Selecting and Sustaining IT Investments in Government: A Guide to Effective Strategies

Why does IT procurement in government have to take so long and be so hard? How can we be confident that we’re making the right IT investments, especially for the long term? And which of today’s IT strategies will best position our government for the future? These are fundamental questions asked by government CIOs and the stakeholders who hold them accountable for IT investments and deployments. They reflect the challenges inherent in government IT, including large and complex projects, lengthy and rule-driven purchasing processes, and unique measures of value compared to the private sector. This how-to guide will help CIOs, IT managers and other technical executives within all levels of government formulate answers to these fundamental questions. Broken into four strategies for better government IT investments, this guide will also highlight new ways of planning and managing IT projects so they are simpler and faster to procure, deliver the desired value when implemented and position government for a future of continual technology change.

Trouble Managing Cloud Environments?

Read this paper to find out more about the brokerage model and the benefits agencies can gain from it.

IBM Counter Fraud and Improper Payments for Government

The IBM Counter Fraud Management and Improper Payments for Government solution is designed to help agencies avoid the 'pay and chase' scenario by intercepting transactions in real time that are potentially fraudulent, while detecting, identifying, and building the case against past fraudulent activity and improper payments.

IBM Counter Fraud Management for Government

The IBM solution for counter fraud and compliance in government is designed to help government agencies avoid the pay-and-chase scenario by intercepting suspicious transactions in real time while detecting, identifying and building the case against past fraudulent activity.

Getting from Data Glut to Data Glory

Many government agencies have an unstructured data nightmare, with bits and bytes scattered across servers, clouds and hypervisors. Sprawling data repositories make it difficult for government agencies to glean valuable insights from data and unchecked – and often duplicate – data is costly to manage. Read this issue brief to find out how agencies can better manage – and protect – their critical information for better decision-making.

How to Create the Next-Generation Government Portal

This white paper discusses the key challenges to offering high-quality Web services and examines proven tactics for building or upgrading a government Web portal to meet employee, citizen and business expectations for security, reliability and mobility.

Law Enforcement Social Media: To Protect and Preserve

When a controversial incident caused a surge of traffic on the Vineland Police Department’s social media pages in the spring of 2015, a spike in public information requests for the social media records followed predictably close behind. Fortunately, the officer responsible for producing the records had already replaced his time-consuming, manual retention process with automated archiving. Read this case study to find out more.

10 Pillars to Building a Winning Mobile Strategy

Mobility is increasingly blurring the lines of physical and digital interactions in our lives as consumers, employees, and citizens. The challenges of being mobile extend far beyond the device and into an evolving digital world that is reshaping how we engage with people, content, machines, and our environment. This e-book reflects recent market trends and perspectives from our client projects with the aim to help you achieve demonstrable, repeatable mobile successes.

Red Hat Mobile Application Platform for Government

Red Hat Mobile Application Platform brings together agility and centralized control for mobile innovation and a competitive edge. Formerly known as FeedHenry 3, this product offers a suite of features that embrace collaborative app development, centralized control of security and back-end integration, and a range of cloud deployments.

Q&A: A Citizen Request Tool for the 21st Century

Learn how Warren, Mich., uses QScend Technologies' QAlert citizen request management (CRM) system to decrease the amount of time it takes to respond to citizen requests, improve employee workflow, and increase transparency into operations.

Cisco Mid-Year Security Report

The Cisco 2015 Midyear Security Report examines intersecting challenges while also providing updates on some of the most compelling threats. Using research by our experts, it provides an overview of the major threats observed in the first half of 2015.
Pull up to display more papers!