Quantcast
Channel: GCN Whitepapers
Browsing all 106 articles
Browse latest View live

IDC Report: Managing the I/O Explosion Without Additional Hardware

In this Technology Spotlight, IDC highlights the unexpected I/O explosion brought about by virtualization and presents new technologies that deliver exceptional application performance without...

View Article



We Have the Capacity to Handle Your Back (haul): Wireless Solutions for...

Gigabit Ethernet (GigE) wireless solutions are an ideal way to backhaul video imaging systems for public safety and surveillance purposes, national security and intelligence. This paper will explore...

View Article

Building a Private Optical Network

Are you wrestling with the options of building dedicated, private networks or continuing to buy managed network services? This paper describes the advantages of a building a private optical network and...

View Article

Breaking News: Big Data is Solved!

The good news is that solutions can now be delivered to address the data management needs posed by Big Data. Without much risk of contradiction, it can be said that the requirements of absorbing and...

View Article

Invest to Save with Collaboration Technologies

With budgets and staffs stretched thin, public sector organizations are searching for ways to cut costs and help employees work more productively. IT leaders recognize that collaborative voice, video,...

View Article


Special Report: Best Practices for Meeting Big Data Challenges

Big data is a top priority for CIOs, but few know exactly what it is – and what it can help their organizations achieve. As the creation of data has multiplied recently, IT organizations are left...

View Article

Internet Security Threat Report

The U.S. government has been warning public sector organizations for several years about the whole spectrum of Internet security threats. Governments around the world are waking up to the need to...

View Article

Special Report: Infrastructure Security

Evolve or die. That’s the imperative guiding the development of cybersecurity technologies and strategies across government and industry. The ongoing evolution of the federal IT enterprise, extended in...

View Article


Red Hat Enterprise Virtualization for Servers: Server Consolidation

Transitioning application workloads from physical to virtual machines with server consolidation can not only dramatically increase the utilization and agility of your data center but also significantly...

View Article


All Data Archiving Tools Are Not Created Equal: The Importance of Index and...

Most organizations possess considerable intellectual property. Unfortunately, that information is useless unless employees know how to find it. Archiving tools with powerful index and search...

View Article

Reducing the Costs and Risks of Data Storage in the Federal Government

When it comes to data storage management, the challenge is to do more with less. Government entities are being asked to store and protect more data that is mandated by more regulations, involves more...

View Article

Government by Design: Using Strategic Planning to Design the Business of...

This white paper introduces government by design and describes how it can address the growing challenges and pains felt at all levels of government.

View Article

Research Report: Collaboration Solutions Transforming Government

Government agencies are getting serious about online collaboration tools because they see the opportunity to improve enterprise-wide information sharing, support real-time communications during a...

View Article


Expert Q&A: Continuous Monitoring

As attacks on agency networks and assets become ever more divergent and sophisticated, continuous monitoring will be a critical element in an organization’s cybersecurity strategy. But it’s not an easy...

View Article

Contract Guide: GSA IT Schedule 70

GSA’s IT Schedule 70 has been the major go-to vehicle for federal agencies to buy IT products and, more recently, services. At close to $16 billion in annual sales, it takes up a large chunk of the...

View Article


How Diskeeper 12 Keeps the Latest Windows OS Running Like New

In this Executive Summary, openBench Labs provides a technical narrative on the nature of Windows system performance issues, and performs testing to validate Condusiv’s Diskeeper 12’s ability to...

View Article

Top Ten Myths About Recovering Deleted Files

Your network files are not as easy to recover as you think. But why? This white paper examines the misperceptions of file restore. Learn how Condusiv’s Undelete 10 frees IT from daily “accidental...

View Article


openBench Labs: V-locity 4 VM Accelerator Benchmark Results

openBench Labs tested V-locity 4 in its independent lab—examining whether the software increases VM performance by 50% or more by optimizing I/O at the source.

View Article

Telework Solutions for Government

From the aggressive telework program of the U.S. General Services Administration to Georgia’s tax credits for private sector telecommuting programs, agencies at all levels of government are embracing...

View Article

Success Story: Adobe Connect Solution to facilitate collaboration and peer...

In June 2007, DISA awarded Defense Connect Online (DCO), a two-part Adobe Connect solution for collaboration and engagement across DoD global operations. Two different systems comprise the Adobe...

View Article
Browsing all 106 articles
Browse latest View live




Latest Images