Government Executive December 2002 Vol.34, No.16

GLOBAL REACH

The Long Haul
By Katherine McIntire Peters
In warfare, getting troops to the fight and keeping them supplied is half the battle.

By Air or By Sea
By Katherine McIntire Peters
Despite recent improvements in airlift and sealift, moving troops and supplies to the battlefield remains an enormous challenge.

Risky Business
By Matthew Weinstock
Warfighters worry that relying heavily on the private sector could leave them short of critical supplies.

Building a Presence
By George Cahlink
Over the past decade, the United States has used partnerships, contractors and pre-positioned equipment to establish a network of overseas bases.
In the Pipeline
By Shane Harris
Technology firms still are waiting for Uncle Sam to open the tap on a gusher of homeland security spending.



SPECIAL SECTION

The 2002 Service to America Medals: Stories Of Service

The Awards

Federal Employee Of The Year Medal

Career Achievement Medal

Call To Service Medal

Hero Of September 11th Medal

Social Services Medal

Justice Medal

National Security And International Affairs Medal

Environment, Science And Technology Medal



DEPARTMENTS

Letters

Managing Technology: The Data Migration Challenge
By Karen D. Schwartz
Merging the data and computer programs of 22 agencies will be no small feat for the new Homeland Security Department.

In Congress: Raids on the War Budget
By Winslow T. Wheeler
Congress is mounting more raids than ever on the military readiness budget to pay for goodies to impress the voters back home.

Travel: Shipping News
By Lauren R. Taylor
After almost a decade of tinkering, the Defense Department says it's ready to fix the way it moves employees and service members.

Management: Building Brand Identity
By Moshe Engelberg
A strong brand identity is what separates the haves from the have-nots when it comes to agency funding.

Marketplace: Public Service Is Performance
By Allan V. Burman
The Defense and Energy departments discover that performance-based management is the key to providing public service.

Viewpoint: Ramping Up Homeland Security
By Edward L. Rowny
If the new Homeland Security Department is denied the flexibility it needs to counter the threat of terrorism, it will fail.


COLUMNS

Editor's notebook: From Strategy to Logistics
The Last Word: Make It Easier to Say 'YES'

Back Issues


Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.