George Cahlink

Results 311-320 of 330

Data Mining Taps the Trends

October 1, 2000 rom predicting how many Marines will leave the Corps to rooting out fraudulent health-care bills for the Health Care Financing Administration, data mining is becoming a popular technological tool for agency managers trying to make sense and better use of mounds of government data. Data mining is accomplished with...

Senate chair calls for more base closures

September 28, 2000 Reaping savings by closing additional military bases should be one of the top defense priorities for the next administration, the head of the Senate Armed Services Committee said Wednesday. "I will be among the the first to address [bases realignments and closures] with the next President," said Sen. John Warner,...

Lawmakers lament prison firm's move into computer sales

September 27, 2000 Lawmakers and contractors says a division of the Bureau of Prisons is unfairly expanding into the information technology market by refurbishing surplus government computers and selling them to the public at discount prices. The division, Federal Prison Industries (also known as Unicor), employs about 20,000 inmates annually to produce $500...

Lawmakers ask Clinton to release outsourcing lists

September 18, 2000 Several members of Congress have asked the Clinton administration why it has not yet released lists of thousands of commercial jobs that could potentially be outsourced. The 1998 Federal Activities Inventory Reform (FAIR) Act requires agencies to annually review their workforces and submit lists of jobs that are commercial in...

Defense spending said to fall billions short of needs

September 15, 2000 Defense spending is about $50 billion short of what will be needed to maintain the current force and operations over the next 15 years, according to a new study by the Congressional Budget Office. The Pentagon's fiscal 2000 budget is $276 billion. CBO estimates that DoD will need an average...

Government Executive Magazine - 9/11/00 Navy says retention rate improving

September 11, 2000 The Navy is retaining sailors a greater rate than expected and thereby easing pressure to recruit new service members in the tight labor market. "Our success in retention has had a positive and direct impact on recruiting. Focusing our investment on keeping proven performers reduces the requirement for recruiting...

Air Force urged to control weapons costs

August 31, 2000 The Air Force must give higher management priority to reigning in operation and support costs for its weapons systems or those costs will continue to skyrocket, according to a new General Accounting Office report. "Air Force operating and support costs are growing at about 4 percent per year, even though...

Pentagon official promotes fair A-76 competitions

August 29, 2000 The Defense Department must ensure that public-private job competitions are run fairly if it wants top commercial companies to be interested in bidding for the work, said Stan Soloway, deputy undersecretary of defense for acquisition reform, at a recent symposium. The Defense Department must hold competitions that give both contractors...

DoD pledges to expand union partnerships

August 28, 2000 The Defense Department has done a good job of creating labor-management partnerships at its most senior levels but must expand them to more individual military bases, said Rudy de Leon, deputy Defense secretary, at the American Federation of Government Employees national convention in Orlando, Fla. last week. "We have made...

Defense reform savings unlikely anytime soon

July 28, 2000 The Pentagon's sweeping Defense Reform Initiative has yet to yield billions of dollars in expected savings, according to a new General Accounting Office report. The Defense Reform Initiative is Defense Secretary William Cohen's sweeping plan to modernize Defense business practices by outsourcing hundreds of thousands jobs, eliminating unneeded facilities...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.