Results 1-5 of 5

The Burden of Hosting a Super Bowl

February 2, 2015 When public money is used to help finance a new NFL stadium, two arguments help persuade officials and taxpayers that the investment is worthwhile: 1. The expensive new facility will prevent the local team from leaving town. 2. The expensive new facility will lure in a Super Bowl. Maybe more...

Who Will Stop America's Plague of Hideous License Plates?

December 12, 2014 While Norway puts us to shame in 2014 with their sophisticated new passportsand money, the U.S. remains committed to providing its people with cluttered, boring government-issued items. It's especially bad on America's roads. As William Morgan explained in Slate earlier this year, American license plate design has long left behind...

A New Tool for Tracking Pittsburgh's Bad Air

December 5, 2014 A group dedicated to fixing Pittsburgh's air pollution problem has rolled out a new interactive tool that allows residents to watch the particulate matter in the air rise and fall minute to minute. The Breathe Project, a local coalition funded by the Heinz Endowments, has launched four cameras overlooking four...

How Drones Are Helping Peru Save Its Ancient Temples, Pyramids and Cities

August 27, 2013 FROM NEXTGOV arrow Peru is a country with an impressive collection of ancient ruins. And archaeologists have figured out a way to turn drones into one of their most reliable work assistants. Small drones are helping researchers create site maps and three-dimensional models of sites, a process that used to take months or...

Happy Reopening, Statue of Liberty!

July 5, 2013 The Statue of Liberty reopened Thursday, its grounds fully restored after $59 million worth of damage, caused by Superstorm Sandy, led to broken railings, docks, and paving stones, as well as damaged sewage pumps and electrical systems. Visitors will be able to arrive via ferry boats once again to tour...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.