AUTHOR ARCHIVES

Results 841-850 of 861

Government IT Can Get It Right

March 26, 2007 FROM NEXTGOV arrow While so much is written about how government fails to deliver on IT projects, here comes an article from MSNBC that reminds us how government computer analysts hit the tourist jackpot. In the 1970s, the Mexican government assigned some of its computer analysts "to scour the coastline ... and pick...

The Battle to Fill IT Jobs

March 26, 2007 FROM NEXTGOV arrow It's no secret that government agencies and the contractors that work for them find it hard to attract young workers with information technology skills. Another reminder of just why appeared in an article in today's Washington Post. The newspaper interviews Michael Gagnon, a 23-year-old George Mason University student who works...

Why Email Monitoring is Hot

March 22, 2007 FROM NEXTGOV arrow The CNews network in Canada reported yesterday that Alberta's Agriculture Department is investigating an email apparently sent from a government computer that calls supporters of the Canadian Wheat Board "communists who can't deal with the fact their industry is dying." News about employees sending emails that are embarrassing or release...

N.H. Says Real ID 'Repugnant'

March 22, 2007 FROM NEXTGOV arrow States are increasingly opposing the federal Real ID Act, according to an article posted today by The New Standard. The New Hampshire House Transportation Committee unanimously voted Tuesday to pass out a bill that "would prohibit the state’s participation in the Real ID program and any similar federal initiative in...

Navy Refuses Judge's Order

March 21, 2007 FROM NEXTGOV arrow Citing national security issues, the Navy yesterday refused to handover to a court information about its use of sonars, which an environmental advocacy group says kills whales, the AP reports today. The Natural Resources Defense Council has sued the Navy to compel it to use sonar in such a way...

Disaster Recovery. Yeah, It's Important

March 21, 2007 FROM NEXTGOV arrow If you need another reason to institute that disaster recovery plan, what happened to the Alaska Department of Revenue might just convince you to do it sooner rather than later. Last July, a computer technician, while conducting routine computer maintenance, accidentally erased a hard drive containing information on a $38...

Fortran Developer Dead at 82

March 20, 2007 FROM NEXTGOV arrow John Backus, who developed the Fortran programming language, which many government systems were built on, died Saturday at age 82. Backus developed the language in the 1950s when working for IBM and computing missile trajectories, "paving the way for modern softare," the Seattle Times reports. Backus said he wanted an...

Call Centers' Satisfaction Plummets

March 20, 2007 FROM NEXTGOV arrow Customers are much less satisfied with the service they get from call centers, the 1-800 service you contact when trying to get answers to questions about a product or service, according to a report released today and reported on by ComputerWorld. The satisfaction rate with call centers fell dramatically to...

Don't Bother Me with Work

March 20, 2007 FROM NEXTGOV arrow Computer programmers and network administrators are used to operating behind locked doors, which, at times, can have quite sophisticated entry-control systems, such as biometric scanners. The locks are usually there for a good reason: to keep unauthorized employees (including non IT managers) away from databases that store private information and...

Federal Telework Continues to Increase

March 19, 2007 FROM NEXTGOV arrow The percentage of federal employees who say they have the option to telework increased to 44 percent this year compared with 38 percent in 2006, according to the third annual telework survey conducted by CDW. Growth of the telework option in the private sector lags far behind, with only 15...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.