What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepapers


Reap the Rewards of Software-Defined Storage

In a software-defined enterprise, servers and desktops are usually the first targets for virtualization. Increasingly, however, agencies are embracing SDS to give them better control, flexibility, and insight into how they use storage throughout the organization. Download this digital dialogue to learn how the General Services Administration (GSA) is beginning to use SDS technology to help change how storage is managed in the enterprise.


Forbes Insight: The Big Bang

This Forbes Insights analyst report explores whether cloud computing is the “silver lining” for business resilience today. It covers topics such as how the cloud is changing resilience in the expanding universe of digital data; what cloud can do for you when it comes to recovery, security and compliance; and how to design a cloud strategy to improve your resilience. Read the report to find out how IBM can help you better address today’s complex threat landscape and speed recovery from unplanned outages.


The Next Generation Data Center

This white paper explores IBM’s vision for the next-generation data center, its potential to be truly revolutionary and the prescribed pathway for getting there. Download this white paper now to learn more!


Optimized Sourcing in Hybrid Environments

This research paper from Saugatuck Technology discusses the multi-sourced hybrid IT environment, including how to recognize the needs that can increase costs and compromise operations, and how to optimize the environments for peak effectiveness.  


What Child Welfare Caseworkers Need to Go Mobile

The typical caseworker only spends about 18 percent of their time in face-to-face contact with children and families while over 12 percent of their time is spent traveling and over 33 percent of their time is spent preparing documentation. Mobility and access to mobile devices are part of our personal lives, but have not become a regular part of the caseworker’s professional career. In fact, acceptance of mobile technology by social workers has been slow compared to other industries. This white paper examines the ways in which mobile access to case management systems, data and information, assessment and referral capabilities and other tools could go a long way toward reducing child welfare caseloads and workload, and improving caseworker efficiency. It also details the specific capabilities that child welfare caseworkers need from mobility tools.


Transforming Child Welfare Service Delivery

Child welfare professionals are making life and death decisions about children and their families every day. Caseworkers are typically juggling caseloads of 20, 30 or more children and families at any given time and the agency they work for might be serving tens, if not hundreds, of thousands of individuals. Each individual in a family might be receiving multiple services with varying eligibility requirements, and any child or family might have more than one caseworker from more than one government organization. This solution brief examines the ways in which technology can enable the transformation of child welfare service delivery by supporting a multi-disciplinary approach to child welfare and by enabling prevention and remediation strategies that help protect children and facilitate permanency, while also improving resource utilization.


Flash Forward: Putting MFT in Perspective

File transfer used to be just a tactical issue. Most organizations typically faced relatively straightforward challenges, such as dealing with different file types, developing new transfer protocols and coming up with better encryption algorithms. But now that reliable, secure, automated managed file transfer (MFT) solutions are fundamental to most business processes, the challenges have never been greater. MFT initiatives need to keep up with the rapid growth of current technology megatrends while also meeting the ever-increasing demand for faster, more secure file transfers.


Video Security and the Risks of Shadow IT in the Public Sector

Employee use of consumer-grade video conferencing in the public sector raises significant security concerns. Sidestepping IT regulations puts organization at risk when critical, private, and classified information is exchanged. Read this paper to learn how to curb “shadow IT” practices and promote secure but quality and cost-effective solutions.


Chaos to Control: Creating a Mature File Transfer Process

Many organizations struggle with the challenge file transfer. File sizes are bigger, people are using a variety of transmission methods, and sending errors are reducing productivity while increasing costs. What steps are companies taking to transform file transfer in today’s extended enterprise? Read this ebook from Aberdeen to learn why leading organizations are moving away from the chaos of multiple methods to a single managed file transfer platform, and get best practices for developing a secure, best-in-class file transfer process of your own.


Enterprise Insight Analysis for Defense Intelligence

As national security and defense threats become more asymmetrical and complex, intelligence organizations and agencies are challenged to respond more efficiently and precisely. With shrinking budgets and limited resources, these agencies need a solution that can help them accelerate the data-to-decision process, so they can make better informed decisions and take confident, effective action. IBM® i2® Enterprise Insight Analysis is a next-generation intelligence solution designed to help do just that by applying advanced analytics at scale and with critical speed.


Enterprise Insight Analysis for Cyber Intelligence

Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months and can cost an organization an average of 11 million USD2. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. The IBM® i2® Enterprise Insight Analysis solution is a next-generation intelligence solution designed to turn overwhelming and disparate data sets into comprehensive intelligence, in near real time.


Case Study: Operation Nighthawk

Special Operations Forces (SOF) from friendly countries use joint training exercises, such as Operation Nighthawk, to improve their own capabilities and to ensure that they can work together to counter cross-border and multi-national threats. Operation Nighthawk was a 2014 multinational SOF training exercise, bringing together 1,600 personnel from military and police forces from more than 10 countries. The goal was to simulate a fast-paced deployment of SOF units to an active hotspot, and train both field operatives and support staff to plan and conduct special operations.


21st Century Emergency Management

Download this article to learn how an Emergency Management solution provider can address the technological complexity found in the emergency management environment. Recognizing that the needs of regional and local Emergency Management professionals include specialized capabilities, IBM has established several key partnerships with industry leaders to provide such capabilities for clients. These partnerships allow IBM solutions to integrate with leading GIS providers, and include specialized analytics and intelligence capabilities in the toolbox.


Value of Smarter Public Safety & Security

Politicians and citizens consistently rank safety and security as a high priority. Agencies are now utilizing data to assist in the new challenges facing public safety. With the right capabilities, agencies can go beyond simply managing data to exploiting it. Download this article to find out how this can be done without significantly increasing operating costs.


High-Performance Law Enforcement

Getting the right information into the right hands at the right time is not only critical in law enforcement – it can be a matter of life or death. To ensure critical data is available to officers – whether in an office or in the field – law enforcement agencies have been making significant investments in technology. But to get the most out of the new tools available to fight crime, law enforcement agencies need an integrated, end-to-end technology strategy — one that delivers the capabilities they need to protect and serve the public in a cost-effective manner. Read this paper to find out how law enforcement agencies can improve public safety outcomes by developing an integrated technology strategy that supports the wide variety of specific capabilities needed to prevent and solve crime.


i2 Enterprise Insight Analysis Solution Brief

Whether they are part of a business or working for a government organization, today’s investigators, security specialists and intelligence analysts are facing extraordinary pressure to respond quickly to a wide range of threats — from cyber attacks, terrorist threats, criminality, and unethical and immoral activities. These attacks are especially challenging as societies are increasing their reliance on cyberspace for economic growth, societal well-being, government operations and critical infrastructure monitoring and management. Concurrent with the increase in cyberspace reliance is an increase in cyberspace vulnerability. This vulnerability is amplified by an increasing frequency and complexity of attacks and highly variable, diverse and rapidly evolving threats. As such, there is a greater burden on organizations to respond in real time.


Delivering on the Promise of Virtualization

With budgets pressures increasing, agencies are looking for anything that can help them maintain mission capabilities. As virtualization technologies continue to prove their worth in providing cost savings, boosting performance and operating efficiencies, they are increasingly showing themselves to be an essential technology to help agencies meet their IT goals. Download this special report to learn more on the growth of virtualization, containers, and software-defined platforms.


Enhancing a City's Ability to Plan, Protect and Manage with Intelligent Video Analytics

Innovative leaders are creating smarter, safer, more secure cities - protecting citizens and the city’s economic value. Download this article to learn how intelligent video analytics solutions extend the capabilities of existing video assets, and enhance the effectiveness of safety and traffic management personnel.


Data-driven Government: Challenges and a Path Forward

Governments have never suffered from a lack of data. In fact, one could argue that, historically, they have suffered from an excess of data, much of which was rarely used. Governments are using computer technology to capture and harvest this data and extract value from it. However, more can be done to apply it to agency missions. This paper explains data-driven government and challenges related to it and outlines a way forward in the journey to a data-driven government.


How to Deal with the Trickle-Down Effect of Change

Changes happen. And along with that comes even more changes. Nowhere has this been more evident than in the state and local health and human services arena over the past three years. When the Affordable Care Act (ACA) altered the way people apply for and receive Medicaid and Children’s Health Insurance Program (CHIP) benefits, states found that their existing eligibility systems were no longer sufficient. Download this digital dialogue to learn more on how The Center for Medicaid and CHIP Services helped states modernize their benefits eligibility systems to comply with the Affordable Care Act.


Make Decisions Easier

Delivering health and human services benefits is a critical and challenging task for state and local health departments. To support overburdened systems and case workers, officials are increasingly turning to technology. Download this digital dialogue to learn how business rules engines are leading the way to help officials reach conclusions about residents’ health and human services quickly and accurately.


State and Local Innovation Series: September 2015

As technology becomes more integrated with our every day business, data suddenly becomes essential to managing our duties. Download this series of articles showing how data is able to help government agencies with day-to-day tasks. Learn about Boston builds on open data initiatives, 7 steps to securing open government, 8 cities win innovation support, and many more!


From Chaos to Control: Creating a Mature File Transfer Process

Moving files in the extended enterprise requires not only support for higher scale with fewer resources, but also dealing with the relentless challenges of security; compliance; errors, exceptions, and problems; and the time and opportunity cost of problem resolution. Download this ebook now and discover Aberdeen Group’s analysis found that mature, managed file transfer processes experienced 26% fewer issues and 4.8-times faster time to correct them, among many other benefits.


DevOps: Drving Organizational Charge and Agility with PaaS

Creating and managing applications and processes using the Platform as a Service model has always been an excellent way for developers to work faster and more productively, while letting the operations team reduce the time it takes to get important services and applications to users. Agencies that have been using PaaS to achieve these benefits know well that while the productivity, cost and scalability advantages have been significant, there are sometimes roadblocks to achieving even greater benefits. Download this free eBook to find out how PaaS can better assist you!


Internet Security Threat Report

Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 57.6 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services such as Symantec DeepSight™ Intelligence, Symantec™ Managed Security Services, Norton™ consumer products, and other third-party data sources.


Comparing IBM FlashSystem to Traditional Performance Disk Systems

Using a detailed, in-depth cost analysis model validated by actual customer interviews, this Economic Value Validation white paper from ESG demonstrates how IBM FlashSystem is less expensive than equivalent disk-based enterprise storage systems. Download this article to find out more!


Flash Array Deployment for Dummies

Download now to learn the history, business values and fundamentals of deploying a flash system at a basic level.


Wideband Multimode Fiber - What is it and why does it make sense?

Multimode fiber (MMF) cabling is the workhorse media of local area network (LAN) backbones and data centers because it offers the lowest cost means of transporting high data rates for distances aligned with the needs of these environments. Channel capacity has been multiplied through the use of parallel transmission over multiple strands of fiber. Learn about Wideband Multimod Fiber (WBMMF), a new cabling system that increases the capacity of each fiber by at least a factor of four!


Western Oregon University: A Leap Forward in Digital Education

In today’s 24/7, always-on world, people expect institutions of higher education to lead with technology. Constant connectivity, mobility, and access to rich media anytime, anywhere not only define the educational experience, but also help to attract and retain the best students, faculty, and staff. Western Oregon University (WOU), relies on NetApp to help support its mission of providing effective, technology-powered learning opportunities.


Top Five Considerations for Technology Managers

Being a technology manager involves much more than project management skills. In this dynamic field of software development, managers who understand what a software developer does and know how to build a tech team will have an advantage over those who don’t really get it. To better manage technology projects, it is also necessary to understand why IT projects fail, the importance of QA and UA testing, and the inevitability of changes in scope.


How the Implementation of Development Strategies Plays a Role in Project Management

Agile, Extreme Programming, Scrum, Kanban—the exhaustive list of methodologies goes on. While the pros and cons of each framework spark endless debate, all of them have a place in software development. By taking a look at a few of these methodologies, tech managers can get a feel for which ones might be helpful for their team.


NETCENTS-2: Jetting Toward Higher Potential

The Network-Centric Solutions-2 (NETCENTS-2) contracts provide the Air Force with a primary source of netcentric and IT products, services, and solutions. Use of the NETCENTS-2 contracts (except ITPS) is mandatory for Air Force organizations as the contracts are awarded. NETCENTS-2 is a follow to the successful NETCENTS-1 program, on which ordering stopped at the end of fiscal 2013. With a total contract ceiling of more than $24 billion, the seven-year contract is more than twice the size of NETCENTS-1 and carries more than 12 times the number of vendors. Download this guide to learn more about the improvements and changes of NETCENTS-2.


Get Connected: A Checklist for a Smarter, More Effective Government

It’s been said that throughout history, the only constant is change—and nowhere is that more true than within the government. Demands change on a daily basis, and only the most well connected agencies will be able to keep up.


A New Era of Transparency: 5 Best Practices for Open Data in Government

Modern transparency enables data insights to action for the greater good. This paper outlines 5 ways for government agencies to utilize, understand and share open data with the public.


Data Driven Government eBook

The amount of data available today is enormous, bringing with it unprecedented opportunities and challenges for innovation. Turning to cloud computing—the on-demand acquisition of IT services through the use of shared servers—has been the logical next step for forward-looking agencies. The versatility, scalability, elasticity and reliability of the cloud allow agencies to reduce cost expenditures while simultaneously improving efficiency and analytics capabilities.


IBM Intelligent Law Enforcement: Integrated Tools for Proactive Policing

Modern law enforcement agencies have access to a flood of data. While law enforcement thrives on information, the sheer volume of internally and externally collected data often makes finding the right information at the right time a seemingly impossible task. Agencies that maximize their ability to quickly extract value from this data can reduce crime, meet new and emerging threats, improve officer safety and better meet rising public expectations.


Dynamic Content: Connecting Performance and Learning

Learning Content Management Systems (LCMS) can improve organizational performance by providing more focused learning materials while reducing costs. Download this brief to learn how introducing dynamic content can give your organization a competitive edge by developing more effective strategies to tackle performance and training development.


VersaStack Solution by Cisco and IBM

Cisco has joined with IBM to create the world’s first integrated infrastructure based on the IBM Storwize family of virtualized storage technologies and the Cisco Unified Computing System (Cisco UCS).


Flash Array Deployment For Dummies

Learn the history, business values and fundamentals of deploying a flash system at a basic level.


Working Smarter with Automation

Faster, better, cheaper. When it comes to how government users want to access IT resources, it’s practically a mantra. Add to that mandates such as Cloud First, the Digital Government Strategy and the Federal Information Technology Acquisition Reform Act, and it soon becomes clear why automation is so critical to agencies today. Download this whitepaper to learn the best practices in automation.


Mining Gold from Machine Data

Holistic visibility is more important than ever because most IT services— including email and web services— consist of a series of connected applications and infrastructure components. Download this whitepaper to learn the best ways to enhance your IT operations management strategy and gain insightful understanding and visibility into your organization’s data center.


Breaking through the Security Cloud

Although many organizations are in the process of planning and executing cloud adoption, security remains to be a major barrier. Download this special report to learn more about cloud computing threats, the benefits of hybrid cloud and managed cloud services as well as how to stay compliant.


Finding the Right Storage Balance

New virtualization techniques and emerging flash technologies are giving data center operators more control over how they manage storage systems, speed backups and reduce costs. Download this article to learn how storage management can improve the economy of your data centers.


Storage for VDI Environments: Planning and Considerations

Storage is often cited as the item most often responsible for performance success or failures, and also has the largest impact on total costs. Achieving good cost-performance levels requires a storage architecture optimized for VDI. Download this guide to learn the top issues your organization should consider before embarking on a VDI implementation.


New Hybrid Storage Solutions Can Help Organizations Meet a Variety of Challenges

Many enterprises today are grappling with a dramatic increase in the amount of data they need to manage and store. And with the ongoing growth of mobile applications, social media, and big data and analytics initiatives, the data storage challenges will only become greater over the coming years. Download this informative brief to gain further insight into hybrid storage and what to look for in a solution.


Flash Storage for Virtualization for Dummies

Organizations are virtualizing server and desktop resources more aggressively than ever, which dramatically changes the performance demands on storage. Download this whitepaper to learn how to overcome storage issues, balance capacity and optimize performance.


Cloud Solutions and the One-Size-Fits-All Fallacy

While it may be tempting to make an all-or-nothing decision when it comes to the cloud, it’s not that simple. Download this Q&A to gain further insight from industry experts on how to choose the right cloud strategy for your organization.


21st Century Emergency Management

Today, the societal needs have become very interconnected. Many complexities exist for the societal infrastructure such as power, water, and medical services – as well as the most basic economic activities.


IBM Emergency Management Brochure

IBM Smarter Cities Emergency Management solutions incorporate a range of technologies from IBM and IBM Business Partners to address emergency management challenges. These solutions assist cities in collecting, analyzing and distributing key information amongst key stakeholders.


VMware's First Hybrid Cloud Integrates Existing, New Applications

Federal mandates on cloud use are changing the face of government information technology. But challenges to using cloud still remain. To help ease cloud migration, VMware has created a product that lets customers move existing infrastructure using the same management tools as vSphere.