Results 1-10 of 190

Guarding the Purse Strings

March 7, 2007 Want a bridge to somewhere? How about a library or a community center? Well, the newly remodeled Earmark Store is open for business. The major renovation? Larger windows so folks on the outside can watch members of Congress do their shopping. Anyone who thought that the absence of earmarks in...

Reliance on supplemental funding draws bipartisan attack

April 21, 2006 Sen. Tom Coburn, R-Okla., doesn't like the way the Bush administration is paying for the Iraq war. Neither does Rep. David Obey, D-Wis. Granted, the two don't agree on much. But they do agree that funding the war piecemeal and off the books -- through "emergency" supplemental spending bills --...

Legislator takes stand in support of earmarks

March 24, 2006 Just when critics had everyone convinced that earmarked projects are evil, along comes Rep. Mike Simpson, R-Idaho. Simpson is on a one-man crusade to clean up the image of pork-barrel projects. His goal is to convince folks who want to put the kibosh on earmarks that the projects are good...

Spending proposals leave moderates in tough position

March 20, 2006 In January, a group of social services providers descended on Rep. Rob Simmons, R-Conn., in his Norwich office. Their goal: to persuade him to vote against a $39 billion budget-cutting bill that they believed slashed programs crucial to students, low-income families, and children. "We told him what our concerns were,...

Growth in earmarks limits agencies’ flexibility

February 24, 2006 In the war against congressional earmarks, Pete Luisa is a conscientious objector. As the head of the Army Corps of Engineers' civil-works program development office, Luisa doesn't understand all the fuss about "pork-barrel" projects. In fact, he likes them. "For our situation, I can't say that [earmarks] took away from...

Army Corps officials too often acquiesced to Congress' wishes, critics claim

September 9, 2005 The Army Corps of Engineers fought alongside George Washington, dug the fortifications around New Orleans for Andrew Jackson, and once ran the military academy at West Point. But not since 1824, when Congress appropriated $75,000 for the Corps to remove snags and sandbars from the Mississippi and Ohio rivers, has...

Appropriations process mired in same troubles as previous years

July 5, 2005 Most years, the appropriations process would be in dire trouble by now. Congress would be way behind in the drive to enact the annual spending bills by the start of the new fiscal year on Oct. 1. And conservatives would be grumbling that appropriators were rigging the system to spend...

Bush's best-laid budget plans go awry

June 18, 2004 Judged simply by the numbers, President Bush's record on controlling government spending has been lousy. Bush promised to maintain a balanced budget and pay down the federal debt, but he has failed to do either. During his term, the nation has gone from enjoying a $236 billion surplus to confronting...

Following the money on Iraq, homeland security not easy

May 6, 2004 If there's one thing that Congress takes seriously, it's the power of the purse. But over the past few weeks, it's become more and more clear that the House and Senate are having trouble monitoring funding when it comes to homeland security and the war effort in Iraq. First, there's...

Gulf between authorizations and appropriations hurts programs

January 13, 2004 Congress promised the neediest college students that they would each receive $5,800 in Pell Grants to help pay their education costs this year. But instead, Congress ponied up only $4,050 per student. How can Congress give with one hand and take away with the other? As with much of what...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.