Playing to Win in State and Local Government

This annual thought leadership paper from the Center for Digital Government highlights the innovators, strategists and hands-on practitioners who are moving government from “average” to “awesome.” Through innovative success stories that discuss best practices, this paper helps government leaders plan their own strategies for success. A favorite of our readers, this annual publication offers the tools, techniques and technologies that help make a winning government.

Getting from Data Glut to Data Glory

Many government agencies have an unstructured data nightmare, with bits and bytes scattered across servers, clouds and hypervisors. Sprawling data repositories make it difficult for government agencies to glean valuable insights from data and unchecked – and often duplicate – data is costly to manage. Read this issue brief to find out how agencies can better manage – and protect – their critical information for better decision-making.

How to Create the Next-Generation Government Portal

This white paper discusses the key challenges to offering high-quality Web services and examines proven tactics for building or upgrading a government Web portal to meet employee, citizen and business expectations for security, reliability and mobility.

Law Enforcement Social Media: To Protect and Preserve

When a controversial incident caused a surge of traffic on the Vineland Police Department’s social media pages in the spring of 2015, a spike in public information requests for the social media records followed predictably close behind. Fortunately, the officer responsible for producing the records had already replaced his time-consuming, manual retention process with automated archiving. Read this case study to find out more.

10 Pillars to Building a Winning Mobile Strategy

Mobility is increasingly blurring the lines of physical and digital interactions in our lives as consumers, employees, and citizens. The challenges of being mobile extend far beyond the device and into an evolving digital world that is reshaping how we engage with people, content, machines, and our environment. This e-book reflects recent market trends and perspectives from our client projects with the aim to help you achieve demonstrable, repeatable mobile successes.

Red Hat Mobile Application Platform for Government

Red Hat Mobile Application Platform brings together agility and centralized control for mobile innovation and a competitive edge. Formerly known as FeedHenry 3, this product offers a suite of features that embrace collaborative app development, centralized control of security and back-end integration, and a range of cloud deployments.

Q&A: A Citizen Request Tool for the 21st Century

Learn how Warren, Mich., uses QScend Technologies' QAlert citizen request management (CRM) system to decrease the amount of time it takes to respond to citizen requests, improve employee workflow, and increase transparency into operations.

Cisco Mid-Year Security Report

The Cisco 2015 Midyear Security Report examines intersecting challenges while also providing updates on some of the most compelling threats. Using research by our experts, it provides an overview of the major threats observed in the first half of 2015.

What Are the Risks of Video, Security and Shadow IT?

Video collaboration is changing the way we do business today. But to use it, it's vital that you understand the latest cyber security issues related to videoconferencing, BYOD, and Shadow IT. Read how to promote secure, cost-effective, and enterprise video conferencing services in your agency.

Anticipating the Breach

Security incidents may be inevitable, but the consequences of data breaches don't have to be. To deter future breaches, organizations should take a holistic approach that addresses the before, during, and after stages of a potential breach.

Internet Security Got You Down?

Understanding new threats is critical - and organizations should now expect to be attacked - however, the question is not 'if' but 'when' and 'how.' So, what can they do to get over their internet security woes? Is there a remedy?
Pull up to display more papers!