AUTHOR ARCHIVES

Results 351-360 of 515

Balancing Act

June 12, 2007 Ever since recapturing control of Congress last November, Democrats have clearly had their work cut out for them. They have had to try to balance the demands of their liberal, militantly anti-war base with those of the broader electorate, whose support for the war has waned but whose attitudes toward...

Turning the Tables

June 5, 2007 With the recent disclosure that Pentagon war planners are working on options to begin withdrawing U.S. troops next year, we got a glimpse of America's Iraq policy of the not-too-distant future. Revealed even before all of the troops in President Bush's surge have reached Iraq, a drawdown is not the...

Financial Checkup

May 29, 2007 In five weeks, the presidential campaigns must close their books on the second quarter and begin preparing their reports to the Federal Election Commission on fundraising, spending, and cash-on-hand. Although it would be an exaggeration to say that this will be a make-or-break moment for any of the campaigns, their...

Closing In

May 22, 2007 Given how early the 2008 presidential race started, it's no surprise that we're already swimming in national polls. But too often the surveys that attract the most attention are the outliers, those that differ from what most of the others are finding. For analysts and the news media, the dilemma...

Getting Jumpy

May 15, 2007 The war in Iraq is probably the biggest single variable that will influence the outcome of the 2008 presidential and congressional elections. It is likely to be a more important factor than whom each party nominates for president or how the parties fare at candidate recruitment and fundraising. And Iraq...

First-Quarter Grades

May 8, 2007 Analyzing politics can be viewed as a science or as an art. Likewise, presidential campaigns can be evaluated objectively, based on quantitative measurements, or subjectively, based on judgment, experience, and intuition. Neither way is perfect, but all too often people look at elections entirely through a subjective prism, and they...

Controlling Themselves

May 1, 2007 Need proof that Democrats are intent on holding their House and Senate majorities in next year's elections? Then look no further than the refusal of Hill Democratic leaders to respond to the Virginia Tech massacre by calling for sweeping gun control legislation and to respond to the Supreme Court's decision...

Underestimating Giuliani

April 24, 2007 At the end of every year, The Washington Post's David Broder writes what has to be a horribly painful column cataloging every journalistic mistake he's aware of having made over the previous 12 months. Broder is a fine journalist, but he must have some latent masochistic tendency: You will never...

Taking a Stand

April 17, 2007 Politicians are routinely accused of blowing with the wind, of doing whatever seems to be most expedient. Although it's true that the final edition of Profiles in Courage left the printer long ago, we too often tend to think that politicos who take a stand that we agree with are...

Combining Polls

April 10, 2007 The proliferation of polls makes modern presidential campaigns more fun to watch than those of earlier periods. There are so many polls that it's not hard to figure out where a race stands at a given point, even if it's very unclear where it is headed. Looking at an average...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.