AUTHOR ARCHIVES

Results 211-220 of 235

Systems Doctor

February 1, 2006 All was not well at the Bay Pines Veteran Affairs Medical Center in Florida during the winter of 2003-2004. Surgery had to be canceled for a patient already in a holding room because the supply of disposable tubing needed for the procedure had run out. Other patients were affected, too;...

Panel: Performance-based contracting not a panacea

January 26, 2006 Increased federal reliance on performance-based contracting won't cure all the problems that often plague big government information technology projects, participants in a panel discussion said Thursday. Both Congress and the Office of Management and Budget have encouraged greater use of performance-based contracting. Under this approach, agencies specify desired results, as...

IRS makes free 2006 tax preparation software available

January 18, 2006 The Internal Revenue Service on Wednesday made free federal tax preparation software available to most taxpayers through its Web site. This marks the fourth year that an alliance of tax software vendors have collaborated with the IRS to offer free online versions of their products in anticipation of the April...

GSA shuts down insecure contracting Web site

January 13, 2006 The General Services Administration on Wednesday shut down a Web site for electronic submission of contractor bids because information on the site was not secure. A security consultant hoping to join GSA's general schedule of pre-approved vendors discovered the security loopholes Dec. 22. But the agency did not disable the...

Damage Control

January 4, 2006 When hauled before lawmakers eager to vent frustration over federal mismanagement of information technology projects, having a curative for their complaints at the ready makes all the difference. So it went when Karen Evans, the Office of Management and Budget administrator of e-government and information technology, testified last spring before...

Damage Control

January 1, 2006 Early warning system for troubled IT projects isn't tamper-proof. When hauled before lawmakers eager to vent frustration over federal mismanagement of information technology projects, having a curative for their complaints at the ready makes all the difference. So it went when Karen Evans, the Office of Management and Budget administrator...

Mending Medicare

January 1, 2006 CMS' physician reimbursement system is ailing, but many fear the cure could hurt patients. Medicare's formula for paying health care providers is in trouble. Costs are up, but doctors' pay threatens to go down. Many in Congress and the Bush administration say the cure is pay for performance, which would...

Treasury telecom provider drops out of contest for new contract

December 7, 2005 The Treasury Department's incumbent telecommunications provider has decided against bidding for a new telecom contract, a company spokeswoman confirmed Wednesday. "It's in our best interest not to bid on the contract," said Christy Whitman, a Northrop Grumman spokeswoman. She declined to elaborate. The company's McLean, Va.-based information technology sector was...

New acting GSA acquisition chief plans to wrap up reorganization

December 5, 2005 The soon-to-be acting head of acquisition at the General Services Administration on Monday pledged to complete ongoing reorganization efforts as soon as possible, although he did not provide a timetable. GSA began in September to merge its two previously separate acquisition services into the Federal Acquisition Service. The House Government...

New Deal

December 1, 2005 With the giant Networx contract on the horizon, GSA rewires its approach to telecom services. Hanging telephone wires transmit the death and laughter of men and women, says a poem from the last century. Telephone service was relatively straightforward then-a basic technology operated by a monolithic system. Today, telecommunication is...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.