Digital Government

A Pattern of Better Health Care

The potential of health IT to improve patients' outcomes is undermined by information systems that "are not designed to collect data to support quality improvement as the primary purpose," says a report released this week by the Agency for Healthcare Research and Quality.

Ideas

Agencies Struggle To Count Secrets

In the past, many agencies undercounted the amount of information they classified each year because departments did not include classification decisions made while communicating online. The fact that most agencies underreported the secrets they created last year may lead one to assume that number of secrets generated this year would go up. But the opposite happened.

Ideas

So Much for a Recession Dividend

One of the few -- and I mean few -- positives that occurred during the recession was a predicted <a href=http://wiredworkplace.nextgov.com/2010/03/silicon_valley_losing_its_luster.php>shift of tech talent</a> from the private to the more stable public sector, where it is difficult to bring in top talent. It didn't last long. <a href=http://online.wsj.com/article/SB10001424052702304628704575186362957042220.html?mod=WSJ_hpp_LEFTWhatsNewsCollection>From <em>The Wall Street Journal</em> on Thursday</a>:

Digital Government

Workers' View of Security? It's Scarier

When it comes to cybersecurity, lower level government employees are far more worried about the porous nature of federal networks than their top executives, according to a survey released this week. And the differences are stark and wide ranging.

Digital Government

Upcoming FCW Feature

Update on topic and writer for upcoming FCW feature.

Digital Government

Weighing the worth of Twitter

Given the recent news from the Library of Congress, blogger Brian Robinson wonders how Twitter rates in the worthiness spectrum of information.

Cybersecurity

Most Dangerous -- Browser Hooking

Browser hooking -- the next attack vector on Ed Skoudis's <a href="http://cybersecurityreport.nextgov.com/2010/03/most_dangerous_attacks_-_day_1.php">most dangerous list</a> -- is stealthy, damaging and found all over the place.

Cybersecurity

Cyber Command nominee lays out rules of engagement

The nominee to head the Defense Department's new Cyber Command outlines how the command could respond to different cyberattack scenarios.

Digital Government

House members seek parity for behavioral health electronic records

Lawmakers offer legislation to help mental health professionals buy health IT systems.

Cybersecurity

TSA contractors performed government-only work, IG concludes

TSA allowed contractors to review invoices for other contractors in apparent violation of the Federal Acquisition Regulation, according to a new report from the Homeland Security Department inspector general's office.

Modernization

Obama names his pick for U.S. public printer

The public printer leads the Government Printing Office, which has moved to its Federal Digital System to send out information.

Digital Government

Tech sector in hiring drive

Wall Street Journal

Modernization

Consultants: Government is thirsty for foreign tech expertise

One caveat is small businesses based overseas must set up U.S. branches to qualify for such perks as set-aside contracts.