Skip to content
  • Home
  • About
  • Solutions
  • Hot Topics
  • Best Practices
  • G2G Marketplace

Best Practices

Building Your Cyber Security Team

  • by Chris Burrows
  • Posted on April 13, 2017October 10, 2016
  • Best Practices

We are not all born from kings like Leonidas, but we have the honor and responsibility of protecting our organizations as he protected Greece from the Persians. When building my team of (cyber) Spartans, I […]

Read More

8 Tips for FLSA Compliance Review

  • by Tracy Coleman
  • Posted on July 4, 2016May 10, 2016
  • Best Practices

Wage and hour compliance is a complex and on-going challenge for public sector organizations. Many government agencies and municipalities have struggled to comply with the Fair Labor Standards Act (FLSA) since the mid 1980s, when […]

Read More

We’re Too…

  • by RazorThreat
  • Posted on June 27, 2016May 26, 2016
  • Best Practices

We’re too small, we don’t have anything a hacker would be interested in, our IT department says we’re secure, we store everything in the cloud, hackers are only interested in the big cities, counties, states… […]

Read More

Vendor Selection or Partner Selection?

  • by EJ Widun
  • Posted on June 20, 2016May 25, 2016
  • Best Practices

How many times have you selected a vendor and tried to use their solution to fix a broken process? Or said the words, “I need a tool to fix that”? As IT professionals, we have […]

Read More

Social Media at Oakland County, Michigan Government

  • by G2G Marketplace
  • Posted on June 13, 2016May 25, 2016
  • Best Practices

Here at Oakland County, we realize that the way our citizens seek information has changed. In order to provide our citizens with the best service possible, we made some changes too. Various county departments began […]

Read More

The Future of Workforce Management in Government

  • by Tracy Coleman
  • Posted on May 30, 2016May 26, 2016
  • Best Practices

The sheer size and diversity of the public-sector workforce have forced governments to rethink how they manage their most valuable asset — people. Among the areas ripe for change are workforce management processes. These include […]

Read More

Enterprise Architecture is SIMPLE

  • by EJ Widun
  • Posted on May 23, 2016May 23, 2016
  • Best Practices

Well, not exactly. As I mentioned in an earlier blog, Creating an Effective Enterprise Architecture Practice for Government, Enterprise Architecture can mean many things to many people; however the goals of Enterprise Architecture remain the […]

Read More

Fires and Floods – Oh My!

  • by Jim Taylor
  • Posted on May 16, 2016May 18, 2016
  • Best Practices

If you worked in government long enough, you have probably lived through government building fires, floods, power outages, chemical spills, etc. During these difficult times you realize: “How do we run our government and IT […]

Read More

4 Ways to Make your Content More Shareable

  • by Stacey Crane
  • Posted on May 9, 2016April 29, 2016
  • Best Practices

Before sharing became a social media phenomenon, it was just an action verb. Children shared toys. Adults shared advice. People shared knowledge. But those were simpler times. Fast-forward to today, and sharing has a whole […]

Read More

Spring is in the Air: A time for renewal?

  • by Phil Bertolini
  • Posted on April 29, 2016May 9, 2016
  • Best Practices

The temperature gets warmer. The skies get bluer. The occasional snow squall becomes less frequent. Spring has sprung and we can now come out from under the gray skies of winter. But what should we […]

Read More

Posts navigation

Older posts

Register Now for G2G Marketplace

G2G Marketplace registration button

We have more waiting for you at the G2G Marketplace – REGISTER NOW

Subscribe

subscribe icon Sign up to receive free email or SMS/text message updates from G2G Marketplace News

Tags

Absenteeism Access Oakland Alerting Architecture Business Continuity Business Continuity Planning Challenges CISO Cloud Communication Connectivity Credit Card Cybersecurity Data Breach Disaster Recovery Emergency Preparedness Engagement Enterprise Architecture Enterprise Technology Fair Labor Standards Act FLSA G2G Marketplace GIS Governance Government Hybrid Identity Theft Information Security Infrastructure Innovation Integration Internal Communication Kronos Malware Maps Messaging Mobile Mobile Development Oakland County Open Data Overtime Overtime Management Password PCI Phishing Planning Procurement Public Servant Public Service Purchasing Requirements Revenue Sharing RFP RFP Process Salary Security Security Breach Shareable Content Sharing Social Media Strategy Technology Threat Assessment Threat Management Time and Attendance Time and Atterndance Tips Transparency Vendor Web Design Web Development Workforce Workforce Management

Recent Posts

  • Don’t Miss this Technology Event in Detroit!
  • Building Your Cyber Security Team
  • Hybrid Cloud Integration in 7 Easy Steps
  • Cloudy with a Chance of On Premise
  • Open for Data! What Does Open Data Mean to Oakland County

Categories

Archives

  • October 2017
  • April 2017
  • February 2017
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016

RSS Feed

  • RSS - Posts

Tags

Absenteeism Access Oakland Alerting Architecture Business Continuity Business Continuity Planning Challenges CISO Cloud Communication Connectivity Credit Card Cybersecurity Data Breach Disaster Recovery Emergency Preparedness Engagement Enterprise Architecture Enterprise Technology Fair Labor Standards Act FLSA G2G Marketplace GIS Governance Government Hybrid Identity Theft Information Security Infrastructure Innovation Integration Internal Communication Kronos Malware Maps Messaging Mobile Mobile Development Oakland County Open Data Overtime Overtime Management Password PCI Phishing Planning Procurement Public Servant Public Service Purchasing Requirements Revenue Sharing RFP RFP Process Salary Security Security Breach Shareable Content Sharing Social Media Strategy Technology Threat Assessment Threat Management Time and Attendance Time and Atterndance Tips Transparency Vendor Web Design Web Development Workforce Workforce Management

Recent Posts

  • Don’t Miss this Technology Event in Detroit!
  • Building Your Cyber Security Team
  • Hybrid Cloud Integration in 7 Easy Steps
  • Cloudy with a Chance of On Premise
  • Open for Data! What Does Open Data Mean to Oakland County

Categories

  • About
  • Best Practices
  • Hot Topics
  • Solutions
  • Uncategorized

Contact Information

1200 N. Telegraph Rd.
Building 49 West
Pontiac, MI 48341-0421
248-858-1424
info@g2gmarket.com
Blog at WordPress.com.
Cancel

 
Loading Comments...
Comment
    ×