Whitepaper List


Making Contact Count: Cloud-based contact centers can jump start citizen engagement

When a federal agency moves from an on-premises contact center to a cloud-based operation, citizens are more likely to experience fast service, informed representatives, short hold times and speedy resolution of their problems – hallmarks of interactions with private-sector companies that tend to drive citizen satisfaction. Research shows that resolving citizens’ issues on first contact increases satisfaction by 28 percent, and finding resolution within 15 minutes raises satisfaction 18 percent.


Preparing for Digital Transformation in Public Safety

As state and local governments increase infrastructure and public safety expenditures in response to broader technological changes, public safety organizations have an opportunity to modernize in ways that make communities and the first responders who serve them safer, smarter and better prepared to respond to unanticipated challenges.


Need Workstation-Class Performance and Affordability? You Can Get Both

For years, workstations were used only for very specialized applications that required ultra-high performance and carried a high-value work product that justified a hefty price tag. But while performance demands have intensified, you may be surprised to learn that your budget can, in fact, support workstation investments.


Using Open Data to Improve Financial Accountability in Public Sector

For years, federal, state, and local governments, along with educational institutions, have heard the call to be more transparent and accountable by making data available for public consumption. Even before the “Digital Revolution,” taxpayers and the media wanted to know how public money was spent—and if citizens were getting a good return on investment. Those expectations rose with the proliferation of public-facing websites.


Using Data Analytics to Prevent & Detect Fraud

The sophistication and complexity of fraud schemes continue to grow and outclass conventional anti-fraud measures. Fraudsters, or people who commit corporate fraud, whether employed internally or externally, continue to develop new strategies to defraud organizations.


Rugged mobility: Four Mission - Critical Requirements to Keep Remote Workers Productive

To provide users with complete ruggedized solutions, devices powered by Intel® Core™ processors need much more than extremely reliable performance in harsh working conditions. They need security, manageability, support and, when required, readily available service. That way, remote workers can stay productive no matter where they are, what they're doing or the conditions they face.


The Advantage of Deploying Dell Rugged PCs

Rugged PCs are designed to meet certain stability and reliability standards in harsh environments, including extreme temperatures, dust, moisture, water, shock, and vibration. Deployed more like infrastructure than traditional commercial PCs in fields like law enforcement, fire and rescue, rugged PCs are mission critical. However, the complexity, testing, and development costs needed to meet rugged user industry standards create a scarcity of major players and choice in the market. With two of the three main OEMs lacking the scale needed to drive down costs and effectively bring out new technologies.


Cybersecurity Modernization - Transform Government While Controlling Business Risk

Moving systems to the cloud, introducing mobile devices into the workforce, investing in smart city projects and undergoing other modernization efforts can introduce risk if agencies can’t sufficiently protect their data. According to a recent survey, 92 percent of government respondents will use sensitive data in an advanced technology within the year, yet 96 percent consider themselves “vulnerable.”


Get the Right Devices for Your Rugged and Field Environments

People accomplish more with digital tools and workflows, and workforce transformation puts this concept into action by making sure employees have seamless, reliable access to the right IT - anytime, anywhere. You can ensure each one of your workers has the right device to stay efficient regardless of their workflows and environments by engaging Dell. It provides some of the world's top PCs, laptops, notebooks and 2-in-1s - plus rugged and rugged extreme tablets and laptops powered by 8th Generation Intel® Core™ processors.


7 Essential Finance Dashboard Strategies

Great finance dashboards have the power to make a huge impact within every business. As someone who provides critical reporting that impacts and informs your business’s key decision-making, it’s crucial that the analysis and reporting you provide is carefully crafted to meet the needs of your business users, regardless of their level of data literacy.


Digital Transformation from the Front Lines to Dispatch to the Cloud

Digital transformation is moving to the top of public safety organizations’ agendas as public officials and decision makers look to respond to the demands of our rapidly changing world—a world in which technology is causing extraordinary disruption and innovation.


Virtual Event: IBM Government Cloud Virtual Summit - Special Hybrid Cloud Edition

The IBM Government Cloud Virtual Summit is designed for leaders and change makers working to apply the power of cloud and AI technologies to the unique needs of government agencies. At this free online conference, engage with government and industry experts who share their lessons learned on topics ranging from digital government leadership to application modernization and getting more value from your data.


Assisting Public Assistance: Advanced technology seeks to cut billions in “dual participation” losses

Beneficiaries of public assistance programs who receive benefits from agencies in multiple states contribute to the “dual participation” challenge, a problem that costs taxpayers billions of dollars annually. New solutions for shrinking “dual participation” enable data to be shared, in real-time, among agencies within and across states. In this podcast, learn how a national data clearinghouse reduces “dual participation.”


I.T. Security Isn't Just More Important Than Ever. It's the Most Important Thing, Period

While reports of large organization suffering from cybersecurity breaches continue to emerge, we believe that comprehensive and customizable end-to-end IT security not only dramatically reduces the risks of being compromised but can also have a tremendous benefit to the institution. ThinkShield goes beyond simple endpoint security, with solutions that create huge efficiencies, streamline IT administration, improve the end-user experience.


Building a Secure, Cyber-Resilient Culture

Local and federal government organizations have suffered 443 data breaches since 2014 — and they’re not receding. The data shows that last year was the worst yet, with hackers showing no signs of slowing down. But, building a secure infrastructure isn’t the sole responsibility of IT staff; it’s an organizational undertaking that requires an agency to put digital security at the forefront of their focus. And, that means implementing from every member of an organization, from the top down.


Virtual Event: How Virginia gets flexibility and innovation with hybrid cloud

Agencies at all levels in the Commonwealth of Virginia are undergoing tremendous change. The complexity of managing multiple clouds and data centers, and fragile legacy applications create opportunities and challenges to modernizing IT and improving resiliency.


Virtual Event: Leading digital transformation through the next evolution of cloud

Government leaders are managing and leading agencies through big technology shifts: from proprietary to open platforms, analytics to AI, and from single to multiple clouds vendors. The opportunity to advance missions, increase security and create impact for stakeholders within this shift is significant, but agencies can travel only as fast as as their people and processes let them.


Customer Story: Utility District

A 1998 American Presidential directive set up a national program to identify critical infrastructure components that needed elevated protection from possible terrorist attacks. Critical infrastructures can include any element that supports emergency services, telecommunications, energy, financial, water, food, transportation sectors, and anything involved in ensuring continuity of government.


Virtual Event: Lessons in data-driven innovation from one of the world's largest medical supply chains

Too often technological silos keep us from leveraging data to address public challenges. Working with USAID, PEPFAR, and the U.S. President’s Malaria Initiative, Chemonics and IBM are enhancing data visibility to increase the efficiency and effectiveness of a global health supply chain used to procure and deliver lifesaving medicines and health commodities around the world. In a panel discussion filled with lessons applicable to government leaders at any level, hear how the right business processes, analytics, and cloud solutions have played a key role in ensuring these essential health commodities reach people in more than 60 countries around the world.


Transform Your Health and Social Program Paradigm

Underfunded and overburdened social services programs frequently operate on similarly underfunded and overburdened information systems. While one agency may use one system, another uses another one that’s entirely different and incompatible with the first.


Transforming Government with Cloud Technologies

The cloud is ubiquitous. Whether we think about it consciously or not, almost all of us are using cloud services. That could be a music service like Spotify, a storage service like Dropbox, or a software-as-a-service application like Salesforce.


Sonoma County and IBM working together to change lives

Service delivery models are outdated and for that reason, among others, our most vulnerable citizens aren’t getting the help they need. At the same time, their high expectations are stressing local agencies to the breaking point. Society needs to change the way it serves these members of the population, and Sonoma County in California is taking the lead.


Digital Reinvention: Rethinking the business of government

The time has come to fundamentally rethink the underlying operations, processes, and culture that make up the business of government – the time has come for a digital reinvention.


The IBM Watson Health Solution for Child Welfare

Many US child welfare organizations are transforming their Statewide Automated Child Welfare Information Systems (SACWIS) into the new vision of Comprehensive Child Welfare Information Systems (CCWIS). Now is a good time to consider how child welfare organizations gather, manage and use data, and how their systems enable them to protect children and strengthen families.


Hamburg Authority of Labor, Family and Integration

The prevalence of child abuse and neglect is a major problem in Germany. An estimated three children die in Germany each week from the effects of physical abuse, according to Germany’s Federal Criminal Police Office1, and many cases go unreported. Experts in child protection at the Koblenz University of Applied Sciences state that for each victim of abuse recorded in official statistics, there are another five that are not recorded2.


IT Consolidation - What’s Next for Government and Education Modernization Initiatives?

IT consolidation has been a high-priority government and education initiative for many years. While many state and education organizations are already on board, or boarding quickly, the move may be born of a different catalyst than you may expect—certainly different than federal agencies.


Tableau Advances the Era of Smart Analytics

The next breakthroughs in business intelligence (BI) and analytics will see machine learning and artificial intelligence used to improve data access and data quality, uncover previously hidden insights, suggest analyses, deliver predictive analytics and suggest actions. What’s more, natural language (NL) interfaces will make it easier for business users without knowledge of data science or query languages to explore information, gain insights and make better, data-driven decisions.


Get the Right Devices for Your Rugged and Field Environments

People accomplish more with digital tools and workflows, and workforce transformation puts this concept into action by making sure employees have seamless, reliable access to the right IT - anytime, anywhere. You can ensure each one of your workers has the right device to stay efficient regardless of their workflows and environments by engaging Dell. It provides some of the world's top PCs, laptops, notebooks and 2-in-1s - plus rugged and rugged extreme tablets and laptops powered by 8th Generation Intel® Core™ processors.


The Advantage of Deploying Dell Rugged PCs

Rugged PCs are designed to meet certain stability and reliability standards in harsh environments, including extreme temperatures, dust, moisture, water, shock, and vibration. Deployed more like infrastructure than traditional commercial PCs in fields like law enforcement, fire and rescue, rugged PCs are mission critical. However, the complexity, testing, and development costs needed to meet rugged user industry standards create a scarcity of major players and choice in the market. With two of the three main OEMs lacking the scale needed to drive down costs and effectively bring out new technologies.


Customer Story: Utility District

A 1998 American Presidential directive set up a national program to identify critical infrastructure components that needed elevated protection from possible terrorist attacks. Critical infrastructures can include any element that supports emergency services, telecommunications, energy, financial, water, food, transportation sectors, and anything involved in ensuring continuity of government.


Hamburg Authority of Labor, Family and Integration

The prevalence of child abuse and neglect is a major problem in Germany. An estimated three children die in Germany each week from the effects of physical abuse, according to Germany’s Federal Criminal Police Office1, and many cases go unreported. Experts in child protection at the Koblenz University of Applied Sciences state that for each victim of abuse recorded in official statistics, there are another five that are not recorded2.


The IBM Watson Health Solution for Child Welfare

Many US child welfare organizations are transforming their Statewide Automated Child Welfare Information Systems (SACWIS) into the new vision of Comprehensive Child Welfare Information Systems (CCWIS). Now is a good time to consider how child welfare organizations gather, manage and use data, and how their systems enable them to protect children and strengthen families.


Minding the Gap

As public sector agencies continue to use new technologies to improve constituent services, new vulnerabilities will emerge. And as the attack surface continues to expand, the ability to predict and prioritize the most pressing threats will be increasingly valuable.


Application Monitoring for On-premises, Hybrid, and Multi-cloud Environments

Applications live everywhere within government and education organizations—on-premises, in the cloud (AWS®/GovCloud, Azure®, Google®, Cloud.gov), or in some combination of these. Yet, no matter where your applications live, they still need to be monitored for performance and optimization. How can you successfully monitor all your applications, no matter where they are?


Analysis and Compliance to Meet CJIS and FTI Security Standards

Most organizations face a constantly changing compliance landscape, and often must adhere to multiple regulatory compliance standards, each with their own set of requirements. Tenable.sc™ can help these organizations fulfill multiple standards’ requirements for meeting and demonstrating compliance, can help save time when facing required audits and provide a platform for protecting the entire enterprise environment.


Help America Vote Act (HAVA) Funding and Critical Infrastructure Security

How states can utilize HAVA funds to acquire cyber tools and solutions that can be shared across ALL critical infrastructure subsectors to protect sensitive data and to optimize budgets and resources. Recommendations Regarding Critical Infrastructure and Elections Systems Security Funding


Coming to Terms: A $20 Billion Procurement Contract Finds its Way

CIO-Commodities and Solutions (CIO-CS), a $20-billion contracting vehicle, has received a Best-in-Class (BIC) GWAC designation. CIO-CS seeks to help agencies save money by shifting them from owned assets to cloud-based managed services.


The Ride-Along: Intelligence Analysis for Real Time Crime Centers

On the first episode of "The Ride-Along" series, join IBM i2 Law Enforcement Subject Matter Experts as they talk about technologies and methods to more effectively and efficiently combat crime using intelligence analysis and real time crime centers.


Rugged Mobility: 4 Mission Critical Requirements to Keep Remote Workers Productive

To provide users with complete ruggedized solutions, devices powered by Intel® Core™ processors need much more than extremely reliable performance in harsh working conditions. They need security, manageability, support and, when required, readily available service. That way, remote workers can stay productive no matter where they are, what they’re doing or the conditions they face.


The Advantage of Deploying Dell Rugged PCs

Rugged PCs, which are predominantly used for vertically aligned commercial computing needs, are designed to meet certain stability and reliability standards in harsh environments, including extreme temperatures, dust, moisture, water, shock, and vibration. Deployed more like infrastructure than traditional commercial PCs in fields like law enforcement, fire and rescue, mining, and oil and gas exploration, rugged PCs are mission critical in these sectors where minimal downtime is a key competitive necessity and customer requirement. Dell’s unique approach to rugged computing includes a battery of tests and hardware development methods designed to produce more reliable, rugged systems, and its scale allows it to deliver the latest technologies faster and more reliably to the market.


Get the Right Devices for Your Rugged and Field Environments

People accomplish more with digital tools and workflows, and workforce transformation puts this concept into action by making sure employees have seamless, reliable access to the right IT—anytime, anywhere.


Case Study – New York Uses Data to Transform Healthcare Delivery

There are six million eligible Medicaid recipients in the state of New York — the second most of any state. The program is costing the state $18.2 billion in FY 2017, or 19 percent of its $96 billion operating fund. That expense is expected to increase by another $1 billion in FY 2018. These numbers mean that if New York can make Medicaid more efficient by even a fraction of a percent, it will positively impact other programs the state supports — not to mention its bottom line.


Gartner Market Guide for Identity Proofing and Corroboration

According to the Gartner guide, “Security and risk management leaders must discard flawed legacy methods and embrace analytics that evaluate multiple positive and negative signals.” The guide sketches out how to do this and which vendors can help you.


Addressing Social Determinants and Their Impact on Healthcare

Only by conducting a deep examination of the social factors that affect healthcare can the organizations charged with delivering that care arrive at an effective and optimal process. There are myriad benefits associated with a taking this type of holistic approach. One of the ways to arrive at this more intelligent approach to providing healthcare is to take a hard look at all the factors and considerations.


Citizen-Centred Service Delivery

Citizens requiring government services often don’t have the time or even the ability to go seeking out individual services from individual agencies. They’re often forced to fill out the same information on similar forms over and over again. The duplication across various levels of government organizations adds cost and complexity to the process, and often prevents citizens from getting what they need.


The Forrester Wave_Security Analytics Platforms, Q1 2017

In this Forrester 36-criteria evaluation of security analytics (SA) providers, Forrester identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise(HPE), Huntsman Security, IBM, Intel Security,LogRhythm, RSA, Securonix, and Splunk — and researched, analyzed, and scored them.


Hybrid Cloud Strategies for Dummies

In this recent Forrester study, 300 IT leaders share why their migration strategy includes both public and private cloud—and the kinds of challenges they’re facing along the way.


Cloud migration is Actively Embraced, But Not For Everything

300 of today's cloud migrators reveal their motivations. Learn the current trends, benefits, and hurdles of public cloud adoption.


Hybrid Cloud: An Obvious Reality Or A Conservative Strategy?

In this recent Forrester study, 300 migrators reveal the value of hybrid cloud. Learn why and how IT leaders are making private cloud a vital part of their migration strategy


Retooling Engagement: New solutions help State and Local Agencies to refine the user experience

Background: The Tennessee DHS provides temporary economic assistance, work opportunities and protective services that improve state residents' quality of life. Challenge: A large-scale employee buyout and a hiring freeze reduced DHS's workforce at a time when the volume of Tennessee residents seeking services increased dramatically. Call center wait times surpassed two hours during peak usage and complaints increased by 275 percent. Responses to email requests by clients took several days, on average.