This eBook by HPE shows how hybrid cloud services can be used to transform and enhance relationships with citizens and businesses.
This report by Citrix reviews the results of a survey of more than 500 organisations to build a picture of their priorities, policies, and potential for more sustainable IT
In this webinar, hear from the Civil Aviation Authority and its delivery partner BJSS on how it developed a service for resgistering drones.
Featuring case studies from Portsmouth Hospitals and Lewisham & Greenwich NHS Trust, Citrix’s new report explores how today’s advances in technology are delivering positive change in healthcare.
This report from Egress, built on the back of an independent survey, explores the significant challenge of insider breaches – employees either deliberately or accidentally sharing sensitive data.
Since the introduction of the Government Transformation Strategy (2017), public sector organisations have set out to transform the relationship between citizen and state. But a recent survey found that only 8% of participants are ‘very confident’ in their organisation’s readiness to respond to digital challenges. This report from GOSS Interactive outlines the results of the survey, provides case study examples, and offers recommendations for organisations looking to deliver successful digital strategies.
Today, public sector organisations are faced with ambitious targets for service improvements and if these targets are to be achieved, resource management is crucial. This report from CACI examines the results of a survey into how public sector organisations are managing their mobile workforce resources.
In this roundtable write-up, hear from representatives of local government and the IT industry about the impact artificial intelligence and intelligent automation are having on councils across
In this podcast Phoenix Software are joined by VMware’s Director of Global Cloud Strategy to discuss practical options for UK public sector IT teams, who are finding that there are challenges in fully adopting a cloud first approach.
Office 365 has much to offer organisations of all sizes – but any public cloud-based solution may introduce risk as well as opportunity. In this report, Citrix shares their recommendations for addressing common challenges and establishing an integrated approach to cloud, mobility, security, user experience and overall IT efficiency.
This new report by International Data Corporation shows why digital transformation should go hand in hand with network transformation and reviews the factors that organisations should carefully consider in their network migration.
This report covers the results of the 2018 Unisys Security Index – the only recurring snapshot of security concerns conducted globally. The index is a calculated score out of 3001 that measures consumer attitude over time across eight areas of security in four categories: national security, financial security, internet security, and personal security.
Leaders of 13 local authorities, brought together by local government solutions specialist Pythagoras, share their insights on making cloud a success
Cutting through the noise – using corporate social media monitoring and analysis for crisis communications
This report from Social360 looks at how effective monitoring of social media effectively can play a key role in crisis management
This paper looks to dispel some of the myths that around global networks, and explain how BT Intelligent Connectivity delivers smarter networks. Networks that help you transform your organisation and meet your challenges – today and in the future.
This report by BT covers the basics of GDPR and the technical challenges that organisations need to look out for.
This report from BT explores the five steps you have to navigate to protect your organisation from attack.
Dods partnered with MarkLogic to explore how police forces today are using data and what the barriers are to doing so more effectively. Front-line and senior employees from 34 regional police forces across the UK were surveyed, illustrating how ineffective data management may be costing police valuable time.
This report by Vodafone offers central government solutions backed by Vodafone's infrastructure, ensuring high levels of availability, security and resilience.
The Cisco 2017 Midyear Cybersecurity Report explores the dynamics of the escelating impact of security breaches, the pace and scale of technology, and how threat actors are infiltrating systems.
This IBM paper helps organisations better understand how they can start preparing for the implementation of the EU General Data Protection Regulation
This 8x8 report, which canvasses the views of 1,095 local government staff in the UK, reveals a significant appetite for new technology.
This whitepaper by Browne Jacobson comes on the heels of a roundtable that explored how the public sector can develop awareness of and better manage reforms to its landscape.
This IBM whitepaper shows how Digital Reinvention will involve a fundamental reimagining of how organisations operate and how they engage with their environment.
How are the public and private sectors utilising technology? BT surveyed 1,501 key IT decision makers from organisations of all sizes across the UK to see how they're embracing the technologies at the heart of the Fourth Industrial Revolution.
For some time now, government has been cultivating a “digital by default” objective to improve services and be more effective with citizens and other stakeholders. This paper by Objective looks at the designs of a powerful information ecosystem that positions organisations for the digital era and supports future growth, innovation and continuous improvement.
This Citrix whitepaper explores the challenges faced by local governments and IT professionals to make services intuitive and convenient in an environment of growing demand and unprecedented cuts in expenditures.
The Little Book of Big Weekends by Boundless has 35 fun and unusual ideas for short-breaks and days out in the UK to inspire and surprise you, from sleeping in a luxury tree house to staying at Britain’s most remote pub.
This SigningHub e-book explores six of the most common threat scenarios associated with e-signing processes and how you should respond.