AUTHOR ARCHIVES

Results 41-50 of 861

Intel's Mobile Cyber Claim

August 30, 2010 FROM NEXTGOV arrow The Baltimore Sun's financial columnist, Jay Hancock, wrote on Monday that Intel's announced purchase of mobile chip maker Infineon is actually a smarter deal than Intel's acquisition of McAfee, which was made public on Aug. 19. Hancock's reasoning: Intel intends to weave McAfee into its mobile strategy, aiming the security...

HHS Kicks Off EHR Certification

August 30, 2010 FROM NEXTGOV arrow The Health and Human Services Department announced on Monday that it selected the first two organizations that will review whether electronic health record system meet the standards and certification criteria the federal government has set. HHS selected the Certification Commission for Health Information Technology (CCHIT) in Chicago and the Drummond...

Feds Bid Up Labor Costs?

August 30, 2010 FROM NEXTGOV arrow For years, federal managers have complained they lose workers to the private sector mostly because they are not able to pay them as much as the private sector offers. The best and brightest go to companies for more money, as well as a faster track to upper-level management and a...

The Exercise-Intelligence Link

August 30, 2010 FROM NEXTGOV arrow It's pretty much understood that sitting in front of your computer all day without routine exercise can lead to some unhealthy outcomes. But getting up and walking for, say, just 40 minutes three times a week can not only slim you down, it can actually increase cognition and fight aging....

Got a Deficit? Outsource IT Jobs

August 30, 2010 Could what is happening in West Virginia (and other states already) be an omen for what could happen for federal information technology workers? About 35 West Virginia IT workers marched on Gov. Joe Manchin's office on Tuesday demanding he not outsource their positions to a private company as a means...

Got a Deficit? Outsource IT Jobs

August 27, 2010 FROM NEXTGOV arrow Could what is playing out in West Virginia (and already in other states) be an omen for federal information technology workers? About 35 West Virginia IT workers marched on Gov. Joe Manchin's office on Tuesday demanding he not outsource their positions to a private company as a means to save...

VA Hospital Joins NHIN Test

August 27, 2010 FROM NEXTGOV arrow This item was posted by Nextgov Editor at Large Bob Brewin. The Veterans Affairs Department has added its Richard L. Roudebush Medical Center in Indianapolis to a list to test medical data exchange through the Nationwide Health Information Network in partnership with the Indiana Health Information Exchange, the largest health...

Turning On to Social Networking

August 27, 2010 FROM NEXTGOV arrow Older Americans are quickly becoming avid users of social media - something their children are sure to be embarrassed about. The percentage of Internet users 50 years old and older who say they use social networking tools and sites nearly doubled from 22 percent in April 2009 to 42 percent...

Poor Tech Hampers Applicants

August 26, 2010 FROM NEXTGOV arrow The nonprofit Partnership for Public Service and PDRI, a human resources consulting firm, issued a report on Thursday that "found government does a poor job of evaluating applicants for federal positions," according to an article on Government Executive. Here are some findings relating to technology: 1. Incompatible systems burden job...

What Will Make Telework a Success?

August 25, 2010 FROM NEXTGOV arrow Government Executive posted on Tuesday the second of a four-part series on telework. The brief article, written by Bill Bransford, general counsel for the Senior Executives Association, is how to convince bosses to give up control and allow eligible employees telework. Bransford makes an important point about telework, but it's...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.