Results 31-40 of 861

Too Many Federal Workers?

September 7, 2010 FROM NEXTGOV arrow Over the weekend, Amity Shlaes, a senior fellow at the Council on Foreign Relations, wrote in The Wall Street Journal about the differences between private and public sector workers. She sketches out the history of unions in the federal government and what she concludes as a rather obvious point: If...

Gaming Health Care Breakthroughs

September 7, 2010 FROM NEXTGOV arrow Playing games to generate insights into a problem so you can create innovative solutions is nothing terribly new, but it has now reached into the health care community. The federal government has used gaming to develop ways to react to fictional cyberattacks. This fall, the Myelin Repair Foundation, a research...

When I Grow Up . . .

September 3, 2010 FROM NEXTGOV arrow In a recent article on how chief information officers can become part of an organization's senior leadership team (rather than an order taker who makes sure the e-mail or data center doesn't go down), quotes Tom Davenport, professor of management and information technology at Babson College in Wellesley, Mass.:...

Sweet Cell Phone Dreams

September 2, 2010 FROM NEXTGOV arrow In another sign of just how attached individuals have become to their cell phones, two thirds of adults say they have slept with their mobile device or placed it next to their bed at night, according to a survey released on Thursday by the Pew Internet and American Life Project....

Finding Jobs for Space Shuttle Workers

September 1, 2010 FROM NEXTGOV arrow Nextgov reported on Wednesday that NASA is launching a program to help those highly skilled - and highly paid - employees working on the soon-to-be-shuttered space shuttle program in Florida's "space coast" to find jobs, especially IT jobs. They may want to look just a bit of a ways south...

It's All in How You Look at It

September 1, 2010 FROM NEXTGOV arrow Virginia computers that support issuing new or updated drivers licenses in the commonwealth have been down for a week. Commonwealth officials issued a statement today trying to play down how much inconvenience this caused drivers: This outage, while significant and particularly so for those attempting to secure a driver's license,...

Pulling Back the Veil

September 1, 2010 Craig Newmark of Craigslist champions efforts to get the word out on transparency. The Obama administration's open government initiative is discussed regularly in some circles inside the Beltway, but travel just a few miles west and it's rarely, if ever, a topic of conversation. That's unfortunate, says Craig Newmark, creator...

More on Cloud and Job Loss

August 31, 2010 FROM NEXTGOV arrow Nextgov has written before about how cloud computing means fewer jobs, but that isn't talked about much in the federal government. (Read here.) Most of the savings in any organization comes from reducing labor - not equipment. More folks are beginning to write about where the savings come from. Here's...

How Facebook Can Derail a Clearance

August 31, 2010 FROM NEXTGOV arrow The following item was posted by Bob Brewin That saucy page on MySpace or YouTube could derail a future spook job, according to an inhouse study conducted for the Office of the Director of National Intelligence -- and unearthed last week by the Electronic Frontier Foundation. The 2008 study did...

The Narrow-Banded Brain

August 31, 2010 FROM NEXTGOV arrow Stephen Baker, author of the Numerati, wrote in his blog on Tuesday that there may very well come a day when eye witness accounts could be less of a factor in courts and replaced by the ever increasing deluge of data provided by security cameras, digital recorders and databases. He...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.