Govtech.com

Digital States Survey: Best Practice Guide

This Center for Digital Government “best practice guide” reflects the thorough evaluation and analysis of the 2012 Digital States Survey submissions. It is intended to inform and assist states as they submit their 2014 surveys and prepare for the 2014 election cycle by highlighting some of the best examples of how effective and efficient ICT is helping to improve public service.


Next Generation Terminal Emulation

Deploying new emulation technology can be a daunting task, with concerns ranging from high costs to interrupting day-to-day operations. Download the following white paper to see how your fears about adopting a new terminal emulation solution can be eliminated.

Holistically Managing the Virtual Environment

Research reveals that roughly 80% of federal agencies use more than a single hypervisor in hopes of maximizing each tool's strengths â€" creating an environment that's complex and expensive. Find out how to simplify your agency's virtual environment.

How Butte County, CA Automates Search Warrant Approvals with DocuSign

Two major challenges existed for Butte County law enforcement with regards to serving search warrantsâ€"speed and security. Read the case study and learn how Butte County uses DocuSign's eSignature solution to quickly serve secure electronic search warrants and fight crime efficiently and cost-effectively.

How The State of North Carolina Operates Efficiently with DocuSign

Inefficient workflows spanned the State of North Carolina, affecting processes in state agencies from human resources to the DMV to state universities.

Recruiting Tip Sheet for State & Local Government

Level the playing field with recruiting strategies designed to help your organization grow your talent pipeline, engage and attract best fit candidates, hire and onboard in less time, as well as nurture and retain your existing employees.

Top 7 BIM Trends that are Game Changers for Public Sector

This whitepaper explains the 'TOP TRENDS' in Building Information Modeling (BIM). BIM is changing the way both the public and private sector work together to design, communicate, solve problems, and build better projects faster and at less cost. Download this whitepaper to learn more about the Top Trends this year!

Building a More Efficient Government with eSignatures

This report examines trends and identifies the implementation of eSignature technologies as a reinvention strategy to help manage risk, manage costs, and reduce time

Public Records Requests for Social Media: What You Need to Know

Find out how a free automated archiving trial prepared the Santa Barbara Police Department for the inevitable.

Guide: Virtualization Management Software

Boost performance and learn to better manage your virtualized environment when you follow the best practices in this paper. Plus, gain insight, analyze and select the best virtualization management features and software to suit your organization.

Addressing the Full Attack Continuum: A Security Model for Before, During, and After an Attack

Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.
Pull up to display more papers!