Results 541-550 of 614

New federal CTO lays out his strategy

January 18, 2002 The federal government's new chief technology officer laid out his plans for defining and putting in place a technology architecture for agencies in a telephone interview with journalists Friday. Norman Lorentz, the former CTO of Dice Inc., said he would focus his attention on two areas. First, he'll help agency...

OMB hires first governmentwide chief technology officer

January 14, 2002 The Bush administration has hired the first governmentwide chief technology officer, according to a spokeswoman with the Office of Management and Budget. Norman Lorentz, the former CTO of information technology industry job service Dice Inc., started working at OMB Jan.2, reporting to Mark Forman, associate director for information technology and...

What Companies Want to Protect

January 1, 2002 Home computer tips; charts that pack a punch; bygone beepers. ome computer users are especially vulnerable to viruses, worms and hackers. Such malicious activity can disable your computer and destroy irreplaceable data. Without protection, hackers can take control of your system. Worse, they can use your system to attack others....

Precious Secrets

January 1, 2002 Government contractors tighten their grip on trade secrets. n February 1997, B.E. Meyers & Co., a Washington state manufacturer of night vision equipment used by the Navy Seals, filed suit against the government. The company charged that during competition for a contract for infrared weapons sights, the Navy gave secret...

Bureaucratic Battles Bog Down Biometrics

January 1, 2002 Biometrics may be the wave of the future, but it's off to a slow start. atching Tom Cruise slowly descend by his ankles into a secure area at CIA headquarters could take anyone's breath away. But true technophiles appreciate the bits of Hollywood spectacle in the 1996 movie Mission: Impossible...

A Closer Look At Your Luggage

January 1, 2002 he Aviation and Transportation Security Act requires that all luggage checked at U.S. airports be screened by explosive-detection systems by the end of 2002. However, since only two companies make the machines airports need-InVision Technologies of Newark, Calif., and L-3 Communications of New York City-meeting that deadline will be a...

Judge lets some Interior employees back online

December 18, 2001 After enduring an Internet and e-mail blackout for nearly two weeks, some Interior Department employees could regain access to the cyber world under an order issued Tuesday by a U.S. District Court judge in Washington. On Dec. 5., the court ordered Interior to disconnect nearly all of its computers from...

Treasury task force wages financial warfare against terrorists

December 18, 2001 Since Sept. 11, investigators with a special Treasury Department task force have quickly learned how to uncover the web of bank accounts, electronic funds transfers and covert money laundering operations that fund terrorist cells. In the effort to root out al-Qaida and its ilk, the Customs Service is leading an...

Court-ordered blackout leaves Interior employees without Internet, e-mail

December 14, 2001 Interior Department employees have been working without Internet or external e-mail access for more than a week, after a U.S. District Court ordered the agency to take its computers offline. On Dec. 5, Judge Royce C. Lamberth told the department to disconnect from the Internet all "information technology systems" that...

Info tech outsourcing to double in five years, study says

December 10, 2001 As the government faces an impending shortfall of skilled technology workers, the federal technology outsourcing market will grow more than twofold over the next five years, according to a report issued Monday by IT analysis and marketing firm INPUT in Chantilly, Va. By 2006, agencies will spend $13.2 billion on...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.