recommended reading

special report

Raising the Bar in Sustainability

As the nation's largest landlord, fleet operator, and purchaser of goods and services, the federal government has the opportunity, if not the responsibility, to lead by example in moving the country in a more sustainable direction. Recent technological developments have created new energy saving opportunities in the areas of smart buildings, smart transportation, and travel substitution. Additional opportunities exist related to mobility and collaboration tools. Stephen Seidel and Jason Ye at the Center for Climate and Energy Solutions conducted the following case studies to explore how agencies are using information and communications technologies to spur significant reductions in energy consumption and greenhouse gasses.


Smarter Printing Could Cut Costs, Energy Use in Half

May 16, 2013 Agencies spend $2 billion a year on printing, only to throw away much of what they print the same day.

Service members fix lights atop a hangar at Coast Guard Station Borinquen in Puerto Rico.

How One Agency Juggles Rising Energy Bills With Shrinking Budgets

May 10, 2013 The Coast Guard is using innovative financing to upgrade facilities.

GSA and Defense Move Energy-Saving Innovations Off the Drawing Board

April 30, 2013 By flexing their buying power, they’re cutting both consumption and costs.

How the Smithsonian Cut Fleet Oil Consumption by 44 Percent

April 24, 2013 The institution’s 1,500 vehicles are used for law enforcement, bus service, animal transport and more.

How to Save $1 Million Annually for Every 7,500 Email Users

April 16, 2013 Agencies are cutting energy consumption through cloud computing and data center consolidation.

An aerial view of t, ... ]

Pentagon Uses Online Tools to Enhance Collaboration and Cut Travel Costs

April 9, 2013 The number of registered users has jumped 700 percent to over 700,000 users.

An aerial photograph of the Sustainability Base at NASA's Ames Research Center,

NASA Establishes a Sustainability Base on Earth

April 2, 2013 The Ames Research Center facility serves as a living laboratory for advancements in intelligent energy systems.

Redesigning the Federal Workspace for the 21st Century

March 26, 2013 GSA is testing a flexible office layout that embraces mobility and collaboration tools.

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.