Government Executive May 2002 Vol.34, No.5


Blackout
By Brian Friel
When Interior agencies plunged into the pre-Internet dark ages, employees resorted to crude business tools of the 1980s.

Boomtown
By Shane Harris
Everyone wants a piece of the action in the supercharged federal technology market.

Restoring Hope
By George Cahlink
Strong management, innovation and a few lucky breaks are allowing workers to rebuild the Pentagon faster than expected.

Lost In Translation
By Katherine McIntire Peters
A critical shortage of federal employees with foreign language skills is hurting national security.

Making The Grade
By Matthew Weinstock
No longer hiding in the back of the class, the Education Department is taking a more prominent role in improving schools' performance.

Departments

Letters

Managing Technology: The Supply Chain's Demands
By Joshua Dean
The Navy's new supply-chain management system meets demand without the inventory.

Viewpoint: Suspensions Are Just a SideShow
By Steven L. Schooner
Barring Enron and Arthur Andersen from obtaining new contracts with the federal government was pure political posturing.

Marketplace: New Marching Orders
By Allan V. Burman
Tight deadlines are pushing the new Transportation Security Administration toward innovative, results-oriented contracting approaches.

Travel: Share And Share Alike
By Lauren R. Taylor
Frugal travelers can pocket some of what they save the government.

Viewpoint: The Numbers Game
By James Colvard
Reality is complex and does not lend itself to neat abstract quantification when it comes to relating budgets to agency goals.

Columns

Editor's Notebook: Spotlighting Service To America
The Last Word: Off With Their Heads

Back Issues

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.