Government Executive March 2001 Vol.33, No.3

Pitching Public Service
By Dugie Standeford
An all-out campaign attempts to woo skeptical college grads into government service.

Escape Artist
By Cyril T. Zaneski
George W. Bush attempts to break the Clintonian regulatory knot.

Skeptic in Chief
By Jason Peckenpaugh
Navy Secretary Richard Danzig pushed the service to question its traditional methods and embrace innovation.

The Peacekeepers
By James Kitfield
President Bush may not like using the military as a peacekeeping force, but the armed services are already adapting to the task.

Digital Government
By Joshua Dean
Agencies are remaking themselves as agile, customer-centric organizations providing transactions and services seamlessly via fully integrated digital processes.



Managing Technology: Streamlining Links in the Supply Chain
By Karen D. Schwartz
The military's supply agency revamps to meet the demand for efficiency.

Personal Technology: The Power of the Pen
By Joshua Dean
Nothing compares to the simplicity of the pen and paper for taking notes-maybe.

Travel: Airport Confidential
By Katy Saldarini
Get a glimpse of the pluses and minuses at some of the most well-traveled airports.

Marketplace: Staying the Course on Acquisition Change
By Allan V. Burman
For the new administration, the key to acquisition change will be staying the course.

Public Management: Some Advice for Good Measure
By Steven Kelman
Advice for new political appointees: Use the Results Act as a management tool.

Management: Adventures in Surplus Land
By Stan Collender
After years of trying to get rid of the federal deficit, lawmakers are at a loss for how to plan for the latest trend-surpluses.


Editor's Notebook: The Ties that Bind
Political World: The "A" Word Is In
The Last Word: It's the Layers, Not the Numbers, That Count

Back Issues

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.