Bridging the Disconnect: The Government-as-Integrator Approach to Streamlining the DOD Acquisition Process
March 7, 2014Underwritten by Booz Allen Hamilton Shrinking budgets and a quickly evolving threat landscape have prompted senior leaders in the Department of Defense and Congress to push for defense acquisition reform. Though DOD has begun making changes, a fundamental restructuring of how governments works with industry to supply the military may be necessary.
February 11, 2014Underwritten by Symantec and HP Driven by recent events and several White House and Congressional directives, federal agencies are focused on identity management like never before. With all this pressure, agency leaders face a difficult task ensuring secure access to agency resources by the right people, at the right time, and for the right reasons, without restricting the organization’s operational effectiveness.
February 4, 2014Underwritten by VMware Federal leaders are being instructed to move operations to the cloud, but some agencies continue to face obstacles to deployment--both within the C-suite and among the management community
January 27, 2014Underwritten by Nutanix Virtualization provides opportunities for agencies working to consolidate government’s $80 billion IT portfolio and meet federal mandates.
December 20, 2013Underwritten by General Dynamics In response to the Department of Homeland Security’s (DHS) Efficiency Review Initiative, the Tactical Communications (TacCom) procurement vehicle was created to streamline the purchasing of all tools and services affiliated with TacCom.
December 3, 2013Underwritten by Oracle Several months after the government shutdown of 2013, GBC launches a study on federal project management and how federal executives are aligning their missions with federal projects.
November 13, 2013Underwritten by Monster Government Solutions Retention and development are two important components to keeping any organization staffed with the right talent. Amid ongoing budget deficits, many federal agencies have been struggling in these efforts, resulting in skills gaps in many occupational areas.
October 30, 2013Underwritten by SAS The recent proliferation of data-producing technologies has generated new challenges for the U.S. national security community. Chief among these are cybersecurity, terrorism financing, insider threat, and border security. In countering these challenges, the difference between catastrophe and security comes down to the ability to effectively analyze data.
October 17, 2013Underwritten by Accenture Though some federal agencies have made progress in shared service adoption and at least nine federal shared service providers (FSSPs) have emerged across various lines of business, widespread concerns over the implications of shared services are slowing further implementation of the 2012 Federal IT Shared Services Strategy. This in-depth study analyzes the myths challenging shared service adoption.
October 9, 2013Underwritten by Informatica In the age of increased information collection, analysis and storage, nearly all organizations struggle to respond to and prevent ever-increasing security breaches and threats to their data. Personally identifiable information, health and financial data, trade secrets, and national security assets must all be protected, but traditional security measures are not enough. Insider threat is of particular concern.