recommended reading

What Politicians Don't Tell You About Federal Employees

Anyone worried about government’s ability to attract the top tier talent needed to address a host of pressing national challenges should spend some time with the Nextgov Bold Award finalists. The 19 individuals and teams selected from a pool of nearly 200 nominations exemplify the kind of creative problem-solving, technical acumen, ambition and persistence we frequently hear about in the private sector but too seldom learn about in government.

These are men and women who saw a better way to do something and then did it, drawing on the power of technology to do so—in some cases on their own time, with little or no additional funding. They took on difficult technical challenges and, in some cases, their own bureaucracies because they knew there was a more effective way to care for severely injured veterans, deliver humanitarian aid, safeguard nuclear weapons, warn people about deadly storms and protect endangered species.

Their efforts have made air travel safer, helped diplomats operate more effectively overseas and transformed information sharing at the highest levels of government. They have improved our national security as well as our national standing. They’ve also cut waste and saved taxpayers millions of dollars.   

One of our goals in establishing the Bold Awards was to draw attention to some of the exceptional and mostly unsung technology innovation civil servants are pursuing on behalf of citizens. We’re pleased to be honoring their service at Nextgov Prime, our annual technology conference Oct. 15-16 in Washington, and we hope you'll join us there. The Bold finalists are making government work more efficiently and effectively, and that’s worth celebrating.    

Read more about them in the slideshow below:

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.