Baghdad reduced to bytes Some experts question whether the Defense Department is overreaching with a simulation of Baghdad that tries to model most human factors
IAC facebook This year’s IAC Executive Committee embodies the high-level expertise that is essential to good government and the advancement of the IT industry
Voters are caught in an e-voting quandary
Are elections officials naive about e-voting, or are critics just pushing the wrong buttons?
DOD gives Internet balloting another try
Editorial: E-voting: The need for paper Information technology has an important role to play in voting, particularly after the 2000 presidential vote and the infamous hanging chads
Guerra: Quit the monopoly talk
Flu worries create urgency for planning
Federal agencies need to account for uninfected teleworkers, experts warn
GAO urges action on clearances
Burton takes a new angle on procurement
On the road to a better security blueprint The linking of threat management and EA design could yield huge potential benefits
SpyForce-AI protects against insider threats
Business sector, states seek e-cycling solutions
Lawmakers, recyclers are closely monitoring current programs to reach uniform approach
$300M contract will test limits of 8(a) capabilities
Defense rethinks its wireless needs
DOD seeks new policies and technologies to stay ahead of surging spectrum demand
Trust is the focus of ELC brainstorming
New spectrum policies could follow switch to digital TV
A business case for cybersecurity spending
Worst congressional Web sites
E-Mail this page
Nominations are now open for the 2015 Federal 100 awards. Get the details and submit your picks!
Make a nomination today
Slowly but surely, the agency's ability to handle cybersecurity has evolved -- but experts say key hurdles remain.
Department credits a fully deployed computer system with helping make a sizable dent in the department’s disability claims backlog.
A key contributor to Clinger-Cohen argues that federal IT has failed to take advantage of the tools that law provided.
A new report surveys the many different approaches to launching a dedicated innovation shop in government.
Nominations for 2015 are being accepted now through Dec. 23.
The flip side of default data encryption on mobile devices is that a lost or stolen device won't yield up its secrets -- an important feature for many federal employees.
A decade after the 9/11 Commission identified agencies' reluctance to share information as a dangerous shortcoming, the government is moving in the right direction.
The latest offering is intended to help agencies speed the process of deploying authorized cloud solutions.
Cartoonist John Klossner on the telltale indicators that not everything is running through the CIO.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com