AUTHOR ARCHIVES

William Matthews

Results 21-30 of 79

Nearly a decade behind schedule, new satellite is to provide earlier missile-launch warning

April 26, 2011 FROM NEXTGOV arrow Nine years late, the Air Force is finally ready to launch a new missile-spotting satellite that it says will usher in "a new era in persistent infrared surveillance." Barring further delays, the first of four Space-Based Infrared System satellites will blast off May 6 and climb to an altitude of...

New tools calculate your tax dollars at work

April 25, 2011 FROM NEXTGOV arrow The moment is probably still etched in your mind. After hours of reading, factoring and figuring, you filed your 2010 tax return. Ever wonder how all that money is being spent? There are several new ways to find out. The White House has created a website called Your 2010 Federal...

From Nextgov.com: New tools calculate your tax dollars at work

April 25, 2011 The White House has created a website called Your 2010 Federal Taxpayer Receipt. Taxpayers can enter the taxes paid, and "for the first time ever" they can "see exactly how their federal tax dollars are spent," the website says. Read the whole story on Nextgov.com.

Malware and other cyber threats, many of which are state sponsored, are growing

April 20, 2011 FROM NEXTGOV arrow The wild, wild Web grows ever wilder, and U.S. companies and critical infrastructure remain vulnerable targets, executives from cybersecurity giant McAfee warned Wednesday. Sixty million malware programs are written annually now, up from 3 million in 2007, McAfee president Dave DeWalt told a conference that included government information technology specialists....

Lawmaker seeks to soften budget blow to transparency websites

April 19, 2011 FROM NEXTGOV arrow Government transparency websites were badly wounded in the battle over the 2011 federal budget, but it looks like at least some will survive. Spending for sites such as USASpending.gov, Data.gov and the IT Dashboard was cut from $34 million to $8 million, but there are signs that a fiscal transfusion...

Consumer product website dodges GOP budget ax

April 18, 2011 FROM NEXTGOV arrow Four days after St. Patrick's Day, the battery in a St. Patrick's light-up necklace burst into flames in a house in Wisconsin, burning a kitchen table and causing smoke damage to the home, a buyer reported to the Consumer Products Safety Commission. Soon, a warning about the combustible cosmetic jewelry...

Transparency websites hit by budget ax

April 12, 2011 FROM NEXTGOV arrow Government transparency websites likely will be scaled back or even eliminated as a result of a 75 percent budget cut that congressional leaders and the White House agreed to last week. The proposed $35 million Electronic Government Fund was slashed to $8 million in the deal struck late last Friday...

Transparency websites hit by budget ax

April 12, 2011 Government transparency websites likely will be scaled back or even eliminated as a result of a 75 percent budget cut that congressional leaders and the White House agreed to last week. The $34 million Electronic Government Fund was slashed to $8 million in the deal struck late last Friday to...

Agencies scramble to define critical functions as shutdown looms

April 8, 2011 FROM NEXTGOV arrow This story has been updated With just hours left before the federal government runs out of money, departments began posting plans for shutting themselves down until Congress passes a new 2011 funding plan. The White House Office of Management and Budget warned employees not to use BlackBerrys, laptop computers and...

From Nextgov: Agencies scamble to define critical functions

April 8, 2011 With just hours left before the federal government runs out of money, departments began posting plans for shutting themselves down until Congress passes a new 2011 funding plan. Read the full story on Nextgov.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.