AUTHOR ARCHIVES

Results 451-460 of 515

Paths to Glory

April 19, 2005 One way to look at the 2006 Senate races is to consider each party's objective. For Democrats, it's winning the six seats they need to take the majority. For Republicans, it's netting the five seats that would give them a filibuster-proof Senate on strict party-line votes. So how would either...

Power Shift

April 12, 2005 In a fascinating and provocative analysis of the 2004 elections, Michael Nelson, a political scientist at Rhodes College in Memphis, makes a strong case that last year's election was a clear departure from recent elections. In a just-released book with chapters from eight other distinguished political scientists -- including the...

Which Way Will the Wind Blow?

April 5, 2005 While the controversies surrounding House Majority Leader Tom DeLay, R-Texas, have not yet jeopardized his leadership position, he does appear to be nearing an important fork in the road. If no additional allegations of ethical transgressions or new controversies crop up, DeLay's troubles may all blow over. In that case,...

Deja Vu

March 29, 2005 The strategies that both Republicans and Democrats employed to handle the case of Terri Schiavo, the brain-damaged Florida woman, were clearly driven directly by what happened in the 2004 elections. For Republicans, the strategy of growing their social- and cultural-conservative base rather than reaching for the middle was successful last...

Jostling For A Seat

March 22, 2005 Washington-area political junkies may reside at the epicenter of the political universe, but opportunities to watch interesting and trulycompetitive Senate and House races in our own backyard have been few and far between. The 1994 Senate race in Virginia between Democratic incumbent Chuck Robb and Republican Oliver North was great...

An Uphill Battle

March 15, 2005 It's the time in the election cycle when the House campaign committees beat the bushes for top-flight candidates to run for the handful of seats that ought to be competitive next time around. And, like Christmas presents that get repackaged year after year, the same old districts get billed as...

Cut Your Losses

March 8, 2005 The slow, public death of President Bush's Social Security proposal validates the view that the 2004 election was not a transformational one, and that any mandate that Bush received from it was meager indeed. The 2004 election in a nutshell: Thanks to his fabulous campaign organization, Bush, whose stature was...

Drawing Skills

March 1, 2005 Before the Republican-controlled Texas Legislature redrew that state's 32 congressional districts in 2003, midterm redistricting was unheard-of in modern-day American politics, except under court order. Today, taking a second crack at political boundaries redrawn as a result of the most recent census is a game that a growing number of...

Midterm Anxiety

February 22, 2005 There is a palpable nervousness among Capitol Hill Republicans these days. They are well aware that history has been unkind during midterm elections to the party of second-term presidents: In such elections since the end of World War II, the president's party has lost an average of 29 seats in...

Performance Assessment

February 15, 2005 What with President Bush's State of the Union speech, the ongoing debate over his efforts to change Social Security, his federal budget proposal, and the Iraqi elections, political junkies have had plenty to chew on in recent weeks. To top it off, we can mull former Sen. John Edwards's never-too-soon...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.