Defines the set of capabilities to support the transmission of communications over a network. Includes instant messaging
Technology Business Management
Document Management and workflow
Defines the set of capabilities to support the creation, use, archiving and deletion of unstructured data. This includes the set of capabilities to support the design, generation and maintenance of electronic or physical forms and templates
Data Warehouse
Defines the set of capabilities to support the archiving and storage of large volumes of data
Data Recovery
Defines the set of capabilities to support the restoration and stabilization of data sets to a consistent, desired state
Data Mining
Defines the set of capabilities to provide for the efficient discovery of non-obvious, valuable patterns and relationships within a large collection of data
Data Integrity and Privacy Management
Data Integrity and Privacy Management involves the coordination of data collection, storage, dissemination, and destruction as well as managing the policies, guidelines, and standards regarding data management, so that data quality is maintained and information is shared or available in accordance with the law and best practices
Data Exchange
Supports the interchange of information between multiple systems and applications; includes verification that transmitted data was received unaltered.
Customer Services
Customer Services supports activities associated with providing an agency's customers with information regarding the agency's service offerings and managing the interactions and relationships with those customers.
Cryptography
Defines the set of capabilities to support the use and management of ciphers, including encryption and decryption processes, to ensure confidentiality and integrity of data
Credential Issuance and Management
Credential Issuance and Management: the researching, tracking and providing of user access credentials (logical and physicals) and associated security features for the protection of federal information and information systems from unauthorized access, use, disclosure, disruptions, modification, or destruction, as well as the creation and implementation of related security policies, procedures and controls. This includes background checks and related personnel security management services.
Pagination
- Previous page
- Page 4
- Next page