Analysis

  • How to Best Meet HR-LOB Performance Management Requirements

    With the increased emphasis on managing and rewarding high performers and addressing low performers, many federal agencies are reevaluating how they handle performance management. Legacy software systems are increasingly unable to meet evolving needs, and off-the-shelf solutions used by private sector companies frequently fail to address issues specific to the Federal Government.

  • How to boost your fall immune health

    Dana Laake and her special guest Dr. Erin Stokes will discuss how to boost your fall immune health.

  • Solving the cyber puzzle – from trust to talent

    Arlette Hart, senior cybersecurity technologist at Leidos, joined Federal News Network to discuss the state of cybersecurity today and the need to recruit and retain top talent.

  • Reduce cyber complexity on the way to IT modernization

    Rick Howard, the chief security officer for Palo Alto Networks, said the wide-spread acceptance of using cloud services for operational requirements is driving opportunity to modernize.

  • Federal data priorities at NTIS: a conversation with Avi Bender

    How is the U.S. Department of Commerce’s National Technical Information Service (NTIS) helping to advance federal data priorities? How does it work with the private sector to develop new and improved data products and services? What does NTIS do to deliver value to federal agencies? Join host Michael Keegan as he explores these questions and more with Avi Bender, Director of NTIS.

  • Tumblr’s founder and CEO – October 13, 2018

    Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. We meet the founder and CEO of the blogging platform Tumblr.

  • Bionics, digital financial management opening agencies up to do more valuable work

    Demek Adams, a principal at Grant Thornton who leads the financial management practice, said agencies can jump on that bandwagon and improve not only their financial management, but their overall business processes and citizen services by making better use of the data.

  • Leading the Future: Transition and Transform with EIS. Part 1.

    The speed of technology is moving faster than ever. Yet, more than 80% of federal government IT budgets are spent on maintaining systems, with only a fraction invested in innovation.

    As Federal agencies drive to transition to the new Enterprise Infrastructure Solutions (EIS) contract, we all agree the time for modernization is now.

    In this six-part series, AT&T innovators and leaders discuss how the EIS contract can help transition and transform federal agencies to the network of tomorrow – today.

  • Methylation, epigenetics and dirty genes

    Dana Laake and her special guest Dr. Ben Lynch will discuss methylation, epigenetics and dirty genes.

  • Online safety – October 6, 2018

    Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. How to safely use the computer at your hotel’s business center. And a way to safeguard your photos for posterity.

  • Acquisition in the federal government: a conversation with FAS’ Alan Thomas

    What is FAS doing to make its operations easy, efficient and modern? How is FAS delivering best value mission support to customer agencies?

  • Leaders Speak on Collaborative Governance

    Performance management initiatives over the past two decades helped shift the conversation within and across U.S. government agencies—from a focus on measuring program activities and outputs to a focus on achieving mission outcomes. Join host Michael Keegan  for a special edition of The Business of Government Hour exploring the evolution of Performance Management in Government.

  • How to prepare for life’s changes — the importance of planning for the future

    Preparing for changes in life, both expected and unexpected, can help make any big transition smoother.

  • Executive Briefing Series: Enterprise Cybersecurity

    In this exclusive executive briefing, federal practitioners will provide insight into current federal cybersecurity strategies.