AUTHOR ARCHIVES

Heather B. Hayes

Results 1-10 of 10

Feds Tap the Cloud to do the Heavy Lifting in Legacy IT Modernization

November 14, 2016 FROM NEXTGOV arrow Despite years of costly modernization efforts, agencies continues to grapple with antiquated and cumbersome — yet mission-critical — IT systems. A recent Government Accountability Office report found that the cost of operating and maintaining these aging computers and applications increased steadily over the past decade. In fiscal year 2015, more...

Federal Agencies Bolster Security by Streamlining IT

August 8, 2016 FROM NEXTGOV arrow Agency IT leaders have long relied on a large collection of best-of-breed security products to effectively protect their networks. While the approach provided adequate security, it was both expensive and difficult to manage. In recent years, however, CIOs and CISOs have begun to rethink their overall security philosophy with an...

The Knowledge Banks

March 1, 1996 ike many other government organizations, until recently the Transportation Department found it difficult-if not impossible-to share quality information among the numerous offices and agencies that live beneath its umbrella. One reason is that subordinate agencies like the Federal Aviation Administration and the National Highway Traffic Safety Administration control their own...

Tools for Building a Warehouse

March 1, 1996 ata warehouses work by extracting information from multiple databases working on many types of computer platforms. They can be built by in-house staff or systems integrators such as I-Net and Sylvest. Here are the major components involved: Extract Tools. These can be anything from programming languages, like COBOL or Natural,...

The Knowledge Banks

March 1, 1996 ike many other government organizations, until recently the Transportation Department found it difficult-if not impossible-to share quality information among the numerous offices and agencies that live beneath its umbrella. One reason is that subordinate agencies like the Federal Aviation Administration and the National Highway Traffic Safety Administration control their own...

Linking Supercomputers

February 1, 1996 fficials at the NASA Aerospace Simulation (NAS) Facility first began using the most powerful computers (called high-performance or supercomputers) a decade ago with the goal of reducing, if not eliminating, wind tunnel testing of new aircraft. Wind tunnels, while extremely effective at evaluating how an aircraft will perform in flight,...

A Vision Too Grand

February 1, 1996 hen the Defense Department first began publicizing its Corporate Information Management (CIM) plan in 1989, top military brass, congressional leaders and even the press were almost unanimous in their praise. Certainly the goals of CIM were difficult to criticize, for the change management program promised to streamline computer operations and...

Linking Supercomputers

February 1, 1996 fficials at the NASA Aerospace Simulation (NAS) Facility first began using the most powerful computers (called high-performance or supercomputers) a decade ago with the goal of reducing, if not eliminating, wind tunnel testing of new aircraft. Wind tunnels, while extremely effective at evaluating how an aircraft will perform in flight,...

Up Close and Personal

January 1, 1996 hen it comes to overseeing deportation hearings, the caseloads heaped upon federal immigration judges are almost too heavy to bear. An overwhelming number of immigrants need their cases decided. As a result, judges spend most of their time on the road, traveling to out-of-the-way prisons and detention centers where most...

Up Close and Personal

January 1, 1996 hen it comes to overseeing deportation hearings, the caseloads heaped upon federal immigration judges are almost too heavy to bear. An overwhelming number of immigrants need their cases decided. As a result, judges spend most of their time on the road, traveling to out-of-the-way prisons and detention centers where most...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    View
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    View
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    View
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    View
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    View
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    View
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    View

When you download a report, your information may be shared with the underwriters of that document.