Results 531-540 of 614

Northrop Grumman makes unsolicited bid for TRW Inc.

February 22, 2002 Defense contracting giant Northrop Grumman announced Friday it is making a $5.9 billion unsolicited bid for rival systems integration firm TRW Inc. of Cleveland, according to a prepared statement by Chairman and Chief Executive Officer Kent Kresa. The Los Angeles-based company hopes to continue a streak of major acquisitions it...

Controversy embroils award of Defense network contract

February 20, 2002 As five major telecommunications companies wait to hear which firm has won a prized Defense Department contract to improve a research network used by scientists across the country, confusion surrounds the government's handling of the bidding process. Last July, the Defense Information Systems Agency (DISA) awarded work on the Defense...

Airport security agency seeks bids for explosive detection machines

February 12, 2002 The Transportation Security Administration is looking for a company to oversee the implementation of more than 1,700 explosive detection machines at every U.S. airport, according to a notice issued by the Transportation Department Tuesday. The move signals the start of an accelerated competition that will pit some of the largest...

Tech Insider: A global government crossing

February 11, 2002 "Tech Insider" appears occasionally on, looking at how business gets done in the federal technology market. Learn from the inside players in government and industry how deals are made. The ripples of one of the largest bankruptcies in U.S. history are spreading through the federal government as Global Crossing,...

President calls for major technology spending increase

February 1, 2002 President Bush will ask for a 15.5 percent increase in spending for information technology in his fiscal 2003 budget, the biggest such increase in at least five years, according to Mark Forman, associate director for information technology and e-government at the Office of Management and Budget. Forman briefed reporters Friday...

Tech Insider: The homeland security market boom

February 1, 2002 A new column from Government Executive, "Tech Insider" looks at how business gets done in the federal technology market. Learn from the inside players in government and industry how deals are made. Players big and small in the federal technology game have their knives out and are carving up a...

Disrupt and Dismantle

February 1, 2002 Marcy Forman and the government's top financial crimes investigators take on terrorists by focusing on their funding sources. hortly after midnight on a December night in Washington, a taxicab makes its way north on Connecticut Avenue, a major thoroughfare. The driver, a native of India, laments how slow business has...

Contract’s future uncertain as Global Crossing declares bankruptcy

January 31, 2002 A contract to upgrade the Defense Department's high-speed research network is in limbo--some say because one of the contract's primary bidders has declared bankruptcy. The Defense Information Systems Agency had planned to announce last Friday an award for upgrades to the Defense Research and Engineering Network (DREN), a fiber-optic network...

GSA’s online auction site celebrates first birthday

January 23, 2002 The General Services Administration's online auction site, GSAAuctions, turned one year old last week. The site has sold more than $17.6 million in federal assets in nearly 11,000 auctions of items ranging from office furniture and clothing to a 1979 Bentley Rolls-Royce and a Coast Guard cutter, according to GSA...

Acquisition management takes shape at Defense Logistics Agency

January 22, 2002 The Defense Logistics Agency, which manages millions of supply transactions each year, has failed to meet key criteria for effective acquisition of software used to manage one of its main acquisition programs. But the agency has passed muster by the same criteria in a larger and newer program, according to...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.