AUTHOR ARCHIVES

Results 1-10 of 36

Getting a Seat at the Table

March 1, 1997 When asked about their biggest challenges, a group of information resource managers participating in Government Executive's 1996 IRM Roundtable spoke about the difficulties of having to do more work with fewer people and less money. Many lamented that information technology projects were not keeping pace with advancements in the private...

Getting a Seat at the Table

March 1, 1997 When asked about their biggest challenges, a group of information resource managers participating in Government Executive's 1996 IRM Roundtable spoke about the difficulties of having to do more work with fewer people and less money. Many lamented that information technology projects were not keeping pace with advancements in the private...

Data Warehouses Hit the Web

February 1, 1997 ife was relatively tranquil for the Environmental Protection Agency's information systems staff until the 1988 Superfund Reauthorization Act prompted a reengineering frenzy that radically altered how the agency handles data. That legislation contained a provision requiring the agency to make toxic release reports from more than 675,000 companies available to...

Data Warehouses Hit the Web

February 1, 1997 ife was relatively tranquil for the Environmental Protection Agency's information systems staff until the 1988 Superfund Reauthorization Act prompted a reengineering frenzy that radically altered how the agency handles data. That legislation contained a provision requiring the agency to make toxic release reports from more than 675,000 companies available to...

Superhighway Growth and Gridlock

January 1, 1997 s Government Executive discovered six months ago when carving its own niche in cyberspace, Web site construction is not for the faint-hearted. Staking a claim in cyberspace requires skill, patience, dedication, secure financial backing and lots of Chinese takeout. Within two years, dozens of federal agencies have risen to the...

States Show Technological Prowess

December 1, 1996 he five Federal Technology Leadership Awards that were given to state information technology projects were nominated by the Intergovernmental Enterprise Panel (IEP) working in a partnership with the National Association of State Information Resource Executives. IEP was chartered by the Government Information Technology Services Working Group to improve intergovernmental service...

Icons of Information Technology

December 1, 1996 ne of the first jobs for the chief information officers currently being installed at 27 federal agencies is to analyze information technology projects and determine if adequate returns are being made on investments. Tight budgets and personnel shortages have caused government organizations to heartily embrace new computer and telecommunications projects...

Electronic Commerce Strategies

December 1, 1996 ext month is the deadline for federal agencies to comply with a presidential mandate to use electronic commerce for all routine procurements. Although dozens of pilot electronic commerce projects have been launched since the executive order was issued three years ago, few have been converted to permanent programs. Many government...

Client-Server Perks and Pitfalls

November 1, 1996 onitoring the accuracy of radar and other navigational aids used to guide aircraft through U.S. airspace is a data-intensive task for the Federal Aviation Administration's Aviation System Standards group. Computer labs on board a fleet of 30 FAA planes compare transmitter information, such as latitude and longitude readings, against databases...

Slaying the Paper Tigers

October 1, 1996 ederal imaging and storage systems used to be exclusively comprised of customized, proprietary products that were not only expensive but incapable of operating with other systems. Those solutions generally were reserved for high-end, stand-alone applications. But the government's push toward purchasing commercial, off-the-shelf (COTS) products, combined with the adoption of...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.