Common Mistakes: Transitioning a Service Desk Away From the Wild West

Transitioning a service desk from the Wild West is never an easy feat for anyone to undertake, but by avoiding some of the key pitfalls, service desk managers can set...

Industry Reference Architecture for US Federal Government

Leading organizations require a unified and validated view of business capabilities that aligns initiatives, investments, and strategy in order to compete in their industry.

DevOps in Government: Increase Application Quality and Security, Reduce Project Cost and Risk

Government organizations can benefit from implementing DevOps practices to increase application quality, reduce the cost of software projects, and reduce security risks.

Facing the Law: Police, Facebook, Cybersecurity, and the Most Beneficial Use of Facial Recognition Technology

Facial recognition is an exciting technology. Here we look at the ways law enforcement, commercial organizations, and the cybersecurity industry are currently using...

Microsoft’s Ignite Announcements Take Direct Aim at the Competition

Microsoft’s Ignite conference speaks to enterprise developers and IT teams, and this year’s event is making waves with a slew of new product announcements aimed squarely...

A Data-First Approach to Your Security Program

Open data doesn’t mean everything is public for your citizens. Focus on what data is sensitive and elevate your security program from one focused on the perimeter to one...

Leverage a Public-Sector CRM Platform to Deliver Great Citizen Experiences

Many public sector organizations mistakenly believe that CRM platforms are only for their commercial counterparts – “we don’t sell anything” is a common refrain. Work...

Mobile Applications for Constituent Engagement: Native or Responsive?

Heavy investment into mobile application development fails to yield the anticipated benefits from a citizen engagement perspective. It’s important to recognize that many...

Hacking Voting Machines: Democracy and Elections Are at Risk

Voting machines are just like any other machine – susceptible to cyberattacks and vulnerabilities. But how easily can this be done? And how can governments start...

Build Your Security Culture by Reminding Your Employees That They Are Citizens Too

Governments are in a unique position where their employees are also their citizens – leverage this in order to build a stronger security culture.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us