Juliana Gruenwald

Results 281-290 of 295

Officials say Y2K effects could linger for weeks

October 14, 1999 As they step up their focus on international preparedness, government officials warned Wednesday that the impact of failures stemming from the year 2000 computer bug could last several weeks after the first of the year, particularly in such areas as telecommunications. During a hearing on international Y2K preparedness before the...

Lawmakers blast new procurement regs

October 1, 1999 Responding to concerns raised by some high-tech companies, a group of House members is calling on the Clinton administration to withdraw proposed changes to federal standards outlining procedures government agencies should use when buying products from private contractors. In a letter sent Wednesday to Jacob Lew, director of the Office...

Energy Department to recruit more high-tech students

August 30, 1999 Given the growing competition it faces with the private sector for high-skilled workers, the Energy Department is stepping up its efforts to recruit science and technology workers by putting more emphasis on attracting high-school and college students. But Energy Department Undersecretary Ernest Moniz acknowledged that one of its most challenging...

House panel blocks computer monitoring plan

August 2, 1999 The House Appropriations Committee approved a measure Friday that would prohibit funding for a controversial plan to monitor all federal computer networks and guard against possible attacks from hackers and other intruders. The language was included in fiscal year 2000 spending bill funding the Commerce, Justice and State Departments. The...

Groups want Top 10 federal documents online

June 30, 1999 Two interest groups, the Center for Democracy and Technology (CDT) and OMB Watch, announced Monday that they were were launching an effort to find out what the ten most wanted government documents are, and promised to push to have those items posted on the Internet. CDT Policy Analyst Ari Schwartz...

Commerce pulls out of search engine venture

June 15, 1999 The Commerce Department has decided to pull out of a joint venture with a private firm on a Web search engine giving public access to government databases. The partnership was controversial because plans to charge for the service appeared to contradict Clinton administration policy on making "the Internet and government...

House panel seeks to consolidate IT research

May 18, 1999 The House Science Committee plans to focus the federal government's information technology research funding under one long-term authorization bill, according to a letter from Chairman F. James Sensenbrenner, Jr., R-WI, sent last week to the head of the House Appropriations Committee. Funding for information technology research has been spread across...

White House criticizes GOP R&D budget

April 16, 1999 Administration officials Thursday criticized the congressional GOP's budget resolution for decreasing funding for federal research and development. The Republican move could make it difficult for the White House to obtain additional money for its new information technology initiative. While the budget resolution only provides the outlines of congressional budget priorities...

DOE lab caught in patent dispute

April 12, 1999 Some House Democrats are calling on Energy Secretary Bill Richardson to investigate whether Lawrence Livermore National Laboratory acted improperly in a patent dispute over technology that can be used to send and receive information over the airwaves. Democratic Reps. Bud Cramer, Ala., and George Brown, Calif., the Science Committee's ranking...

International Y2K effort launched

April 7, 1999 International officials announced a handful of high-tech initiatives Tuesday, including the formation of a team of experts to assist nations in fixing the Year 2000 computer bug. In addition to the YES Corps volunteer program, the International Y2K Coordination Center also announced the creation of a new Web site to...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.