Why Do We Sometimes Insulate Ourselves from the Truth?

twitterlinkedin
finding the truth

It’s an interesting phenomenon we observe during this election season, the adoration of a candidate or perhaps unrelenting allegiance regardless of their position or their truthfulness on an issue. We watch as one candidate attacks the other with untrue or incredibly stretched statements. They want so desperately to win they are willing to diminish their honor. For some voters, they are so desperate to experience a candidate they are willing to overlook reality. Read More


10 Ways to Capitalize on Transparency’s Potential

twitterlinkedin

Since President Obama signed the Digital Accountability and Transparency Act in May 2014, federal agencies have been hard at work implementing data standards and establishing a framework for increasing financial transparency by May 2017. The Office of Management and Budget and the Treasury Department are leading the effort.

The DATA Act requires two things. First, agencies must standardize information they report about their finances, grants and contracts, using common fields and formats established by OMB and Treasury. Second, once all the spending data has been standardized, Treasury and OMB will publish it on a much-expanded version of the USASpending.gov website. Meanwhile, a pilot program is under development to test whether the same standards should be applied to the information nonfederal grantees and contractors must report. Read More


9 Key Steps to Cyber-Preparation

twitterlinkedin

We are dealing with a systemic crisis—critical government information is being hacked and falling into the hands of "evil doers," and there appears to be no end in sight.

Hardly a week goes by when we don't hear of some attack. Lately we've been hearing a lot about identity theft of Personal Identifiable Information (PII) which can harm individuals, as well as our national security. While that is certainly cause for concern, the threat can go far beyond intelligence leaks, industrial espionage, or personal financial impact. Imagine a world where hackers take control of airplanes and automobiles, alter medication dosages, interfere with the ability of first responders, take control of our C3 systems, or shut down our electrical grid. Read More