Government Executive Vol. 36 No.21

magazine cover image

FEATURES

  • Showdown at Yellowstone
    A face-off over snowmobiles could change the course of the National Park Service.
    By Denise Kersten
  • Viral Time Bomb
    The shortage of flu vaccine bodes ill for thousands of Americans.
    By Katherine McIntire Peters
  • Processing People
    Human resources technology is yielding great benefits, but there are risks.
    By Shawn Zeller
  • Open To Closure
    How military managers can prepare for base closures.
    By George Cahlink
  • Taking the High Ground
    New U.S. space exploration goals bring NASA and Defense closer.
    By Beth Dickey
  • Bright Ideas
    The winners of the 2004 Government Technology Leadership Awards.

NEWS+ANALYSIS

  • Cold Comfort
    Chilly? Your work probably is suffering. By Shawn Zeller
  • Terrorism Risk vs. Reward
    Should the Virgin Islands get more federal emergency response funds per capita than New York? By Amelia Gruber
  • Message Control
    In Iraq, the U.S. government struggles with grisly terrorist propaganda. By Shane Harris
  • Calling for Contractors
    EEOC officials choose a company to answer customers' questions. By Amelia Gruber
  • On the Case
    Pentagon task force chief targets sexual harassment policy. By Daniel Pulliam
  • The Best and the Rest
    Managers must stress positive feedback and employee development. By Shawn Zeller
  • Anonymous No More
    The CIA's top terrorist hunter says people, not agencies, failed to stop 9/11. By Shane Harris

  • Getting Buyers in Line
    Air Force procurement problems prompt reviews and reorganization. By George Cahlink

ADVICE+DISSENT

  • Managing Technology

    Portals in the Storm
    GIS helped Florida officials brace for this year's hurricanes. By Karen D. Schwartz
  • Management Matters

    It Takes a Bureaucracy
    Serving the government customer isn't as simple as it sounds. By Brian Friel
  • Public Administration

    What's Next
    After the campaign. By C. Morgan Kinghorn and William Shields Jr.
  • Political World

    Border Clash
    The immigration debate promises to heat up in Congress. By Charles Mahtesian

IN EVERY ISSUE

  • Editor's Notebook
    Technology leadership awards celebrate bright ideas and what we do with them.
  • Letters
  • The Buzz
    Howard Stern and the FCC chief, score cards going green, healthier bureaucrats, and federal heroes on TV.
  • Executive Recruitment
    A recently retired SES veteran looks to pro sports for his next career. By Timothy B. Clark
  • Outlook
    All together now: Welcome back, big government! By Tom Shoop
Back Issues
Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.