Govtech.com

A Technology Grants Guide for Local Government

Beginning with early gifts of land for settlement and expansion, federal grants have shaped the framework of our nation; fostering economic and social development; providing assistance in times of natural disaster; and underwriting education, health and public safety. Today, more than two dozen federal agencies offer over 1,000 grant programs. 

In 2013, the watchword in funding circles was “sequestration.” Cuts that went into place March 1 reduced 2013 funding for state grants by $5.1 billion — a financial blow, considering that grants typically make up one-third of most state revenues. But it’s not all bad news: The continuing resolution — also enacted in March — resulted in some states receiving grant funding that was actually greater than that awarded in 2012. 

There is still a significant amount of subsidies on the table — much of it earmarked for technology development, innovation and research. In fact, the Center for Digital Government (CDG) estimates $93.1 billion will be spent on IT-related purchases for state and local government this year, and there’s no reason why your agency shouldn’t be a serious contender. 

Despite the nation’s budgetary challenges, the government remains committed, both in principle and in practice, to promoting inquiry and advancement through grant allocation. Many grants are intended for use by local governments, most of which have been greatly impacted by the country’s economic struggles. 

This guide, sponsored by CDW•G, provides a list of grants available to local government entities, along with additional information and details on how prospective applicants can obtain more detail and maximize their chances of being awarded a particular grant. Many of the grants emphasize research and investment into new information technologies and other technological innovations. 


Next Generation Terminal Emulation

Deploying new emulation technology can be a daunting task, with concerns ranging from high costs to interrupting day-to-day operations. Download the following white paper to see how your fears about adopting a new terminal emulation solution can be eliminated.

Holistically Managing the Virtual Environment

Research reveals that roughly 80% of federal agencies use more than a single hypervisor in hopes of maximizing each tool's strengths â€" creating an environment that's complex and expensive. Find out how to simplify your agency's virtual environment.

How Butte County, CA Automates Search Warrant Approvals with DocuSign

Two major challenges existed for Butte County law enforcement with regards to serving search warrantsâ€"speed and security. Read the case study and learn how Butte County uses DocuSign's eSignature solution to quickly serve secure electronic search warrants and fight crime efficiently and cost-effectively.

How The State of North Carolina Operates Efficiently with DocuSign

Inefficient workflows spanned the State of North Carolina, affecting processes in state agencies from human resources to the DMV to state universities.

Recruiting Tip Sheet for State & Local Government

Level the playing field with recruiting strategies designed to help your organization grow your talent pipeline, engage and attract best fit candidates, hire and onboard in less time, as well as nurture and retain your existing employees.

Building a More Efficient Government with eSignatures

This report examines trends and identifies the implementation of eSignature technologies as a reinvention strategy to help manage risk, manage costs, and reduce time

Top 7 BIM Trends that are Game Changers for Public Sector

This whitepaper explains the 'TOP TRENDS' in Building Information Modeling (BIM). BIM is changing the way both the public and private sector work together to design, communicate, solve problems, and build better projects faster and at less cost. Download this whitepaper to learn more about the Top Trends this year!

Public Records Requests for Social Media: What You Need to Know

Find out how a free automated archiving trial prepared the Santa Barbara Police Department for the inevitable.

Guide: Virtualization Management Software

Boost performance and learn to better manage your virtualized environment when you follow the best practices in this paper. Plus, gain insight, analyze and select the best virtualization management features and software to suit your organization.

Addressing the Full Attack Continuum: A Security Model for Before, During, and After an Attack

Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.
Pull up to display more papers!