AUTHOR ARCHIVES

National Journal

Results 1-10 of 92

Congress Will Race This Week to Avoid a Shutdown

December 7, 2015 Tis the sea­son—not for the hol­i­days, though those are here too, but for Con­gress to scramble to fin­ish a hand­ful of big-tick­et items be­fore head­ing home for the year. So this week will find the two cham­bers ra­cing to agree on an om­ni­bus spend­ing bill be­fore Fri­day’s fund­ing dead­line, and...

What the US Should Do About ISIS Now

June 15, 2015 The past few years have seen the official conclusions of the U.S. wars in Iraq and Afghanistan. But the United States had no time to breathe a collective sigh of relief before the rapid advances of ISIS (the Islamic State in Iraq and Syria) were presenting us with another political,...

2015’s Policy Battles: Obamacare, Net Neutrality, Keystone, and Surveillance Reform

December 29, 2014 The status quo has shifted, but has it shifted enough to break the gridlock that has gripped Washington for the past four years? Those bullish on "grand bargains" and "comprehensive reforms" see pieces in place. With Mitch McConnell replacing Harry Reid at the helm of the Senate, the "House passes...

Year in Review: Obama Holds End of 2014 News Conference

December 19, 2014 Last year, President Obama's end of year press conference began with a sharp question: "Was this the worst year of your presidency?" One year later, at his presser before departing for Hawaii, Obama shouldn't have expected much better. It's been a taxing political year for the president. His party lost...

The Government Has Shut Down

October 1, 2013 The federal government has shut down. Despite a month of debate and a week of frantic legislative maneuvering, Congress was unable to bridge its fundamental schism: Senate Democrats pledged not to pass any budget bill that cut into Obamacare, and Republicans promised they would reject any bill that didn’t. Neither...

Feds Make List of Most Influential Washington Women Under 35

July 12, 2013 Thousands of young women flock to Washington each year, armed with degrees in fields as diverse as political science, communications, public policy, and economics. Mostly, they come for jobs, fueled by energy and even idealism. Sometimes it takes a while for their efforts to have an impact. But not always....

Senator suggests Benghazi coverup

November 26, 2012 Sen. Jon Kyl, R-Ariz., suggested on Sunday that the administration covered up information about the terrorist attack in Libya that killed four Americans on Sept. 11. “I think there are three questions that have to be answered,” he said on CNN’s State of the Union Sunday. “Why weren't the warnings...

Tweets peaked Tuesday as Michelle recounted Obama's concern

September 5, 2012 FROM NEXTGOV arrow Michelle Obama drove the conversation surrounding the Democratic convention on Tuesday night, according to tweets-per-minute data supplied by Twitter. The microblogging company noted three significant spikes last night, all of them as Michelle Obama touted her husband's desire to help others. The first came at 10:53 p.m., with 18,669 tweets...

Commerce rejects Internet-management bids

March 13, 2012 FROM NEXTGOV arrow The U.S. Commerce Department has rejected bids to manage the Internet's address and domain systems, instead extending the contract for six months and saying it would try again. It's not clear whether the Internet Corporation for Assigned Names and Numbers, or ICANN, had submitted a bid. The group, which was...

Video: Animal-like robots could change the way the military works

March 12, 2012 FROM NEXTGOV arrow The military is developing robots, patterned after wild animals, that could help explosive-ordinance disposal teams get rid of dangerous arms more safely. The video below from the Defense Advanced Research Projects Agency shows the "Cheetah" robot galloping at speeds of up to 18 miles per hour, setting a new land-speed...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.