AUTHOR ARCHIVES

Results 1-10 of 11

In Focus: Who Faces Furloughs?

October 1, 2013 During a government shutdown, federal agencies decide which employees to furlough and which to keep on the job. Excepted employees include workers “who are performing emergency work involving the safety of human life or the protection of property or performing certain other types of excepted work,” according to furlough guidance...

In Focus: How Many Employees Face Furloughs?

September 27, 2013 Federal agencies decide which employees to furlough and which to keep on the job during a government shutdown. Excepted employees include workers “who are performing emergency work involving the safety of human life or the protection of property or performing certain other types of excepted work,” according to furlough guidance...

Timeline: Federal Employees Under Attack

September 19, 2013 Monday’s shooting at the Washington Navy Yard serves as a sad reminder that federal employees -- even civilians in seemingly secure facilities -- are too often targets of unexpected violence. The latest tragedy, which was the “single worst loss of life in the District since an airliner plunged into the...

Retiring Military Dogs Helped Locate Explosives, Deter Terrorist Attacks

July 5, 2013 Four retiring military dogs were recently honored for their distinguished careers overseas. At a late-June event at Tinker Air Force Base in Oklahoma City, Okla., the dogs’ handlers ceremoniously “passed the leash” to the canines’ new retirement caretakers, according to Stars and Stripes. The dogs primarily served to track and...

Americans: Furloughs Were So Last Month

May 31, 2013 FROM NEXTGOV arrow Are people no longer looking for furlough information? That’s one of the conclusions that could be drawn based on trends in Google search data. While the mandatory unpaid days of leave are causing hardship for thousands of federal workers, data from the millions of searches conducted on Google’s servers reveal...

Timeline: Crowdsourcing Law Enforcement

April 19, 2013 FROM NEXTGOV arrow Crowdsourced photos and videos from the Boston Marathon finish line appear to have played an important role in identifying Dzhokhar and Tamerlan Tsarnaev, Chechen-born brothers suspected of planting bombs that killed three and left more than 150 wounded. Tamerlan was killed in a shootout with police Friday and Dzhokhar has...

In Focus: Funding Defense

April 18, 2013 The national defense base budget has outweighed non-defense spending for much of the past three decades, according to data compiled by the Congressional Research Service. In constant dollars, defense base budget authority in 1977 was lower than non-defense -- $340.6 billion versus $421.1 billion. In 2012, national defense spending was...

Budget Winners and Losers

April 10, 2013 While federal deficit reduction and sequestration have dominated the national conversation during the past year, not all agencies would see spending cuts under President Obama’s fiscal 2014 budget proposal. Eight departments and major agencies would see increases in discretionary funding under the president’s plan. The State and Commerce departments would...

In Focus: Where the Federal Workforce Counts

April 2, 2013 As agencies scramble to determine which employees might be subject to furlough and for how long, states are bracing for the economic fallout from sequestration. Government’s budget crunch sometimes is viewed as solely a Washington problem, but its impact also will be felt disproportionately in other parts of the country...

Timeline: The March Into Combat

February 27, 2013 As Pentagon leaders figure out how to integrate female service members into direct ground combat units, they have more than 200 years of precedent to fall back on. Women have been on the battlefield since the American Revolution, albeit surreptitiously at times. Before World War II, most of them were...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.