Badges are currently disabled due to an ongoing migration. All activity is being tracked and will be rewarded once the migration is complete
Memberships [ 1 ] [+]
Activity Stream [+]
Ideas Contributed [ 5 ] [+]
This "Model" would transfer Interactive Data normally seen on spread sheets into a system which would then demonstrate that information's relationship to its' counterparts. The design would allow the user to take a Macro Category like the American Automobile Industry or National Highway Construction Projects and present them interfacing with their Infra-Structure. This creates the ability to pinpoint affected Mid-Sized ...more »
A Certificate of Appreciation from the White House and NAPA entitled "Obama Knights".
Recognizing those who participated in this worthwhile program by sharing their Ideas, Discussion Time, and Research Efforts whereby their concept(s) were adopted.
Speaking from experience as a former U.S.A.F. Civil Servant performing duties as a WG-9 Jet Engine Technician, then as a GS 5-10 Material Inventory Control Specialist, and as a Division Leader of the U.S.A.F. QP 4 Program - that the current methods of defining related costs of maintaning Weapon Systems is inaccurate and outdated. Example: The recycling of used parts into the rebuilding process includes the purchase price ...more »
When discussing new methods on increasing "Government Transparency" it will be more beneficial to flowchart the existing operations under consideration from both the Macro and Micro point of view. This comparison technique opens the door to items of interest and importance which - if reviewed by only one of the two aspects - may be overlooked. Secondly - it demonstrates where there may be a "Troubled Intersection" that ...more »
Suggestion: The "Mindmap" and the "Five Transparency Themes" discussions include an accompanying failsafe measure. This "Devils' Advocate" program could operate with similar parameters as the F.B.I. "Flagging" system. History shows that if such a system is not in place at the start of a new program then once completed the new program will have exploitable vulnerabilities. While flow charting the "Mindmap" perhaps we ...more »