More than two-thirds of federal managers say their agency's customer service quality is at least comparable to the private sector standard. Unfortunately, the public is less optimistic.
ALL GOVERNMENT BUSINESS COUNCIL POSTS
Virtual training holds significant promise for military readiness, but the Pentagon still lacks a comprehensive understanding of how to optimally balance live and virtual training. Developing a holistic taxonomy of training tasks is an important first step.
Creativity is important for organizations trying to stay agile as they solve problems new and old. So how are federal agencies encouraging their employees to devise new solutions? Welcome to the first post in our Innovation Series, where we’ll walk you through what we found.
Citizen-centric strategies like broadening the use of performance management, integrating channels of communication, and building public trust can help agencies achieve their goal of revolutionizing federal customer service.
A survey of current Pentagon officials reveals serious supply chain deficiencies that could limit the U.S.'s ability to respond to global crises.
DoD leaders may not have the data to make fully informed workforce decisions in the aftermath of a FY 2016 budget battle.
The military faces a looming readiness crisis as sequestration threatens to return, troops return to garrison, and the nature of warfare evolves. To offset these pressures on its own accord, the military can reevaluate how it trains its personnel.
How can the military work to improve readiness in the face of continued budget pressures and the evolving nature of warfare? GBC finds the answer lies, at least in part, in virtual training.
Having a vibrant mobility enterprise is critical for the Department of Defense to keep up with today's threat landscape. But how can DoD overcome the fundamental challenges that currently hinder its enterprise mobility project?
Agencies face unprecedented challenges in their efforts to sufficiently protect sensitive but unclassified and classified information from both malicious and unintentional actors.