AUTHOR ARCHIVES

Results 11-20 of 515

Bernie Sanders and the Age Question

June 16, 2015 In recent weeks, many have started treating Sen. Bernie Sanders' campaign for the 2016 Democratic presidential nomination seriously, but without addressing or even acknowledging the elephant in the room—Sanders' age. Sanders, now 73 years old, will be turning 75 on Sept. 8, 2016, two months before the presidential general election....

Why Hillary Clinton Is Underwater

June 11, 2015 Hillary Clinton announced her presidential candidacy roughly eight weeks ago, and since then, a few things have become apparent. On the positive side for her, she has put together a first-class team of professionals, a blending of some of the younger people from her 2008 campaign who have gone on...

A Tough Question for 2016 Candidates

May 19, 2015 Several developments over the past week in the presidential race seem worthy of note. Hillary Clinton is coming under increasing fire from journalists and opponents for not answering many questions from the media, while former Gov. Jeb Bush and Sen. Marco Rubio probably are regretting answering any at all. A...

Clinton's Rough Road Ahead

March 24, 2015 The front-page headline in The Washington Post said it all: "Democrats in key states ask: Where is Hillary?" Putting aside the simple facts that the Iowa caucus and New Hampshire primary are both 10 months away and that Hillary Clinton is not expected to officially enter the race before next...

Bush, Clinton and the Fatigue Factor

January 17, 2015 There are some surprising events that warrant being taken very seriously; others, well, not so much. Prior to Thanksgiving, it looked pretty unlikely that former Florida Gov. Jeb Bush would actually pull the trigger and seek the 2016 Republican presidential nomination, even though it was obvious that he personally wanted...

Three Key Questions Will Determine What Direction Election Winds Are Blowing

November 3, 2014 The political environment usually is "set" in midterm elections around midsummer. At that point, it's generally easy to see which direction the partisan winds are blowing, and one usually has an idea as to whether those winds are light, moderate, or heavy. By this time in the cycle, now a...

Questions and Possible Answers on the Midterm Elections

October 27, 2014 After the obvious "Who's going to control the Senate after this midterm election?" question, several more questions come up in most political conversations these days. One recurring inquiry focuses on the role of the Affordable Care Act, with many suggesting that it has faded as an issue in the eyes...

The Trench Warfare Begins

October 20, 2014 With just a little more than two weeks to go before the midterm election, Democrats are increasingly in need of a break or two to salvage their Senate majority. In my National Journal Daily column a month ago (September 14), after suggesting that Republicans had a 60 percent chance of...

Stacked Deck

October 6, 2014 While the outcomes of presidential races are pretty much decided by how the swing, or "purple," states split, in the fight for control of the U.S. Senate that is not always the case. The challenge for Democrats in this election is having so many seats up in very Republican states....

Is It Real, or Is It a Political Head Fake?

September 29, 2014 In the early 1970s there was a classic television commercial for Memorex, a company just entering the consumer market for high-quality audio cassettes. In the commercial, jazz great Ella Fitzgerald would hit a high note, shattering a wine glass. Then, they would play her back on tape, shattering the glass...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.