This IDC Government Insights White Paper discusses government's new efforts to achieve its goals regarding service delivery to citizens, businesses, and other government agencies.
Today, more than ever, citizens are looking for their government leaders to keep them informed and support their needs. And citizens increasingly expect to interact with government on their terms, 24 x 7, and not only receive information but also conduct their government business through self-service when possible.
July 2010- For the past eight years, government agencies have struggled to comply with the requirements of the Federal Information Security Management Act of 2002 (FISMA). The goal of FISMA is to control information security as it impacts national security and the economic interests of the United States. Compliance obligates each U.S. federal government agency to “develop, document, and implement an agency-wide program to provide information security for the information and information systems that support the operations ...
The Center for Strategic and International Studies (CICS) report recommends broad adoption of penetration testing across the federal space, and greater use of vulnerability and exploit testing to improve the nation’s cybersecurity standing within several different contexts.
This white paper outlines the key CICS recommendations and identifies a commercial software solution and services that address each of these key issues.
The release of the 2009 Consensus Audit Guidelines (CAG) outlines the need for federal cyber-security controls that are tacitly proactive and can “inform defense” of actual attacks that have compromised systems, or those that could transpire to do so.
This white paper explores specific directives of the CAG, and highlights a commercial software application that arms government agencies and their private-sector partners with the tools to perform ongoing penetration testing of web applications, network ...
April 2010- In this white paper, government agencies learn about new provisions added to the Guide for Assessing Controls in Federal Information Systems (NIST SP 800-53A), and how a new commercial software tool addresses these provisions with penetration testing that identifies and assesses critical vulnerabilities existing across networks, endpoints and web applications.
March 2010- The Obama Administration’s FY2010 budget guidelines reignited questions about how agencies can best comply with evolving OMB mandates for when to insource or outsource federal contracts. A new white paper by PITSS America explains how even in the absence of clear rules agencies can develop a “rightsizing” approach that takes advantage of solutions like PITSS.converter. The application delivers a clear ROI for Oracle Forms and Reports migrations that can save typical agencies hundreds ...
March 2010- Developing high-quality, successful A&D products and programs–on time and within budget–has always been a tremendous challenge for organizations serving the A&D industry. Yet today, due to the economic downturn, globalization, product sophistication, and the emergence of powerful new technologies, the level of complexity in A&D product development is becoming mind-boggling. A&D companies are up against numerous obstacles including Complex Products, Complex Design and Supplier Networks, and Complex Economic Times.<...
September 2009- Healthcare is a complex ecosystem with "many-to-many" interactions among payers, providers, clearinghouses, and employers. An enormous amount of data is exchanged between these entities on a daily basis using the standard X12 4010 transaction formats for Electronic Data Interchange (EDI). The mandate on the healthcare industry to move from HIPAA 4010 to 5010 transaction standards is both a source of opportunities and a transition laden with risks. Infosys believes that upfront planning and effective risk management strategies identified ...
October 2009- Federal computer systems have long been a favorite target of hackers. This paper explores why federal efforts to improve security have often fallen short and how IT professionals can address this challenge. Tripwire CTO Gene Kim suggests seven actionable steps to improve cyber security based on a long-term study of information security organizations.
December 2008- In keeping with the Health Insurance Portability and Accountability Act, Public Law 104-191 (HIPAA), which was adopted in 1996, all American organizations that use the personal medical data of citizens are required to guarantee the confidentiality of that information. HIPAA requirements are mandatory for medical institutions, medical insurance companies, government agencies, and other organizations that have access to private medical records. The privacy and security requirements set out in HIPAA have also been included in two ...
September 2009- Create, manage, distribute, and track communications —including electronic messages—all within the same integrated software solution. Case workers, recipients, and providers can communicate faster and more efficiently, which results in fewer errors, higher compliance levels, and increased service levels. Create targeted communications and eliminate impersonal correspondence. Prioritize and incorporate only the most relevant messages or pre-printed inserts into communications based on user-defined business rules. Comply with regulations and improve response rates by delivering information in ...
September 2009- Achieve better performance metrics with HP Exstream. Create, manage, distribute, and track communications to clients, including electronic messages. Intelligent workflows ensure all parties—such as case workers, parents, and the judiciary—get the right information, in the right format, at the right time. Faster and more efficient communication could mean earlier intervention for missed payments to avoid collections processes or begin them sooner. Prioritize and incorporate only the most relevant messages into communications based on ...
September 2009- Most government agencies face increased program demands, decreased budgets, and a shrinking workforce while striving to implement more efficient citizen and employee communication processes. Technology issues—such as non-integrated systems and disparate content sources and databases, along with uncoordinated delivery channels—make addressing these needs difficult. To meet these challenges and make communications (like eligibility notices and tax statements) more effective, government agencies need a single document automation platform that seamlessly supports high-volume, on-demand, and ...
September 2009- HP Exstream’s role-based design interface makes it easy to create personalized citizen communications and repetitive documents (such as notifications, tax documentation, statements, and assessments), regardless of document type, variable content, or delivery channel. Easier-to-read documents enhance the taxpayer experience. With HP Exstream’s powerful connector technology, you can simultaneously access data from multiple taxpayer databases, customer relationship management (CRM) systems, enterprise content management systems, and legacy systems. You can also quickly incorporate legislative changes ...
September 2009- HP Exstream document applications allow you to quickly pull data from multiple databases simultaneously to create and update vehicle registration documents, driver’s licenses, and order letters. HP Exstream helps you design and deliver fully customized communications much faster than point solutions. Some government agencies have experienced up to 85 percent faster application development processing times.
December 2008- If your company is subject to HIPAA, its IT systems also need a clean bill of health. To prevent a painful examination by federal regulators, you need to know what your responsibilities are and how to ensure that your network's "vital signs" are in compliance.
July 2009- Federal computer systems have long been a favorite target of hackers. This paper explores why federal efforts to improve security have often fallen short and how IT professionals can address this challenge. Get 7 actionable steps to improve cyber security based on a long-term study of information security organizations.
August 2009- Riverbed works with many government organizations that have had IT deployments ranging from just a few sites to hundreds of sites. In this brief, you’ll learn how WAN optimization solutions from Riverbed can help government agencies to consolidate IT resources into the data center, simplify branch infrastructure with the Riverbed Services Platform (RSP), and reduce their environmental footprint by using less energy, creating less waste, and reducing facilities costs through improved employee mobility.
August 2009- Want to get more from your existing infrastructure so you can accomplish more? And stretch your federal agency’s budget? In this cost savings whitepaper, you’ll discover how you can save by consolidating IT and reducing bandwidth costs through WAN optimization, and realize significant results in just a few months. It’s called extreme savings. And it’s only from Riverbed.
June 2009- The success of continuity programs is dependent on the availability of robust, effective and secure communications to provide Federal Agencies the ability to access critical applications and to quickly share vital information. Download this paper to learn how leveraging a flexible IP core can enable Government voice, video and data applications.
March 2009- This paper –- co-authored by AvePoint and Microsoft -– reviews best practices for propagating SharePoint customizations, services, and solutions throughout a complex SharePoint environment, and introduces tools and strategies available to automate and streamline this process.
February 2009- This document is intended to aid IT administrators and other stakeholders responsible for managing Microsoft SharePoint deployments, in planning and implementing a comprehensive, reliable, and efficient compliance strategy appropriate to their organizational needs.
April 2009- This white paper is intended to aid IT administrators responsible for managing Microsoft SharePoint deployments in planning and implementing a comprehensive, reliable, and efficient data protection strategy appropriate to their organizational needs. It outlines the planning, guidelines, and implementation considerations for SharePoint backup and disaster recovery, then briefly reviews the singular attributes of DocAve Backup and Recovery.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services