Results 21-30 of 98

GAO: Military should consider breaking up FCS

March 14, 2008 Military leaders should consider breaking up the Army's troubled Future Combat Systems modernization program and field only a subset of the originally planned battle suite of armored vehicles, robots, aerial drones and sensors, if any of the components can be shown to actually work, congressional investigators said. A Government Accountability...

Rising Joint Strike Fighter costs could put pressure on Defense budget

March 12, 2008 The cost to build and operate a fleet of the military's newest stealth fighter jet is approaching $1 trillion, according to congressional auditors. The program will consume a sizable chunk of future defense budgets, likely crowding out other priorities, the Government Accountability Office concluded in a new study. In its...

Report: National security agencies have failed in Iraq, Afghanistan

March 10, 2008 America's national security institutions have failed and the military has been left holding the bag in places such as Iraq and Afghanistan, conducting nation-building tasks for which it is ill-suited, according to the final report of a House Armed Services Committee panel established in 2007 to examine military roles and...

Army says it needs up to $260 billion per year

March 7, 2008 The battle over how the Defense Department's budget will be divided among the military services heated up this week, with the latest salvo fired by the Army. In order to maintain its forces in Iraq and Afghanistan, increase its size, train and equip soldiers, repair war-worn equipment and modernize its...

Former commander in Iraq provides post-surge assessment

March 4, 2008 As the surge brigades return home from Iraq, U.S. efforts there must shift from battling terrorists and insurgent groups to providing jobs and economic opportunities for Iraq's impoverished residents while also improving national and local government, said Lt. Gen. Raymond Odierno, former coalition ground force commander, on Tuesday. "Much work...

Taking It To the Streets

March 1, 2008 The U.S. military has seen the future, and it involves urban warfare. This year marks a milestone in human history: For the first time, more than half the world's population will live in cities. A June 2007 report by the United Nations Population Fund said this "decisive shift from rural...

Agencies join forces to expedite supplies to troops

February 29, 2008 Leaders from the U.S. Transportation Command, Defense Logistics Agency and General Services Administration established this week a formal customer support partnership to expedite supplies to troops in combat. The agreement established an executive steering committee comprised of senior executives from each agency to oversee joint working groups, which will monitor...

Analyst warns of third Islamic terrorist wave, enabled by Internet

February 25, 2008 Al Qaeda is not the central planning, recruiting and organizing force for global terrorism it once was, but has become more of a brand name that leaderless terrorist groups around the world assume to gain recognition and notoriety, according to a leading terrorist expert. The third wave of terrorists comprises...

Marine commander warns of stress on forces, families

February 14, 2008 Any decision by the Bush administration to halt reductions in American troop strength in Iraq this summer should await input from the Joint Chiefs of Staff on other global risks and the stress on the military caused by constant deployments, the Marine Corps commandant said Thursday. Gen. James T. Conway...

Air Force chief lays out new strategy

February 13, 2008 A new Air Force strategy document says the service must control not only the skies, but space and cyberspace too, or risk U.S. security and the failure of future military operations. Air Force Chief of Staff Gen. Michael Moseley laid out his service's strategy for the next two decades and...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.