AUTHOR ARCHIVES

Results 1-10 of 245

Financing Defense

June 1, 2002 The Defense Department is getting its finances in order. o CEO worth his or her salt is going to make a strategic decision without good financial information," Defense Department Comptroller Dov Zakheim told reporters at a recent Pentagon briefing. But that's just what managers at Defense have been doing for...

Wireless Wonders

June 1, 2002 Imagine managing your corporate e-mail from your cell phone. At www.wirelessknowledge.com, you'll find Workstyle, software from Wireless Knowledge Inc., a subsidiary of communications giant Qualcomm Inc., which enables cell phones, handheld computers and notebooks to remotely access e-mail, calendars and contact information. Workstyle is compatible with two e-mail products widely...

The Supply Chain’s Demands

May 1, 2002 The Navy's new supply-chain management system meets demand without the inventory. verwhelming air superiority has been a key part of the United States' strategy against terrorist forces in Afghanistan. Navy jets have played a central role, flying more than 9,000 sorties over the war zone as of mid-March. The Navy...

Despite lack of new funding, e-gov projects to move forward

April 30, 2002 The Office of Management and Budget has provided almost $5 million in funding for only a few of 24 electronic government projects, but the remaining projects will still move ahead, the Bush administration's e-gov chief said Monday. OMB has marshaled a total of $6 billion to support its 24 e-gov...

GovBenefits debut marks Bush administration’s first e-gov success

April 29, 2002 Labor Department officials on Monday debuted a new Web site designed to help Americans determine their eligibility for 55 government benefits programs. The site, GovBenefits.gov is the first of the Office of Management and Budget's 24 electronic government projects to go live and marks the initial success of the administration's...

IRS sets the standard for protecting privacy

April 29, 2002 With a special tool designed to ensure that information is protected when new information systems are built, the IRS is setting the standard for federal agencies and other governments in protecting privacy in the age of electronic information. In an interview with Government Executive, Peggy Irving, the IRS' privacy advocate,...

Navy medical personnel worldwide use software to collaborate

April 25, 2002 The employees of the Navy's Bureau of Medicine and Surgery (BUMED) are using collaboration software to help improve the health care they provide to 2.6 million active duty service members, retirees and dependents worldwide. Vice Adm. Michael Cowan, surgeon general of the Navy and the chief of BUMED, wanted the...

Top Dog

April 1, 2002 What it takes to be a champion CIO. n the past, federal chief information officers were treated like stray hounds nosing in for scraps at the head management table. Those days are over. The Bush administration is keenly aware of technology's promise, grooming CIOs of a different breed. Some have...

Security agency’s CIO outlines transformation plans

March 27, 2002 The National Security Agency is working to transform its information technology business practices as the war on terrorism progresses, a senior agency official told technology vendors Wednesday. NSA CIO Richard Turner outlined the agency's transformation goals at a breakfast meeting sponsored by FSI, a McLean, Va.-based IT market research and...

Presidential board asks for feedback on cybersecurity

March 22, 2002 The President's Critical Infrastructure Protection Board is soliciting advice from the public on how national cybersecurity can be improved. The board, which is headed by Dick Clarke, the president's special adviser on cyberspace security, was created in October by an executive order entitled "Critical Infrastructure Protection in the Information Age."...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.