Tech blogs on call10 places to track the buzz in the blogosphere
EVM sounds the alarmSmart agencies let earned value management lead them to better program management
Tax tech pays dividendsFinancial benefits and an improved public image accrue to states that modernize their tax systems
FAA takes an unusual route to spur innovation
Agency may use a rare procurement method in the hopes of attracting interested vendors
Interoperability still plagues DHS
FOSE puts a spotlight on technology
Comings and Goings
Editorial: Is GSA worth saving?This is the time for a larger conversation about the agency's role in procurement.
Welles: Financial planning can’t wait
Thompson: A time to share
Feds roiled by workforce changes
Experts warn against changing pay rules before feds improve management skills
IT essential to Army officer training
GAO finds gaps in secure credentialing
Identity management requires card smarts
Building the brains behind mandatory ID card programs won’t be easy
Encrypt data or encrypt disk? You decide
Alliant companies ready to sound off
GSA is going to get an earful from midsize businesses about planned IT services contract
Integrators tackle interoperability
Mirror Image takes on Akamai
Reverse auctions losing bid for broad use
Bush budget seeks cuts in EPA library network
Librarians say the proposal endangers scientists’ access to environmental articles
CIOs lose sleep over security
Minn. governor offers data privacy proposals
PCAST panel ready to roll
Risk management critical for FISMA success
I’ll take my astro-shirt in an XL
E-Mail this page
Nominations are now open for the 2015 Federal 100 awards. Get the details and submit your picks!
Make a nomination today
Slowly but surely, the agency's ability to handle cybersecurity has evolved -- but experts say key hurdles remain.
Department credits a fully deployed computer system with helping make a sizable dent in the department’s disability claims backlog.
A key contributor to Clinger-Cohen argues that federal IT has failed to take advantage of the tools that law provided.
A new report surveys the many different approaches to launching a dedicated innovation shop in government.
Nominations for 2015 are being accepted now through Dec. 23.
The flip side of default data encryption on mobile devices is that a lost or stolen device won't yield up its secrets -- an important feature for many federal employees.
A decade after the 9/11 Commission identified agencies' reluctance to share information as a dangerous shortcoming, the government is moving in the right direction.
The latest offering is intended to help agencies speed the process of deploying authorized cloud solutions.
Cartoonist John Klossner on the telltale indicators that not everything is running through the CIO.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com