Waldo in the Light of Austerity and Federal Debt Crisis, Part 2

“This is Part 2 of a 2 part series. Read Part 1 by clicking the link in the Related Articles box below this article. Jan Kallberg Waldo’s predictions about the future for public administration describe five areas that would be problematic in the future: legitimacy, authority, knowledge, control, and confidence. Legitimacy includes not only thatRead… Read more »

New: Bulk Access to XML Version of Michigan Compiled Laws, by Michael Bommarito

Michael J. Bommarito II of Systematic Global Macro and Computational Legal Studies has posted an XML version of Michigan Compiled Laws — the official codification of Michigan legislation — for bulk download. According to his post, Mr. Bommarito also “improved the underlying data [of the code] by adding tags and correcting indentation as best asRead… Read more »

Kansas rejects $31.5m federal grant for health insurance exchange

Kansas Governor Sam Brownback is rejecting a $31.5 million federal grant intended to support his state’s implementation of federal health care reform requirements. In an announcement Tuesday, the Governor cited the federal deficit as his reason for rejecting money the state applied for just last December. The money was supposed to support integration of stateRead… Read more »

Your Taxpayer Dollar$ at Work: Volume II

Last year I started a series to highlight outrageous cases of waste, fraud, and abuse by the federal government. In the current environment of complete political theatre and legislative dysfunction leading to budget crises, debt ceilings, and continuous resolutions, I can probably write a book with so much material. However, I wanted to focus onRead… Read more »

Social Networks New Territory for Terrorism- By Joshua Jacobs

This shouldn’t be considered a new idea or story by any stretch of the imagination but social networking sites like Facebook, Twitter and the newly launched Google+ are becoming increasingly popular frontiers for terrorist organizations. Classic cyberterrorism has always been associated with the large-scale disruption of computer networks and certain targeted websites being affected byRead… Read more »

Editing Social Media

In snail mail times, published exposure was expensive and constrained. “Editing” was selecting the best offering and making sure it was centered on message. With social media, exposure is easy and infinite. “Editing” is delivering everything that might be interesting to your audience as quickly as possible. Underestimating audience interest is one of today’s mostRead… Read more »

To rebid, or not to rebid: that is the question

Deltek Analyst Evan Halperin reports. Last week, the Virginia Information Technology Agency (VITA) issued a solicitation for its statewide two-way radio requirement. The solicitation was a re-compete of a contract that inked in 2006 and is set to expire this year. VITA awarded contracts to six vendors from the previous solicitation and had been planningRead… Read more »