Policing terror Pioneering law enforcement agencies use data sharing and analysis tools to step up anti-terrorism contributions
Now hear this! Local officials tap new location-aware and multichannel emergency alert systems to better reach a more mobile citizenry
Talk isn’t cheap Maturing technologies address the high cost of radio interoperability for state and local first responders
Democratic win signals changes for federal IT
Workforce and policy issues are also now in flux
Experts debate Rumsfeld's transformation legacy
Shuttle Discovery's obsolete code could force launch delay
Editorial: Change management We hope the new Democratic leaders will carry out the effective oversight tradition exemplified by Reps. Davis' and Waxman's leadership of the House Government Reform Committee
Kelman: Let the vendor perform
Welles: California hangs a vacancy sign
A career as a secrecy watchdog
Steven Aftergood condemns the abuses of overclassification, excessive secrecy
IRS turns to employees to push system modernization efforts
Striking the right balance for customer service
DOD pushes wireless to the edge JFCOM prepares tactical mobile networks for homeland security and battlefield missions
HSPD-12 cards open new worlds
Microsoft takes the Linux pledge, partners with Novell
Semirugged Toughbook offers dual-core processing
Ballard in command at Perot Systems GS
Former Navy submarine engineer plots a course into the federal market
Deep Water Point keeps an eye on Congress’ IT appropriations
IAC ponders dues increase to meet deficit
Air Force to create Cyber Command
The service intends to apply laws of war, including proportional response to attacks
Agencies urged to focus first on policies to protect data
DOT faces new security challenges in 2007
A last-ditch try for a health IT bill
At summit, speakers urge CIOs to be creative
Competitive caption sourcing
E-Mail this page
Nominations are now open for the 2015 Federal 100 awards. Get the details and submit your picks!
Make a nomination today
Slowly but surely, the agency's ability to handle cybersecurity has evolved -- but experts say key hurdles remain.
Department credits a fully deployed computer system with helping make a sizable dent in the department’s disability claims backlog.
A key contributor to Clinger-Cohen argues that federal IT has failed to take advantage of the tools that law provided.
A new report surveys the many different approaches to launching a dedicated innovation shop in government.
Nominations for 2015 are being accepted now through Dec. 23.
The flip side of default data encryption on mobile devices is that a lost or stolen device won't yield up its secrets -- an important feature for many federal employees.
A decade after the 9/11 Commission identified agencies' reluctance to share information as a dangerous shortcoming, the government is moving in the right direction.
The latest offering is intended to help agencies speed the process of deploying authorized cloud solutions.
Cartoonist John Klossner on the telltale indicators that not everything is running through the CIO.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com