recommended reading

author archives

Rebecca Carroll

Senior Correspondent

Before joining Government Executive’s editing team, Rebecca Carroll wrote and edited for The Associated Press in Washington, New York and Bangkok, and for National Geographic News. She also was a Peace Corps volunteer in China, where she returned to study at the Johns Hopkins-Nanjing University Center. She holds a bachelor’s degree from the University of Pennsylvania, with a double major in English and Philosophy.

Results 1-10 of 133

from govexec

Around Government

November 11, 2014 The Disease Detectives CDC’s intelligence officers were on the case even before the Ebola outbreak made headlines. By Susan Fourney Imagine having a job and not knowing where your next commute will take you or what will be expected of you when you get there, and if the work doesn’t...

Pentagon Casts Wider Net to Avert the Next Ebola Before It Arrives

November 6, 2014 The Pentagon is looking for organizations that have never done business with the government to weigh in with biological technology solutions to tomorrow's problems -- including Ebola and whatever infectious disease threat comes next. In an effort to expand the pool of applicants for research funds, the Defense Advanced Research...

Why Did This Federal Lab Pay 42 Different Prices for the Same Computer?

November 5, 2014 The Energy Department could save $2 million a year by better managing its information technology hardware, according to the agency’s inspector general. One of the problems uncovered by the watchdog is a wide variation in the prices the department pays for the same technology across and even within agencies. The...

An Outdoorsy Plea for Open Federal Campsite Data

November 3, 2014 Data covering federal camping sites is only a small part of an enormous contract the Forest Service is putting together for management of its website. But that data is top of mind for Hipcamp, a campground search engine that pulls information about sites from publicly available data. Hipcamp founder...

White House Challenge: Make Our First 3-D Printed Christmas Ornament

October 30, 2014 A White House competition for the best 3-D printed holiday ornaments launched Thursday. And it’s not even Halloween. Apparently there are currently no 3-D printed ornaments in the White House collection, so yours could be the first. You don’t need your own 3-D printer. Just send in your design (try...

Republicans Target Tech Official to Link Obama to Woes

October 28, 2014 House Republicans have formally subpoenaed the former federal chief technology officer, the latest step in a continued effort to link the White House directly to alleged security holes in the Obamacare website. Arguing that former U.S. Chief Technology Officer Todd Park misled Congress when he said last year that he...

Anyone Ever Done This Before? Patent Office Turns to Crowdsourcing

October 27, 2014 The U.S. Patent and Trademark Office wants advice on the best way for experts in industry and academia to help application examiners determine if inventions are truly novel. Specifically, the agency is seeking suggestions on how to structure a procurement strategy from companies that are “capable of electronically receiving and...

More Federal Employees Are Teleworking More Often

October 24, 2014 The number of federal employees who telework is up slightly this year, according to a major survey released Friday. Feds who reported they telework three or more days a week (4 percent), those teleworking one to two days a week (10 percent) and those who telework only rarely (11 percent)...

How the Government Spent $103 Billion in Just 2 Months

October 22, 2014 Nearly 40 percent of publicly disclosed fiscal 2014 federal contracts were awarded in October 2013 or September 2014 -- the first and last months of the fiscal year -- according to an analysis posted Wednesday. Awards in these two months alone had a value of $103 billion, or 38 percent...

IRS Agrees It Wastes Money on Software -- But Not That Much

October 21, 2014 The Internal Revenue Service concedes its mismanagement of software licences has wasted millions of dollars, but the agency takes issue with just how many millions auditors claim have already been needlessly spent. Last year, the IRS’ software habits got dinged by examiners who suggested the agency needed a system to...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.