MANAGEMENT - ALL ARTICLES

Results 6841-6850 of 12469
The air traffic tower at Latrobe, Pennsylvania's Arnold Palmer Regional Airport is slated to close due to the cuts.

FAA to Close Air Traffic Control Towers Due to Sequester

Affected facilities are at small- and medium-sized airports and are staffed by contract workers.

Two-inch knives are allowed now on planes.

New TSA Rules Allowing Knives and Clubs Are Freaking Out Flight Attendants

Transportation Security Administration head John Pistole announced the change would be made in about six weeks.

Navy Secretary Ray Mabus announced plans to pare back the service’s operations, investments and deployments Saturday.

Pentagon Releases Further Sequestration Guidance

Support for congressional travel, Blue Angels shows and tuition assistance to face the budget axe.

Obama spoke to the news media before a meeting of his Cabinet Monday.

The 6 Species of Secretaries That Will Define Obama's Term

The president has picked most of his cabinet. Here's how they all fit into his second term.

Paul Ryan's New Budget Promises Don't Add Up

A balanced budget and a Medicare voucher system is not possible, the math suggests.

Obama and Boehner met in 2011 to discuss the debt in the White House's Cabinet Room.

Adult Leadership Required to Clean Up the Mess in Washington

“Muddy steps” analogy reveals why voters want Obama and Boehner to stop acting like kids.

Senator to USDA: Cancel Wine Tastings Before Furloughing Food Inspectors

Republican says conferences should be cut before employee salaries.

What If the Pundits Are Right After All? A Comment on Polarization and Sorting

Last week, Molly Ball reported on political scientist Morris Fiorina's paper highlighting common errors pundits make. Alan Abramowitz argues that one of Fiorina's claims misses the mark.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.