Government Contractors Outsource SoftwareWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Government Contractors Outsource Software returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Business Intelligence Solutions
 •   Virtualization
 •   Business Process Outsourcing
 •   Enterprise Systems Management
 •   Data Center Management
 •   Data Security
 •   Endpoint Security
 •   Business Process Management (BPM)
 •   Storage Management

Related Searches
 •   Buying Government Contractors Outsource
 •   Development Government
 •   Government Contractors Device
 •   Government Contractors Guide
 •   Government Contractors Mississippi
 •   Government Contractors Outsource Graphs
 •   Government Contractors Outsource Summary
 •   Government Erp
Advertisement

ALL RESULTS
1 - 25 of 485 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
The Impact of Technology on Cost in Business Process Outsourcing (BPO) by SAP America, Inc..
Gain insight into the true cost of business process outsourcing (BPO) beyond what is typically reflected in the BPO provider's service price (total contract value). Learn more...
>> Discover more offerings from SAP America, Inc..

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 13, 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

OFCCP Compliance: Understanding the OFCCP's New Ruling on Internet Applicants by iCIMS

July 2008 - (Free Research)
The Internet Applicant final rule, issued by the Office of Federal Contract Compliance Programs (OFCCP), addresses recordkeeping by Federal contractors and subcontractors about the Internet hiring process and the solicitation of race. 
(WHITE PAPER) READ ABSTRACT |

Enhancing Constituent Perceptions with CRM for Public Sector: Advancing Beyond Efficiency and Service Improvements by SAP America, Inc.

September 2010 - (Free Research)
By using a CRM strategy with software solutions, government agencies can achieve a host of benefits when it comes to streamlining business processes and analytical capabilities. Read on to learn how By enabling such CRM processes, governments can build communication campaigns that help shape the public’s perceptions and advance the value delivered. 
(WHITE PAPER) READ ABSTRACT |

Microsoft Exchange Server: To Outsource or Not to Outsource by Bsafe Information Systems

November 2008 - (Free Research)
Microsoft Exchange Server can bring to your company but the internal deployment delays, administrative complexity and cost of Exchange just isn’t practical. 
(WHITE PAPER) READ ABSTRACT |

Why Outsource to Russia? by SolovatSoft

August 2008 - (Free Research)
Why Outsource to Russia? How about scalable IT labor resources, low employee turnover, and reasonable prices. Do you need further convincing? The Read this white paper! 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 22 May 2012: Why Tesco is spending £150m online by ComputerWeekly.com

May 2012 - (Free Research)
This week’s Computer Weekly, we talk exclusively to Tesco CIO Mike McNamara about why the UK's biggest retailer is spending £150m on its online business. And, with the London 2012 Olympics only weeks away; we look at how IT testing is progressing. 
(EZINE) READ ABSTRACT |

NAC at the Endpoint: Control Your Network through Device Compliance by Sophos, Inc.

July 2008 - (Free Research)
Organizations have increasingly turned to Network Access Control (NAC) technologies to deal with their shifting IT perimeters. Software-based NAC is proving superior to hardware-based solutions as it easily provides coverage for all endpoint devices. 
(WHITE PAPER) READ ABSTRACT |

The Business Case for Outsourcing Software Testing to a Separate Vendor by LogiGear Corporation

January 2006 - (Free Research)
This whitepaper will explore the single-source, and the multi-source approach to application development, highlighting the advantages and disadvantages of each, and pointing out the distinct advantages that multi-sourcing has over single-sourcing. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now. 
(EZINE)

Securing Network Access for Guests and Contractors by Bradford Networks

December 2011 - (Free Research)
This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization. 
(WHITE PAPER) READ ABSTRACT |

Microsoft Exchange Server: To Outsource Or Not To Outsource by mindSHIFT Technologies, Inc.

July 2011 - (Free Research)
Follow the lead of tens of thousands of small and mid-size businesses who use Microsoft Exchange as a hosted service and provide your company with the full power of Microsoft Exchange without the high costs, deployment delays, drain on IT resources, maintenance and upgrade headaches. 
(WHITE PAPER) READ ABSTRACT |

How They Do It in Switzerland…Outsource the Code, Insource the Quality: McCabe IQ Analyzes and Visualizes Software Quality in Critical International Financial Systems by McCabe Software, Inc.

April 2012 - (Free Research)
<p>Given the competitive marketplace, evaluating source code analysis tools can be overwhelming. This case study highlights one recommended offering, the quality indicators it provided, and the results one organization achieved after implementing it.</p> 
(CASE STUDY) READ ABSTRACT |

eBook: Techfocus - Data Center Construction by APC by Schneider Electric

November 2009 - (Free Research)
The chapters in this Techfocus eBook will discuss the importance of site selection and planning, data center conceptualization and cost analysis, and negotiating with contractors. 
(EBOOK) READ ABSTRACT |

Virtual Desktop Solutions in the Federal Government by VMware, Inc.

February 2012 - (Free Research)
This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations. 
(WEBCAST) READ ABSTRACT |

Meeting the Requirements of DoD Directive 8570.1 by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The Department of Defense's manual, DoD 8570.01-M Information Assurance Workforce Improvement Program, supports DoD Directive 8570.1, which requires all individuals possessing privileged access to a DoD Information System (IS) to be trained and certified in the secure operation of computer systems used throughout the DoD's Global Information Grid. 
(WHITE PAPER) READ ABSTRACT |

Customer Success Story: ECSEC - ‘Hell’s Kitchen’ Contractor Goes to Heaven with Symantec by Symantec Corporation

July 2010 - (Free Research)
By partnering with Symantec and Vitality Consulting Services, ECSEC implemented an integrated Symantec data protection and messaging security solution giving ECSEC the confidence that its network is now operating correctly, confidence that data is now properly secured and backed up. Download this Customer Reference to read the whole story. 
(WHITE PAPER) READ ABSTRACT |

Streamlining Access Control for SAP® Systems: The Many Advantages of Automated User Provisioning by Security Weaver

September 2008 - (Free Research)
For organizations with high-volumes of employees leveraging SAP solutions, managing access is a complex undertaking. This paper examines the access control challenges and reveals the many advantages of automated user provisioning for SAP solutions. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Home Agents by Avaya Inc.

June 2008 - (Free Research)
Employing home agents allows you to expand and improve your call center team. And they can be a form of insurance to keep your business running if disaster strikes. This white paper contains best practices for developing a Home Agents program. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization by Bradford Networks

January 2009 - (Free Research)
Learn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Flexible Storage Enables Growth by Dell | EMC

June 2008 - (Free Research)
The AX4-5 has allowed McNeil to stand shoulder-to shoulder with much larger enterprises when it comes to data storage sophistication and efficiency. 
(CASE STUDY) READ ABSTRACT |

Do More with Less: The Five Strategies used by Successful SMB Manufacturers by Infor

September 2008 - (Free Research)
A common issue facing small and medium-sized business (SMB) manufacturers today is how to increase revenue and grow their business without significantly adding staff. Read this paper to learn five strategies used by successful SMBs. 
(WHITE PAPER) READ ABSTRACT |

CW+: PA Consulting: Securing data in the cloud by ComputerWeekly.com

August 2010 - (Free Research)
Economies of scale, flexibility and costreduction – cloud advocates have made sure that we are familiar with these potential benefits, even if we have yet to agree on an exact definition of cloud computing. But doubters argue that none of these benefits will actually be available unless some fundamental security issues can be overcome. 
(WHITE PAPER) READ ABSTRACT |

10 Steps to Safeguard Small Business Data by i365, makers of Evault

October 2008 - (Free Research)
What should you do to protect your data if your resources are limited? This paper describes ten steps to safeguard business data. 
(WHITE PAPER) READ ABSTRACT |

The Outsourcing Decision for a Globally Integrated Enterprise: From Commodity Outsourcing to Value Creation by IBM

May 2008 - (Free Research)
The ability to manage operations, expertise and resources more fluidly enables globally integrated enterprises to enter new markets and seize new business opportunities wherever they happen to arise. 
(WHITE PAPER)

Simplifying Contact Center Technology by Oracle Corporation

August 2008 - (Free Research)
Computer telephony integration (CTI) enabled contact centers realize immense cost savings, increased reliability and improved performance. Learn how an on-demand solution can simplify your organization’s contact center technology. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 485 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts