A Technology Grants Guide for Local Government

Beginning with early gifts of land for settlement and expansion, federal grants have shaped the framework of our nation; fostering economic and social development; providing assistance in times of natural disaster; and underwriting education, health and public safety. Today, more than two dozen federal agencies offer over 1,000 grant programs. 

In 2013, the watchword in funding circles was “sequestration.” Cuts that went into place March 1 reduced 2013 funding for state grants by $5.1 billion — a financial blow, considering that grants typically make up one-third of most state revenues. But it’s not all bad news: The continuing resolution — also enacted in March — resulted in some states receiving grant funding that was actually greater than that awarded in 2012. 

There is still a significant amount of subsidies on the table — much of it earmarked for technology development, innovation and research. In fact, the Center for Digital Government (CDG) estimates $93.1 billion will be spent on IT-related purchases for state and local government this year, and there’s no reason why your agency shouldn’t be a serious contender. 

Despite the nation’s budgetary challenges, the government remains committed, both in principle and in practice, to promoting inquiry and advancement through grant allocation. Many grants are intended for use by local governments, most of which have been greatly impacted by the country’s economic struggles. 

This guide, sponsored by CDW•G, provides a list of grants available to local government entities, along with additional information and details on how prospective applicants can obtain more detail and maximize their chances of being awarded a particular grant. Many of the grants emphasize research and investment into new information technologies and other technological innovations. 

Getting from Data Glut to Data Glory

Many government agencies have an unstructured data nightmare, with bits and bytes scattered across servers, clouds and hypervisors. Sprawling data repositories make it difficult for government agencies to glean valuable insights from data and unchecked – and often duplicate – data is costly to manage. Read this issue brief to find out how agencies can better manage – and protect – their critical information for better decision-making.

How to Create the Next-Generation Government Portal

This white paper discusses the key challenges to offering high-quality Web services and examines proven tactics for building or upgrading a government Web portal to meet employee, citizen and business expectations for security, reliability and mobility.

Law Enforcement Social Media: To Protect and Preserve

When a controversial incident caused a surge of traffic on the Vineland Police Department’s social media pages in the spring of 2015, a spike in public information requests for the social media records followed predictably close behind. Fortunately, the officer responsible for producing the records had already replaced his time-consuming, manual retention process with automated archiving. Read this case study to find out more.

10 Pillars to Building a Winning Mobile Strategy

Mobility is increasingly blurring the lines of physical and digital interactions in our lives as consumers, employees, and citizens. The challenges of being mobile extend far beyond the device and into an evolving digital world that is reshaping how we engage with people, content, machines, and our environment. This e-book reflects recent market trends and perspectives from our client projects with the aim to help you achieve demonstrable, repeatable mobile successes.

Red Hat Mobile Application Platform for Government

Red Hat Mobile Application Platform brings together agility and centralized control for mobile innovation and a competitive edge. Formerly known as FeedHenry 3, this product offers a suite of features that embrace collaborative app development, centralized control of security and back-end integration, and a range of cloud deployments.

Q&A: A Citizen Request Tool for the 21st Century

Learn how Warren, Mich., uses QScend Technologies' QAlert citizen request management (CRM) system to decrease the amount of time it takes to respond to citizen requests, improve employee workflow, and increase transparency into operations.

Cisco Mid-Year Security Report

The Cisco 2015 Midyear Security Report examines intersecting challenges while also providing updates on some of the most compelling threats. Using research by our experts, it provides an overview of the major threats observed in the first half of 2015.

What Are the Risks of Video, Security and Shadow IT?

Video collaboration is changing the way we do business today. But to use it, it's vital that you understand the latest cyber security issues related to videoconferencing, BYOD, and Shadow IT. Read how to promote secure, cost-effective, and enterprise video conferencing services in your agency.

Anticipating the Breach

Security incidents may be inevitable, but the consequences of data breaches don't have to be. To deter future breaches, organizations should take a holistic approach that addresses the before, during, and after stages of a potential breach.

Internet Security Got You Down?

Understanding new threats is critical - and organizations should now expect to be attacked - however, the question is not 'if' but 'when' and 'how.' So, what can they do to get over their internet security woes? Is there a remedy?
Pull up to display more papers!