I arrived early for a business meeting the other day. The meeting had been scheduled well in advance and the list of participants included about a dozen team members. When the scheduled start time had arrived, there were just two of us in the room. Over the course of the next ten minutes, the other participants drifted in. Three of those who arrived late chose seats at the end of the table opposite the host. They spent the entire meeting pounding away on their laptop keyboards, looking up occasionally as if to appear engaged in the conversation at hand. Another…
Recent Articles on GovLoop
- How to Bolster Your Agency’s Identity-Based Protections
- Using Data to Engage with Constituents
- Why Agencies Need to Get Serious About Data Recovery
- Quantum-Safe Encryption: What It Means, and Why Agencies Should Care
- 4 Tips for Navigating Challenging Times
- Active Listening: What It Is & How to Do It
- March Online Training Opportunities
- Esri Public Sector CIO Summit
- Identity Protection Starts With Privileged Access Management
- Transform Agency Operations With Digital-First Services
Leave a Reply
You must be logged in to post a comment.