MANAGEMENT - ALL ARTICLES

Results 5951-5960 of 12467

Postal Service Seeks to Lease Vehicles It Can't Afford to Buy

USPS pursues the cheaper alternative to replace its aging fleet.

Justice Just Announced It Won't Block Legal Pot in Colorado or Washington (Yet)

The agreement marks the biggest shift in federal drug policy since the enactment of the Controlled Substances Act in 1970.

Telling Citizens What Exactly Government Does Would Cost $100 Million

Bill’s sponsor says legislation would create ‘magnifying glass’ to root out waste.

How to Promote Yourself Without Being Obnoxious

Start with the facts and other tips will help you get ahead.

U.S. Embassy Staffer Sent Home from Malta After He Tries to Fight a Stranger

A viral video shows the employee confronting a Maltese driver.

Obama's Affordable Care Act Looking a Bit Unaffordable

The exchanges present a savings for some employers but a rate hike for their employees.

Obama: Economic Justice 'Remains Our Great Unfinished Business'

'The position of all working Americans, regardless of color, has eroded,' president says.

The crowd Wednesday gathered in the same place as those 50 years before.

President's Full 'March on Washington' Remarks

Obama's full 'March on Washington' remarks.

The Simple Reason Perfectionism Is So Dangerous

A little advice from the late David Foster Wallace.

Why Tri-Sector Leaders Rise to the Top

Key skills for collaborating across the public, private and social sectors.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.