AUTHOR ARCHIVES

Results 1-10 of 54

Analysis: Four Theories on John Boehner's Debt Limit Strategy

August 28, 2013 House Speaker John Boehner has tried to convince conservatives to abandon their idea to use the threat of a government shutdown to force President Obama to defund Obamacare, telling them instead to wait and use the debt limit to force Obamacare concessions. Framing the spending negotiations this way pleases no...

GOP Wants Conservatives to Trade a Shutdown for an Even Bigger Crisis

August 22, 2013 Republican leaders are trying to convince conservatives in Congress that instead of threatening to shut down the government unless President Obama agrees to defund Obamacare, they should refuse to raise the debt ceiling unless he agrees to delay the law. This is better, because to save his signature achievement, Obama...

Ronald Reagan to Richard Nixon on Watergate: 'This Too Shall Pass'

August 22, 2013 The Nixon Presidential Library released the last set of Nixon tapes on Wednesday, and they contain a call from Ronald Reagan to then-President Richard Nixon, assuring him that his Watergate speech was good, and that "This too shall pass." The call was made on April 30, 1973 and, of course,...

The Mind of Bradley Manning

August 15, 2013 Bradley Manning said he was sorry for hurting the United States during his sentencing hearing at Fort Meade on Wednesday, saying, "I only wanted to help people, not hurt people." But hours of testimony presented earlier by his defense team showed that wasn't Manning's only reason for downloading thousands of...

Analysis: The Choreographed Fight Over a Government Shutdown

August 13, 2013 Several Republicans, most prominently a few 2016 presidential candidates, are threatening to shutdown the federal government unless President Obama agrees to defund Obamacare. But Obama would never sign a bill to defund Obamacare. And Republicans know it. But they have to pretend they don't know it -- or that they...

Liz Cheney Pledges to Stamp Out the Last Remnants of Compromise in Congress

July 18, 2013 There is a faint hope that politicians will compromise on some things after several years of do-nothing Congresses, but Liz Cheney wants that to put an end to that right now. Cheney, daughter of former Vice President Dick Cheney, is running for Senate in Wyoming against a fellow Republican, Sen....

The Perils of Being the Earnest Intern

July 18, 2013 Byron Thomas was just another anonymous Senate intern until his co-workers started making fun of his earnest plea that they all show the American flag more respect and recite the Pledge of Allegiance every day. "Now I've only been here for 8 days but I can tell that something is...

Americans Finally Have Access to American Propaganda

July 15, 2013 A law went into effect this month that ends the ban on U.S. government-made propaganda from being broadcast to Americans. In a remarkably creative spin, the supporters of this law say that allowing Americans to see American propaganda is actually a victory for transparency. As Foreign Policy's John Hudson explains,...

How the IRS Made All Kinds of Groups' Lives Miserable

July 5, 2013 We know the IRS acted inappropriately in flagging conservative groups for review when they were seeking non-profit status. But now Congressional Democrats charge that the IRS acted inappropriately in reporting how it acted inappropriately. Liberal groups also got extra scrutiny from the IRS on its Be On the Look Out...

Senate Confirms Penny Pritzker to Be Commerce Secretary, 97 to 1

June 26, 2013 The Senate confirmed Penny Pritzker to be President Obama's Commerce Secretary on Tuesday by a vote of 97 to 1 — even though her nomination was supposed to be excitingly controversial. Instead, it was a rare moment of boring bipartisan cooperation. Pritzker was an early supporter of Obama's, but her...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.