Government Executive Vol. 36 No.19

magazine cover image

FEATURES

  • Technology Squeeze
    Short on cash and under the gun for results, agencies must wring every drop of savings from IT investments. This special guide to key contracts will help.
    By Shane Harris
  • Blackberry Jam
    How wireless e-mail devices are taking over the lives of some federal executives.
    By Alina Tugend
  • Making Privacy Pay
    The U.S. Postal Service's information watchdog finds ways to cash in on America's trust in the agency.
    By Denise Kersten
  • Taking the Point
    A look at day-to-day life for our troops and civilians in Iraq.
    By Katherine McIntire Peters

NEWS+ANALYSIS

  • Toll Rises in Procurement Scandal
    Air Force general's quest for a Pacific command cut short as taint of wrongdoing spreads. By George Cahlink
  • Mean Season
    Government workers ride out the hurricane season from hell. By Beth Dickey
  • Quadruple Whammy
    A nasty hurricane season exposes maintenance program weaknesses at space and Defense facilities. By Beth Dickey and George Cahlink
  • Perform or Else
    GAO ditches across-the-board pay hikes, denying raises to employees who don't meet expectations. By Shawn Zeller
  • People Person
    Mary Lacey must woo 41 unions while renovating Defense's personnel system. By Shawn Zeller
  • Filling Out the Ranks In Iraq
    An overwhelmed Defense Contract Management Agency is hiring more civilians and requiring them to work overseas. By George Cahlink

ADVICE+DISSENT

  • Managing Technology

    Private Eyes
    Visual analytics tools sharpen real-time video detection systems. By Karen D. Schwartz
  • Management Matters

    Culture Check
    It's like trying to describe the emperor's new clothes. By Brian Friel
  • Public Administration

    Weighty Matters
    With good information, it is possible to address social equity across the board. By Christopher Edley Jr.
  • Political World

    A Vote for FEMA
    The emergency management system came through, just before Election Day. By Charles Mahtesian

IN EVERY ISSUE

  • Editor's Notebook
    Intelligent reform is worthy, but that's not what we've been getting.
  • Letters
  • The Buzz
    Acceptable government pay; is Martha OK?; stamps out of play; bombproof trash cans save the day.
  • Outlook
    Before the war in Iraq, civil servants offered lots of advice about postwar challenges. Too bad no one was listening. By Tom Shoop
Back Issues
Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.