AUTHOR ARCHIVES

Results 41-50 of 235

Walking the Talk

April 11, 2007 Interoperability among first responders is a state of mind. That is, the ability of emergency incident commanders to talk to their counterparts in other jurisdictions and disciplines is not simply a matter of buying new equipment. According to a December 2006 Homeland Security Department survey, technology is where the nation...

The Cost of Commuting

April 10, 2007 FROM NEXTGOV arrow This week’s The New Yorker investigates the phenomenon of commuting, nominating Washington as a “worthy candidate” for one for the country’s worst commutes. (Article not yet available online.) The article, “There And Back Again,” reserves the worst commuting honors for Atlanta and analyzes the experience of commuting in general. Simply...

Human Tendencies and Cybersecurity

April 10, 2007 FROM NEXTGOV arrow When choosing numbers, humans tend to choose certain types of numbers, such as prime numbers, more often than other kinds of numbers, a fact that impacts the way humans choose passwords and other security related features. For example, choose a number between 1 and 20. Is it 17? If you’re...

Effect of Nuke Over Washington

April 9, 2007 FROM NEXTGOV arrow In the February issue of the International Journal of Health Geographics, two University of Georgia scientists mapped the possible effect of a nuclear explosion in metropolitan Washington, D.C., as well as three other cities (New York City, Chicago and Atlanta). According to the article, a 500 kiloton bomb detonated close...

How to Recycle Those CD Spindles

April 9, 2007 FROM NEXTGOV arrow What’s a toasted bagel plus avocado in a CD container? Lunch! Click the link above for a neat way of re-using CD spindles (the plastic container for a pack of blank CDRs, for example) as a high-tech variant to the tin lunch box to bring your bagelwich to work. Hat...

Change Means Explaining Yourself

April 6, 2007 FROM NEXTGOV arrow Col. Charles Lambert, program manager of the Army’s Logistics Modernization Program, recently gave a speech at a gathering of contractors about how to change business processes. “The first thing with any American worker, just like an American solider, is explain to them why they’ve got to do something, what the...

Personal Laptop No Guarantee of Privacy

April 6, 2007 FROM NEXTGOV arrow Using your privately-owned laptop at work still doesn’t mean you have a right to privacy for non-work files stored on that computer, CNET reports. A technically-minded police officer in Glencoe, Okla., was troubleshooting a network problem on a laptop owned by city Treasurer Michael Barrows, who had been bringing his...

Solar Flares Blamed for GPS Disruption

April 6, 2007 FROM NEXTGOV arrow Researchers now attribute a December 2006 disruption of the Global Positioning System to a solar flare, Reuters reports. The National Oceanic and Atmospheric Administration “observed two powerful solar flares on December 5 and 6, 2006, emanating from a large cluster of sunspots,” according to the article. “A giant radio burst...

IT Reshapes DLA Strategy

April 5, 2007 FROM NEXTGOV arrow The Defense Logistics Agency has a new strategic plan available online. In the plan, Army Lt. Gen. Robert Dail, DLA's director, reports that the agency seeks to extend “beyond its traditional wholesaler responsibilities.” The agency has just finished a multi-year information technology and business process modernization effort, merging six siloed...

Russians to Compete With U.S. GPS

April 5, 2007 FROM NEXTGOV arrow Russia is making a serious bid to compete with the U.S. Global Positioning System, the New York Times reports. “By the end of the year, the authorities here say, the Russian space agency plans to launch eight navigation satellites that would nearly complete the country’s own system, called Glonass,” according...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.