Results 841-850 of 856

House panel modifies restrictions on women in combat

May 18, 2005 The House Armed Services Committee passed a measure Wednesday night that would lessen restrictions placed on female soldiers' combat roles during a subcommittee markup last week. Armed Services Chairman Duncan Hunter, R-Calif., and Personnel Subcommittee Chairman John McHugh, R-N.Y., last week pushed forward the original provision, which would have barred...

Air Force might keep bases open after personnel moves

May 17, 2005 Members of the Defense Base Closure and Realignment Commission aired concerns Tuesday that Pentagon recommendations to keep open drastically stripped-down Air Force bases could devastate local economies. If the military does not technically shutter the facilities, the bases would be a "drain on host communities," blocking them from redeveloping the...

BRAC commissioners worry about retention in guard, reserves

May 17, 2005 Members of the Base Realignment and Closure Commission questioned Pentagon leaders Monday about their recommendation to consolidate National Guard and Reserve bases around the country, stating that such a move might exacerbate the force's recruitment and retention problems. The decision, made as part of the 2005 base closure and realignment...

Familiar names show up on Army's closure list

May 13, 2005 The Pentagon base closure list issued Friday shows a shuffling of many Army warfighting centers, dramatically changing the makeup of some of the service's oldest and best-known bases. The armor center at Fort Knox, Ky., will move to Fort Benning, Ga., home of Army infantry, to create a maneuver warfighting...

House panel cuts authorization for Pentagon's IT programs

May 11, 2005 The House Armed Services Terrorism Subcommittee approved its portion of the fiscal 2006 defense authorization bill Wednesday, pushing forward a proposal that cuts the Pentagon's information technology authorization by about $250 million. This marks the third year the panel has reduced IT accounts, though it is a far smaller decrease...

Rumsfeld expected to restore funding for cargo aircraft

May 11, 2005 Defense Secretary Donald Rumsfeld is expected to restore full funding for the Air Force's C-130J multiyear procurement contract, although the Department Department will not try to do so in the fiscal 2006 budget. Although the Pentagon had proposed terminating the C-130J multiyear in its fiscal 2006 budget request, in a...

Study urges Pentagon cuts as authorization work begins

May 10, 2005 As House and Senate authorizers meet this week to mark up the fiscal 2006 defense authorization bill, two Washington think tanks are advocating $53 billion in cuts in top weapons systems. The bulk of that money -- $40.5 billion -- should be transferred to Homeland Security, nonproliferation and foreign aid...

House Armed Services chair will not push increase in troop size

May 10, 2005 In light of lagging military recruitment numbers, House Armed Services Committee Chairman Duncan Hunter, R-Calif., does not plan to use the fiscal 2006 defense authorization bill to further increase the size of the military. Hunter supported a bipartisan move to authorize an additional 30,000 soldiers and 9,000 Marines in last...

Authorizers look to shield shipbuilding programs

May 9, 2005 Lawmakers on both sides of the aisle are lining up to save the military's shipbuilding programs, which promise to be central to budget negotiations when House and Senate authorizers meet to mark up the fiscal 2006 defense authorization bill. With members of both parties concerned about the details of the...

Lawmaker warns on using authorization to delay base closings

May 5, 2005 A senior Republican on the House Armed Services Readiness Subcommittee said Thursday that attempts to use the defense authorization bill to delay or cancel the 2005 round of base closings could ultimately burden military installations around the country. Rep. John Hostettler, R-Ind., has supported failed efforts in previous bills to...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.