AUTHOR ARCHIVES

Results 1-10 of 245

Financing Defense

June 1, 2002 The Defense Department is getting its finances in order. o CEO worth his or her salt is going to make a strategic decision without good financial information," Defense Department Comptroller Dov Zakheim told reporters at a recent Pentagon briefing. But that's just what managers at Defense have been doing for...

Wireless Wonders

June 1, 2002 Imagine managing your corporate e-mail from your cell phone. At www.wirelessknowledge.com, you'll find Workstyle, software from Wireless Knowledge Inc., a subsidiary of communications giant Qualcomm Inc., which enables cell phones, handheld computers and notebooks to remotely access e-mail, calendars and contact information. Workstyle is compatible with two e-mail products widely...

The Supply Chain’s Demands

May 1, 2002 The Navy's new supply-chain management system meets demand without the inventory. verwhelming air superiority has been a key part of the United States' strategy against terrorist forces in Afghanistan. Navy jets have played a central role, flying more than 9,000 sorties over the war zone as of mid-March. The Navy...

Despite lack of new funding, e-gov projects to move forward

April 30, 2002 The Office of Management and Budget has provided almost $5 million in funding for only a few of 24 electronic government projects, but the remaining projects will still move ahead, the Bush administration's e-gov chief said Monday. OMB has marshaled a total of $6 billion to support its 24 e-gov...

GovBenefits debut marks Bush administration’s first e-gov success

April 29, 2002 Labor Department officials on Monday debuted a new Web site designed to help Americans determine their eligibility for 55 government benefits programs. The site, GovBenefits.gov is the first of the Office of Management and Budget's 24 electronic government projects to go live and marks the initial success of the administration's...

IRS sets the standard for protecting privacy

April 29, 2002 With a special tool designed to ensure that information is protected when new information systems are built, the IRS is setting the standard for federal agencies and other governments in protecting privacy in the age of electronic information. In an interview with Government Executive, Peggy Irving, the IRS' privacy advocate,...

Navy medical personnel worldwide use software to collaborate

April 25, 2002 The employees of the Navy's Bureau of Medicine and Surgery (BUMED) are using collaboration software to help improve the health care they provide to 2.6 million active duty service members, retirees and dependents worldwide. Vice Adm. Michael Cowan, surgeon general of the Navy and the chief of BUMED, wanted the...

Top Dog

April 1, 2002 What it takes to be a champion CIO. n the past, federal chief information officers were treated like stray hounds nosing in for scraps at the head management table. Those days are over. The Bush administration is keenly aware of technology's promise, grooming CIOs of a different breed. Some have...

Security agency’s CIO outlines transformation plans

March 27, 2002 The National Security Agency is working to transform its information technology business practices as the war on terrorism progresses, a senior agency official told technology vendors Wednesday. NSA CIO Richard Turner outlined the agency's transformation goals at a breakfast meeting sponsored by FSI, a McLean, Va.-based IT market research and...

Presidential board asks for feedback on cybersecurity

March 22, 2002 The President's Critical Infrastructure Protection Board is soliciting advice from the public on how national cybersecurity can be improved. The board, which is headed by Dick Clarke, the president's special adviser on cyberspace security, was created in October by an executive order entitled "Critical Infrastructure Protection in the Information Age."...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.