government

Results 376 - 400 of 494Sort Results By: Published Date | Title | Company Name
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
nist requirements, dod requirements, mobile device management, federal affairs, government, networking, security, it management, wireless
    
IBM MaaS360
Published By: IBM     Published Date: Jan 05, 2015
As the number of connected devices grows from billions to hundreds of billions, and as governments and corporations race to take control of devices and data, we need to save the Internet of Things (IoT). Successfully scaling the IoT means executives must rethink the technology strategy.
Tags : 
it strategy, modern computing, iot, cost of computing, it management, knowledge management, enterprise applications, data management
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities; correlate and analyze critical data; and increase risk-based decision-making at the federal enterprise level.
Tags : 
ibm, ibm security, continuous diagnostics, network monitoring capabilities, risk-based decision-making, security, it management
    
IBM
Published By: IBM     Published Date: Feb 24, 2015
Mobile capture is quickly becoming an important differentiators for many companies and organizations, especially those in traditionally document-intensive fields like banking, insurance, healthcare and government operations. According to a 2014 study conducted by AIIM, 45% of companies feel that mobile capture is vitally important, pointing to the competitive need for improved process agility and customer service across the board. Discover the top 10 questions to ask before you make your investment in mobile capture.
Tags : 
mobile capture, ibm, process agility, customer service, it management, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
ibm, security, identity governance and intelligence, identity governance, enterprise applications, business technology
    
IBM
Published By: Group M_IBM Q119     Published Date: Feb 22, 2019
Society simply must change the way it serves its most vulnerable members. Service delivery models are outdated and constrained by budgets, organizational structures and legislation. Citizens aren’t getting what they need to become more self-sufficient and recover from hard times or significant events such as disasters. Government isn’t keeping up with the demand generated by the complex times we live in and agencies are stressed to the breaking point by current service expectations. Something different must be done to generate better outcomes. This action requires better engagement between government and citizens which can lead to more self-reliant individuals and lower demands and costs on government. In California, one county is tackling this challenge head on and has found a better way to serve their citizens.
Tags : 
    
Group M_IBM Q119
Published By: VeriSign Incorp.     Published Date: Jul 02, 2008
Learn about governmental standards and regulations, such as HIPAA and Sarbanes-Oxley, covering data protection and privacy. Then, learn how your enterprise can be compliant utilizing the latest encryption technologies.
Tags : 
verisign, pci, hipaa, sarbanes-oxley, fisma, gramm-leach-bliley act, state notice of breach laws, security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption
    
VeriSign Incorp.
Published By: BlackBerry     Published Date: Jan 06, 2011
With consumer use of smartphones growing by the day, it's no surprise that users are taking them into the workplace as well. Thousands of people already use their personal smartphones for work-related tasks like checking email and calendars when they're away from their desks. And many wish they could do more with their smartphones, given their myriad functions and applications.
Tags : 
blackberry, enterprise server, desktop manager, communications software, rim, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: InMage     Published Date: Feb 24, 2009
The AODA currently provides IT support and management for 32 remote offices serving approximately 1,000 end users. In a field dependent upon the highest standards of data integrity, protection and retention, it was critical for the AODA to implement the disaster recovery (DR) and business continuity solutions necessary for fulfillment of its objectives.
Tags : 
inmage, data recovery, disaster recovery, business continuity, new mexico state aoda, dr scout, continuous data protection, cdp, disaster recover software, data management
    
InMage
Published By: SAS     Published Date: Nov 16, 2018
Fraud is costing government programs more than ever. For example, Medicaid lost $36 billion in 2017 – 10 percent of its total expenditures – which represents a 27 percent increase over 2015. As explored in this paper, fraud numbers are on the rise because fraud rings are not only getting more effective at what they do, but because it’s easy for them to find soft targets across multiple government programs simultaneously. Learn about how next-generation analytic tools from SAS cut across data and program silos and empower investigators to go on the offensive with fraud operators – without disrupting the efficient and timely delivery of benefits, services or tax refunds.
Tags : 
    
SAS
Published By: SAS     Published Date: Jul 22, 2019
Text is the largest human-generated data source. It grows every day as we post on social media, interact with chatbots and digital assistants, send emails, conduct business online, generate reports and essentially document our daily thoughts and activities using computers and mobile devices. Increasingly, organizations want to know how all of that data can be used to drive improvements. For many, unstructured text represents a massive untapped data source with great potential for producing valuable insights that could result in significant business transformations or spur incredible social innovation. This paper looks at how organizations in banking, health care and life sciences, manufacturing and government are using SAS text analytics to drive better customer experiences, reduce fraud and improve society.
Tags : 
    
SAS
Published By: DocuSign     Published Date: Apr 24, 2018
Moreover, more than half of Fortune 500 pharmaceutical and medical device companies are operating under corporate integrity agreements (CIA) with the U.S. government to mitigate the risks.
Tags : 
    
DocuSign
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
Published By: IBM     Published Date: Nov 13, 2014
This webcast examines a large government agency struggling to provide stable test environments to support their partner landscape. Learn how service virtualization was used to simulate their department's core systems for a lower risk, less expensive, and stable testing environment.
Tags : 
service virutalization, core systems, testing environments, it management, knowledge management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Apr 06, 2015
Mobile capture is quickly becoming an important differentiator for many companies and organizations, especially those in traditionally document-intensive fields like banking, insurance, healthcare and government operations. According to a 2014 study conducted by AIIM, 45% of companies feel that mobile capture is vitally important, pointing to the competitive need for improved process agility and customer service across the board.Discover the top 10 questions to ask before you make your investment in mobile capture.
Tags : 
mobile capture, customer service, ibm, banking, insurance, healthcare, government, it management, knowledge management
    
IBM
Published By: IBM     Published Date: Jun 09, 2015
Government revenue management agencies are using computer technology to capture and harvest data and extract value from it. This paper explains the importance of being data-droven and outlines a way forward in the journey of getting there.
Tags : 
ibm, government, data, records, legal, information, benefits
    
IBM
Published By: IBM     Published Date: Jun 09, 2015
Making sound security decisions in today’s environment is of paramount importance. This infographic highlights the connection between economic vitality and security and how both can be achieved.
Tags : 
ibm, government, cyber, security, intelligence, information, vulnerability, fraud, threat, predictive
    
IBM
Published By: IBM     Published Date: Jun 09, 2015
In this webcast we will explore how you can deliver services and improve outcomes for your citizens through cross program care coordination and collaboration. This coordination and collaboration is enabled by the extensive use of data, resources and a single view of the citizen which in turn helps improve decision-making, problem-solving and program implementation.
Tags : 
ibm, coordination, collaboration, data, resources, government, high risk-populations, examples, implementation, decision-making
    
IBM
Published By: Neustar     Published Date: Mar 29, 2010
How SMS can help government agencies reach the public in 160 characters or less.
Tags : 
neustar, sms, mobile networks, text message, call to action, mobile marketing, government
    
Neustar
Published By: Neustar     Published Date: Sep 15, 2010
How Nonprofit Organizations can use SMS to mobilize Millions of Volunteers, Dollars, and Supporters.
Tags : 
neustar, sms, mobile networks, text message, call to action, mobile marketing, government, non profit, csc
    
Neustar
Published By: Dice     Published Date: Jul 01, 2015
As the federal workforce nears retirement age, it is crucial for the government to hire members of the millennial generation, particularly in the mission-critical fields of science, technology, engineering and math where there is stiff competition with the private sector.
Tags : 
recruiting, management, talent, connectivity. culture, millenial
    
Dice
Published By: Dice     Published Date: Feb 10, 2016
As the federal workforce nears retirement age, it is crucial for the government to hire members of the millennial generation, particularly in the mission-critical fields of science, technology, engineering and math where there is stiff competition with the private sector. These results are a must-read for government officials who want to stay up-to-date with developing trends in recruiting.
Tags : 
reachmail dice, tech candidate sentiment, government officials, recruiting trends, millenials
    
Dice
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
Cornerstone and HCMG have benchmarked the last five years of progress in human capital management for government. Let's take a look at the key findings from this year’s study.
Tags : 
capital, management, government, cornerstone
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
Together with our partner Cornerstone, HCMG has benchmarked the last five years of progress in human capital management for government. This research is designed to aid leaders across Federal, Defense, State, and Local sectors in benchmarking their own performance and in developing America’s present and future leaders.
Tags : 
capital, management, government, cornerstone
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
As employers, government agencies face a unique set of challenges. Fierce competition to find, keep, and develop the best talent, along with an increasingly intense level of scrutiny is placing human capital front and center. Not having enough staff, not having them properly trained, or having a noncompliant workplace can trigger a public crisis.
Tags : 
management, talent, organizations, communication
    
Cornerstone OnDemand
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee