Results 831-840 of 861

Plea Continues For Cross-Agency Spending

April 12, 2007 FROM NEXTGOV arrow The following post was written by Tim Clark, editor and president of Government Executive. It was a long day of technology talk at the Press Club yesterday. The security event (see below) began at 7:30 a.m., and another event, sponsored by the Association for Federal Information Resources Management ended at...

An Explanation of OMB's Security Mandate

April 12, 2007 FROM NEXTGOV arrow The following post was written by Tim Clark, editor and president of Government Executive. A bit of skepticism has been flying around about the government’s effort to achieve significant advances in cybersecurity by standardizing agencies’ use of the Microsoft Windows operating system. Or so our own reporting would suggest. But...

NASA Asks Users' Input for Web Re-Design

April 12, 2007 FROM NEXTGOV arrow This post was written by Karen Rutzick, staff correspondent for Government Executive Magazine. NASA is retooling their Web site, and they’re doing their homework first. NASA Internet Services Manager Brian Dunbar is conducting extensive interviews with Web site users, including the media, such as this reporter. Dunbar says they’re “kicking...

Holocaust Museum, Google Highlight Darfur Atrocities

April 11, 2007 FROM NEXTGOV arrow The U.S. Holocaust Museum and Google Earth have teamed up to bring satellite map images of the effects of the atrocities in the Darfur region of the Sudan, the Associated Press reported yesterday. Holocaust Museum and Google Earth executives say the project, called the Crisis in Darfur, will bring the...

Calif. Tries RFID Regulation Again

April 10, 2007 FROM NEXTGOV arrow The California Senate plans to vote on bills this week that would limit the use of Radio Frequency Identification (RFID) technology in documents the government issues for personal identification, ComputerWorld reports. According to the article: Two of the bills would impose a three-year moratorium on the use of RFID technology...

IRS to Encrypt All Laptops

April 10, 2007 FROM NEXTGOV arrow The Internal Revenue Service has nearly completed encrypting all of its laptops in the wake of an internal audit that showed nearly half of its laptops tested for security contained unencrypted personal financial data, ComputerWorld reports. The article quotes IRS Commissioner Mark Everson, who was interviewed by National Public Radio...

Blog: Air Force Blocks Reader to Religious Site

April 9, 2007 FROM NEXTGOV arrow A blogger who writes the Philocrites blog (on "religion, liberalism and culture") claims that a reader accessing his site from an Air Force computer has been blocked from accessing his site. Chris Walton, who says he writes about the Unitarian Universalist movement, posted an item on his blog reporting that...

DISA to Use Army Contract for Service Architecture

April 6, 2007 FROM NEXTGOV arrow As part of its strategy to move away from building large proprietary information technology applications in favor of buying packaged commercial applications, the Defense Information Systems Agency said today that it will use an Army contract to buy the commercial services instead of developing its own contract for the services....

IGs Devoid of Creativity?

April 6, 2007 FROM NEXTGOV arrow In his April 4 Washington Post editorial, "The IG Ideology," Harvard professor and federal procurement expert Steve Kelman argues that federal government's inspectors general, by issuing critical reports on government operations, foster a culture of negativism and fear that perpetuates poor public management and retards efforts to improve government performance....

Another Stolen Government Laptop

March 26, 2007 FROM NEXTGOV arrow In the latest string of stolen laptops, an Army laptop containing names, social security numbers, and payroll information was stolen from a privately owned car at Ft. Monroe, Va., according to a statement by the public affairs office for the U.S. Army Training and Doctrine Command. The personal information for...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care


When you download a report, your information may be shared with the underwriters of that document.