - And more.

Making Mobile Manageable: Secure Mobility for the Enterprise

As the number of mobile devices and telework employees continues to grow throughout the federal government, agencies are facing new challenges as they work to fortify an unprecedented and ever-growing number of potential entry points for cybersecurity breaches. Download this white paper to learn the importance of prioritizing a holistic approach to mobility.

5 Must-Haves for Highly Manageable Infrastructure

Some hardware components are simply easier to manage than others. Investing in highly manageable infrastructure can help IT support changing business needs while improving productivity and reducing total cost of ownership. Here’s why to consider FX.

An Intelligent Approach to the Distributed Enterprise

To do business effectively, organizations require an IT infrastructure at remote locations that delivers applications and data with high performance and high reliability. In order meet future remote office needs, the remote server must be physically secure, must provide high uptime with UPS protection, and must enable administrators with secure remote emergency access. Download to learn more.

6 Tips for Building a Future-Ready Infrastructure

Today’s IT environment is more complex than ever. The applications that have become critical to business operations require greater processing power, memory, and storage. This guide prepares decision-makers to choose servers that meet their current needs, while building a flexible, reliable, scalable infrastructure to handle future requirements.

PowerEdge VRTX: Remote-Office and SMB IT Challenges Solved

Enterprises with remote or branch offices and small and midsized businesses face very specific infrastructure challenges. Dell PowerEdge VRTX addresses these by providing scalable servers, storage, and networking in a compact, converged, easy-to-manage platform. Here’s how it brings simplicity, versatility and efficiency to ROBO or SMB environments.

Harnessing the Power of Converged Infrastructure for Your Business

Many businesses and organizations recognize the competitive advantages of using a converged infrastructure solution to consolidate, simplify, enhance and manage their IT environment. For some, the question is how they can effectively and affordably bring such a solution to remote office/branch office (ROBO) environments and take advantage of all it has to offer.

Discover an Integrated IT Platform Designed for Branch Offices and Small and Medium Enterprise

Read up on integrated IT platform designs that can help decrease complication when expanding and simplify the way IT can be deployed at ROBO and SME locations.

Simplicity. Efficiency. Versatility. Dell PowerEdge VRTX

A streamlined IT infrastructure can be the key to success for quickly growing remote/branch offices and small- and medium-sized businesses. All too often, however, IT systems in these office environments comprise an unwieldy jumble of disparate servers, storage and networking components that inhibit efficiency and flexibility. Accordingly, IT administrators and business unit managers alike are seeking simplified, flexible and efficient solutions that enable — rather than hinder — business success while boosting worker productivity and customer satisfaction. To help users achieve these goals and attain greater simplicity, efficiency and versatility in ROBO sites, Dell engineered the PowerEdge VRTX shared infrastructure platform. Download this white paper to learn more about Dell PowerEdge VRTX.

Dell PowerEdge FX2 Solution Saved Time, Labor, Space and Money

Faster server deployment in half the space means big savings for growing companies. This resource delivers test results on enclosures and servers that are built to save time, labor, and money while leaving plenty of room to grow. Read on to learn how Dell PowerEdge FX2 servers powered by Intel® Xeon® processors provide 50% more available rack space while requiring 62.8% less time to deploy.

Driving Better Business Outcomes with Office-Optimized IT

Integrated IT platforms can be the key to success for quickly growing remote office/branch office (ROBO) sites. The Dell PowerEdge VRTX with Intel® Xeon® processor integrated solutions platform spurs exceptional business results for remote, branch and small offices.

Convergence’s Early Adopters: Three Trends in Migration

A new IDG Research study reveals that IT professionals are already seriously considering converged systems. The advantages of converged systems are clear. Still, some reticence remains due to concerns about cost and ROI. Learn how converged systems bring value to the enterprise today and tomorrow, and see how Dell PowerEdge FX solutions smooth the road to convergence.

Western Oregon University: A Leap Forward in Digital Education

In today’s 24/7, always-on world, people expect institutions of higher education to lead with technology. Constant connectivity, mobility, and access to rich media anytime, anywhere not only define the educational experience, but also help to attract and retain the best students, faculty, and staff. Western Oregon University (WOU), relies on NetApp to help support its mission of providing effective, technology-powered learning opportunities.

Smarter Cities Public Safety - Law Enforcement

IBM Smarter Cities Law Enforcement solutions incorporate a range of best-of-breed technologies from IBM and IBM Business Partners to address critical law enforcement challenges. These solutions can help agencies collect, integrate and distribute information to officers anywhere—in operations centers, investigative offices, on patrol or at a scene—while sharing information with other organizations. By implementing IBM Smarter Cities Law Enforcement solutions, cities can realize immediate benefits while supporting a longer-term public safety transformation from a reactive approach to a proactive, predictive approach that helps create a safer, more desirable environment for citizens.

Putting Managed File Transfer in Perspective: Take a Look Ahead

As organizations are adapting their managed file transfer initiatives to keep pace with several dimensions of the hyper-growth being caused by current technology megatrends, they should also look ahead to ensure that their capabilities incorporate two important themes: speed, and governance. Download this ebook to learn more!

Case Study: Operation Nighthawk

Special Operations Forces (SOF) from friendly countries use joint training exercises, such as Operation Nighthawk, to improve their own capabilities and to ensure that they can work together to counter cross-border and multi-national threats. Operation Nighthawk was a 2014 multinational SOF training exercise, bringing together 1,600 personnel from military and police forces from more than 10 countries. The goal was to simulate a fast-paced deployment of SOF units to an active hotspot, and train both field operatives and support staff to plan and conduct special operations.

Enterprise Insight Analysis for Defense Intelligence Brochure

As national security and defense threats become more asymmetrical and complex, intelligence organizations and agencies are challenged to respond more efficiently and precisely. With shrinking budgets and limited resources, these agencies need a solution that can help them accelerate the data-to-decision process, so they can make better informed decisions and take confident, effective action. IBM® i2® Enterprise Insight Analysis is a next-generation intelligence solution designed to help do just that by applying advanced analytics at scale and with critical speed.

Top Five Considerations for Technology Managers

Being a technology manager involves much more than project management skills. In this dynamic field of software development, managers who understand what a software developer does and know how to build a tech team will have an advantage over those who don’t really get it. To better manage technology projects, it is also necessary to understand why IT projects fail, the importance of QA and UA testing, and the inevitability of changes in scope.

Rugged Computing for Rough Environments

Some jobs really push the limits—not just for the employees who do them, but for the technology they use as well. First responders, military personnel, oil-and-gas field workers, insurance adjusters, remote salespeople and even NASCAR teams are among the many employees working in demanding or extreme environments. While their responsibilities vary widely, they share a common need for rugged yet portable computers that can stand up to especially challenging conditions. Download this report to learn how Dell Rugged notebooks, including the Latitude 14 Rugged Extreme with Intel® CoreTM processors, offer secure, reliable, and powerful computing for mobile workers in such "harsh verticals."

3 Must-Haves for Rugged Devices

A rugged notebook or tablet is just one piece of a mobile solution for highly demanding, tough work environments. When combined with the right level of support, security, and manageability, the comprehensive solution will keep employees in the field, on the road, and thriving in the harshest conditions. Download this whitepaper to learn more about how to find the right combination of rugged notebooks, which feature Intel® vPro technology, and the appropriate services to meet the demands of your end users.

How the Implementation of Development Strategies Plays a Role in Project Management

Agile, Extreme Programming, Scrum, Kanban—the exhaustive list of methodologies goes on. While the pros and cons of each framework spark endless debate, all of them have a place in software development. By taking a look at a few of these methodologies, tech managers can get a feel for which ones might be helpful for their team.

3 Essential Components for a Strong Enduser Security Experience

Security breaches are expensive, costing U.S. businesses an average of $3.5 million per incident, which doesn't include brand damage or other intangibles. Unfortunately, breaches are highly likely to happen, with 87% of organizations experiencing a breach in the past 12 months. Data, whether it's intellectual property or personal data, needs to be protected. Upgrading systems is a great first step, but read this summary to learn more about how to leverage Dell Data Protection solutions as well to provide encryption, malware protection, and authentication for Dell and non-Dell products, to equip businesses with a complete, easy-to-manage, end-user security solution.

Four Ways to Win by Replacing Legacy Laptops and Desktops

Security. That’s what keeps IT leaders up at night. Yet security is not the only concern – to it, you can add incompatible platforms and operating systems, limited technical/IT resources, and ever-shrinking budgets. Research from IDG shows a direct correlation between the mitigating these challenges and upgrading client hardware and OS’s. Read this 2 page paper to learn more about how replacing legacy client systems can help alleviate security risks while improving end user productivity.

Mobile Security: Confidence Ebbs as BYOD Booms

Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing the holistic issue of endpoint security. Download this two-page paper detailing the IDG Research results for expert advice on securing your organization’s data on Dell devices with Intel® Core™ vPro™ processor family in an increasingly mobile world.