Welcome to the Library, where you'll find a selection of industry resources including eBooks, Whitepapers, Webinars, Survey Reports, Research Reports and more.
If you are interested in submitting items to the Library, please contact our advertising team
In a recent survey on Federal IT Reform, Senior government IT executives laid out their vision for the coming year, detailing challenges and identifying priorities. To read more about these timely results click here to download the summary today.
FierceGovernmentIT explores what government is doing to grow the cyber workforce within government and the private sector, as well as improve cybersecurity education and job training more generally. Download Now!
When it's time to look for Enterprise Content Management (ECM) solutions for Government, decision makers can be overwhelmed with options. In today's app-crazy world, everyone seems confounded by the overabundance of available solutions. As cloud solutions begin to take hold in the public sector, many government CIO's are looking to configurable framework approaches that combine the ease of apps with the flexibility of a development platform. Register to Watch Now!
Federal agencies are overwhelmingly directing investments to legacy operations. This FierceGovernmentIT eBook examines how to break the vicious cycle of legacy spending without performance improvements or enhanced capabilities. Download today!
Federal agencies today are focused on evolving their IT infrastructures to keep pace with rapidly emerging technologies and services, as well as diverse user demands. This eBrief looks into best practices for choosing a Federal services IT provider. Download today!
Federal agencies are ramping up efforts to better manage their IT systems and offer more efficient services. FierceGovernmentIT reports how the federal government is shaping standards to smoothly and securely move data into the cloud. Download this eBrief today!
As Cloud initiatives continue to grow, Public Sector CIOs and IT managers are faced with the challenge of determining if and how it makes sense for their organizations. Is the Cloud secure? Is the Cloud reliable? Is the Cloud more affordable? Who's using it and how? Should we use it? Is it public, private, or hybrid? At the end of the day, is government ready to move documents from the mountain to the cloud? Register to Watch Now!
This FierceGovernmentIT webinar will explore: The goals of NSTIC and how they match the processes underway with the Identity Ecosystem Steering Group; How NSTIC implementation could transform federal IT; Federal use cases now being tested; and Next steps for the identity ecosystem. Register to watch now!
The latest Apple® news has crowds camping out and talking mobile again, while businesses and government (yes, government!) are poised to take advantage of this growing sensation. Although great strides have been made towards a "paperless" society, we still rely upon it heavily. So how do you manage paper while at the same time exploiting the power of mobile? Register to Watch Now!
This FierceGovernmentIT webinar will explore: the current status of the framework's implementation by critical infrastructure; Incentives or protections for conformance; Privacy considerations within the framework; and Future plans for the framework. Register to watch now!
Did you know that almost 30% of customers using online self-care tools are unable to get the support they need? Or that up to 20% of call volume in today's contact centers is actually "fall-back" traffic following a failed self-care interaction? Digital self-care channels have become a staple in the modern customer care mix. But are they working hard enough? Watch the on-demand webcast today!
Advanced Persistent Threats online are a painful reality for companies of all sizes. If your business has something of value to online criminals, you should assume that it will be targeted -- or already has been. Download this eBook today to find out about the nature of online threats, the particular risks your organization faces and special IT tactics needed to secure your infrastructure.
Cisco estimates that 50 billion devices and objects will be connected to the Internet by 2020. Will there be a role for developers in this area? And if so, how can developers position themselves in the months ahead on this nascent but potentially explosive opportunity? Register to watch now!
A recent survey revealed that enterprises in the United Kingdom are adopting "Choose Your Own Device" strategies twice as often at "Bring Your Own Device" strategies. This webinar will take a closer look at the business case for CYOD and considerations in implementing such a policy. Register Today!
It's been more than two years since the Dodd-Frank Wall Street Reform and Consumer Protection Act was signed into law, and every month the implications for banks and financial firms becomes more clear. This eBook closely examines enterprise content management issues relating to Dodd-Frank. Download for free today.
Please take a moment to participate in our brief 15 question 'Federal IT Reform Survey' where we will take a look at security policies, compliance concerns and budget management issues. All participants will receive a free summary report and we will donate $5 to Fisher House in support of military families for each of the first 100 completed surveys. CLICK HERE to get started.
This eBook offers a detailed look at some of the most pressing questions and considerations that stand before government IT managers today. Click here to download.
In this eBook we will examine how enterprises must cope with devices such as smartphones, laptops, and tablets. We will discuss how enterprises must work to support, secure, and manage these devices so that their employees can use them efficiently. Click here to download today.