AUTHOR ARCHIVES

Results 1-7 of 7

Video: Lasers may soon keep drones perpetually aloft

July 19, 2012 FROM NEXTGOV arrow Two companies, Lockheed Martin and LaserMotive, have managed to keep the Stalker Unmanned Aerial System, also known as a drone, in flight for over 48 hours by using lasers on the ground to recharge the aircraft's battery mid-flight. So ... that's terrifying and cool. LaserMotive held the test in an...

Hillary Clinton's secret weapon: Eyewear?

June 22, 2012 Once again Secretary of State Hillary Clinton has grabbed headlines and been declared "tres cool," this time, because she wore some purple wing-tipped Mardi Gras sunglasses while swearing in Assistant Secretary for Public Affairs Michael Hammer. But we've spotted a pattern: Eyewear, it seems, is her secret weapon. Clinton's non-foreign...

What if Mitt Romney visited Solyndra and no one noticed?

June 1, 2012 Mitt Romney had a decent shot at owning the news cycle Thursday when he hosted a press conference in front of Solyndra, every conservative's favorite (Obama) mistake. Talk about bad timing. The photo op that arose from it made for some good optics, and we hadn't talked about Obama's investments...

Federal court rules against DOMA in same-sex government benefits case

May 31, 2012 A Federal Appeals court in Massachusetts ruled Thursday that the Defense of Marriage Act violates the Constitution by denying federal benefits to same-sex couples and though it's a narrow ruling, it's still a victory for same-sex marriage advocates as the case makes its way ever-closer to the Supreme Court. Read...

Huge round of arrests for $450 million in Medicare fraud

May 2, 2012 CNN reports that the government has arrested 100 people in another huge health care fraud bust, and based on previous instances of this kind, there are bound to be some scandalous details forthcoming. The group is charged with defrauding Medicare, Medicaid, and other federal programs for a combined $450 million,...

Photo: GSA exec in hot water

April 16, 2012 General Services Administration regional commissioner Jeffrey Neely had a rough Monday as he very publicly invoked his 5th Amendment rights during a Congressional hearing into his agency's spending scandal, and photos of he and his wife doing all that aforementioned spending leaked around the internet, thanks to ABC News' Jake...

Republicans concede a payroll tax break extension without spending cuts

February 13, 2012 House Republicans will agree to extend the payroll tax cut for another 10 months without making up for the lost revenue with budget cuts, as they'd previously demanded, reports Bloomberg. We noted this morning that some kind of compromise on the extension seemed likely, with Rep. Paul Ryan giving signs...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.