AUTHOR ARCHIVES

Results 531-540 of 614

Northrop Grumman makes unsolicited bid for TRW Inc.

February 22, 2002 Defense contracting giant Northrop Grumman announced Friday it is making a $5.9 billion unsolicited bid for rival systems integration firm TRW Inc. of Cleveland, according to a prepared statement by Chairman and Chief Executive Officer Kent Kresa. The Los Angeles-based company hopes to continue a streak of major acquisitions it...

Controversy embroils award of Defense network contract

February 20, 2002 As five major telecommunications companies wait to hear which firm has won a prized Defense Department contract to improve a research network used by scientists across the country, confusion surrounds the government's handling of the bidding process. Last July, the Defense Information Systems Agency (DISA) awarded work on the Defense...

Airport security agency seeks bids for explosive detection machines

February 12, 2002 The Transportation Security Administration is looking for a company to oversee the implementation of more than 1,700 explosive detection machines at every U.S. airport, according to a notice issued by the Transportation Department Tuesday. The move signals the start of an accelerated competition that will pit some of the largest...

Tech Insider: A global government crossing

February 11, 2002 "Tech Insider" appears occasionally on GovExec.com, looking at how business gets done in the federal technology market. Learn from the inside players in government and industry how deals are made. The ripples of one of the largest bankruptcies in U.S. history are spreading through the federal government as Global Crossing,...

President calls for major technology spending increase

February 1, 2002 President Bush will ask for a 15.5 percent increase in spending for information technology in his fiscal 2003 budget, the biggest such increase in at least five years, according to Mark Forman, associate director for information technology and e-government at the Office of Management and Budget. Forman briefed reporters Friday...

Tech Insider: The homeland security market boom

February 1, 2002 A new column from Government Executive, "Tech Insider" looks at how business gets done in the federal technology market. Learn from the inside players in government and industry how deals are made. Players big and small in the federal technology game have their knives out and are carving up a...

Disrupt and Dismantle

February 1, 2002 Marcy Forman and the government's top financial crimes investigators take on terrorists by focusing on their funding sources. hortly after midnight on a December night in Washington, a taxicab makes its way north on Connecticut Avenue, a major thoroughfare. The driver, a native of India, laments how slow business has...

Contract’s future uncertain as Global Crossing declares bankruptcy

January 31, 2002 A contract to upgrade the Defense Department's high-speed research network is in limbo--some say because one of the contract's primary bidders has declared bankruptcy. The Defense Information Systems Agency had planned to announce last Friday an award for upgrades to the Defense Research and Engineering Network (DREN), a fiber-optic network...

GSA’s online auction site celebrates first birthday

January 23, 2002 The General Services Administration's online auction site, GSAAuctions, turned one year old last week. The site has sold more than $17.6 million in federal assets in nearly 11,000 auctions of items ranging from office furniture and clothing to a 1979 Bentley Rolls-Royce and a Coast Guard cutter, according to GSA...

Acquisition management takes shape at Defense Logistics Agency

January 22, 2002 The Defense Logistics Agency, which manages millions of supply transactions each year, has failed to meet key criteria for effective acquisition of software used to manage one of its main acquisition programs. But the agency has passed muster by the same criteria in a larger and newer program, according to...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.