Results 511-520 of 614


May 1, 2002 Everyone wants a piece of the action in the supercharged federal technology market. f you've thumbed through the business section of a Washington-area newspaper or trade publication in the past eight months, you've no doubt noticed a plethora of ads for seminars, conferences, symposia and breakfast chitchats about how technology...

AT&T becomes third firm to protest Defense network contract

April 23, 2002 AT&T became the third telecommunications company to file a protest Monday against the Defense Information Systems Agency for awarding a controversial and highly prized $450 million fiber optic network contract to WorldCom. The Defense Research and Engineering Network, known as DREN, a high-speed network for more than 5,000 scientists at...

White House cyber czar describes next phase of Internet plan

April 17, 2002 ORLANDO, Fla.-Speaking before a conference of hundreds of federal technology personnel and industry officials Wednesday morning, Richard Clarke, President Bush's point man on national cybersecurity, outlined the next phase in the controversial plan to build an impenetrable information network for the federal government, known as Govnet. Clarke said a team...

Tech Insider: Perception and reality at GSA

April 15, 2002 "Mamma Mia!," a staged tribute to the songs of 1970s pop group Abba, is wowing the crowds at Washington's National Theatre. But last Thursday morning, if you'd walked a few blocks from the ticket booth to Capitol Hill, you'd have been treated to another great piece of theater from a...

GSA lacks hard data on inter-agency competition

April 11, 2002 The General Services Administration has little evidence that its two main business lines compete with one another in an unhealthy way, GSA Administrator Stephen Perry told the House Government Reform Subcommittee on Technology and Procurement Policy Thursday. Perry said his agency has hired a private consultant to address widespread but...

Defense awards controversial telecommunications contract

April 5, 2002 Nine months after the Defense Department rescinded a high-profile fiber optic network contract awarded to now-bankrupt telecommunications firm Global Crossing, the department announced Thursday that telecom giant WorldCom has been awarded the work, which is valued at up to $450 million. The contract, known as the Defense Research and Engineering...

Tech Insider: Securing the cyber front

April 2, 2002 Last year's spate of hacker attacks, viruses and worms shed light on the nation's poor state of information security--and the government's inability to shore it up. After Sept. 11, the state of the country's cyber security seemed even more vulnerable to an even wider range of threats, and the White...

The Titans

April 1, 2002 In the high-stakes federal technology market, systems integrators rule the world. fter six years in England, it was time for Donald Brown to come home. The vice president of strategic information technology consulting for Computer Sciences Corp., a systems integration firm headquartered in El Segundo, Calif., Brown had pulled a...

Tech Insider: TSA gets moving with baggage screening

March 26, 2002 After weeks of delays and infighting, the government has taken a major step toward screening all the luggage of airline passengers by the end of the year. Sources close to the Transportation Security Administration, the agency charged with ensuring airport security, and officials in private industry told Government Executive Tuesday...

Global Crossing had 'inside track' on Defense contract, CEO says

March 21, 2002 Bankrupt telecommunications company Global Crossing had an "inside track" in its bid for a lucrative contract to run a high-speed network for the Defense Department, company Chief Executive Officer John Legere told Government Executive Thursday. Speaking after his testimony before the House Financial Services Subcommittee on Oversight and Investigations, Legere...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.