Govtech.com

A Technology Grants Guide for Local Government

Beginning with early gifts of land for settlement and expansion, federal grants have shaped the framework of our nation; fostering economic and social development; providing assistance in times of natural disaster; and underwriting education, health and public safety. Today, more than two dozen federal agencies offer over 1,000 grant programs. 

In 2013, the watchword in funding circles was “sequestration.” Cuts that went into place March 1 reduced 2013 funding for state grants by $5.1 billion — a financial blow, considering that grants typically make up one-third of most state revenues. But it’s not all bad news: The continuing resolution — also enacted in March — resulted in some states receiving grant funding that was actually greater than that awarded in 2012. 

There is still a significant amount of subsidies on the table — much of it earmarked for technology development, innovation and research. In fact, the Center for Digital Government (CDG) estimates $93.1 billion will be spent on IT-related purchases for state and local government this year, and there’s no reason why your agency shouldn’t be a serious contender. 

Despite the nation’s budgetary challenges, the government remains committed, both in principle and in practice, to promoting inquiry and advancement through grant allocation. Many grants are intended for use by local governments, most of which have been greatly impacted by the country’s economic struggles. 

This guide, sponsored by CDW•G, provides a list of grants available to local government entities, along with additional information and details on how prospective applicants can obtain more detail and maximize their chances of being awarded a particular grant. Many of the grants emphasize research and investment into new information technologies and other technological innovations. 


Anticipating the Breach

Security incidents may be inevitable, but the consequences of data breaches don't have to be. To deter future breaches, organizations should take a holistic approach that addresses the before, during, and after stages of a potential breach.

Internet Security Got You Down?

Understanding new threats is critical â€" and organizations should now expect to be attacked â€" however, the question is not 'if' but 'when' and 'how.' So, what can they do to get over their internet security woes? Is there a remedy?

Trending: Digital Branding in Government

This white paper details how government leaders can create a roadmap for digital transformation, promote culture change and ultimately create a foundation for continuous improvements as innovations reshape the digital landscape in the months and years ahead.

Solving Government's Problem of Too Much Work for Too Few People

Government agencies face a looming crisis as a high percentage of their workforce is reaching retirement age. At the same time, workloads are increasing, but staffing levels have not reached pre-recession levels. However, regardless of budget, agencies can't simply hire themselves out of this predicament. Revamped and optimized business processes, coupled with technology, is the best way forward. Read this white paper to learn more.

Is open, software-defined storage right for your enterprise?

The journey toward software-defined storage is different for each IT organization. When choosing a storage solution, it's important to consider flexibility, availability, and agility. And of course-don't forget cost. This infographic can help you determine if your IT organization is ready to make the shift to open, software-defined storage.

Cyber Intelligence Brochure

The IBM i2 Enterprise Insight Analysis solution is a next-generation intelligence solution designed to turn overwhelming and disparate data sets into comprehensive intelligence, in near real time.

Solution Brief: IBM i2 Enterprise Insight Analysis

Whether they are part of a business or working for a government organization, today's investigators, security specialists and intelligence analysts are facing extraordinary pressure to respond quickly to a wide range of threats - from cyber attacks, terrorist threats, criminality, and unethical and immoral activities.

Big Data and Analytics in Government

The most recent Center for Digital Government Public CIO Special Report sheds light on the technology requirements for increasing amounts of data and the governance necessary to make sound judgements based on analytics - including the benefits, challenges and real-life examples of implementing big data analytics initiatives.

When Parks and Recreation Goes High-Tech

When Cobb County, Ga., boosted its network capabilities, it was able to bring full connectivity to all of its park and recreation sites, streamline operations and improve citizen satisfaction. Download the case study to learn more.

Transform your Business with Mobile Authentication

Leave outdated traditional two factor authentication in the past. Mobile authentication transforms a smartphone into a mobile smart credential. Now it's possible for users to securely identify themselves by simply clicking 'ok' on their device, eliminating the hassle of a traditional hard token or physical cards.
Pull up to display more papers!