The Presidential Transition

One of the biggest obstacles to being a successful blogger is the perpetual need to generate insightful (or, failing that, any) content on a recurrent basis. Too often I find myself exclaiming, “Oh man, I haven’t posted in 2 weeks!” As this episode has recurred yet again, I’ve opted to blog about what I amRead… Read more »

Greetings From YGL-Bethesda!

Hi Everyone! I’m the house blogger and President of the Bethesda Chapter of Young Government Leaders. As part of my duties I am locked in a perpetual battle to post relevant, insightful and occasionally entertaining content to http://blog.yglbethesda.org. Apparently my struggle caught the eye of Steve, who has graciously asked me to cross post myRead… Read more »

State Gov & Social Media

A colleague in Oregon state gov – environmental agency – asked if there are success stories/best practices/lessons learned by state governments using wikis for internal KM, G2G or G2C.

GovLoop’s Bureaucrat on College Sports – Ranking the Big Ten (Eleven) Football Bowl Subdivision Teams

Did you know that the Big Ten Conference once included the University of Chicago? The Hokie Guru did not know this (and many former administration officials are alumni of this fine institution). In 1895, the original members of the Big Ten Conference included the University of Chicago, University of Illinois, University of Michigan, University ofRead… Read more »

GovLoop’s Bureaucrat on College Sports – Ranking the Big Least (er, I mean East) Football Bowl Subdivision Teams

The Big East Least Conference is the home of 5% of NCAA Division I Men’s’ Basketball teams. Yes, 16 teams make up the Big East Conference for men’s and women’s basketball. I’m sorry… wrong sport… but you can see why the Big East gets 8-9 bids to the NCAA tournament every year!! When you haveRead… Read more »

Clearances

I just set up a group on GovLoop called “Government Security Clearances” that I hope can generate interagency discussion about how we as a government grant and uphold clearances to protect sensitive information. Different agencies set different standards for information access and staff conduct and use different resources to conduct background investigations and look intoRead… Read more »