The new door openers
Defense Department officials used HSPD-12 smart cards in10 trial runs to test their
feasibility for providing improved building access security
It's hand-holding time
Employees facing background checks will need reassurance and training to help them adjust to the new smart cards
Federal Computer Week checked in with 25 agencies to see how they are implementing
Homeland Security Presidential Directive 12
EVM: A dash of cold water
Social Security Administration officials found that earned value management data is valuable only if it’s widely shared — so they publish EVM data on the agency’s intranet
Buzz of the Week: Quixotic battles
Windows configs late, but coming
Delays could mean agencies won’t have secure baseline installed until early 2008
GSA: We’ll change to black
DHS' latest red flag: Job holes
Editorial: Is FCW 'Doan obsessed?'
The General Services Administration is important, and that is reflected in news coverage
Kelman: Creating value and trust
New curriculum empowers leaders
IRM College prepares leaders for roles in transforming their organizations
A new take on crowd control
Can virtual directories help managers impose order on unruly directories?
FEC gives bounce to fundraising data
8(a) small businesses take a tumble
GSA enforces STARS contract by dropping 197 companies that failed to meet sales target
OPM restarts its financial migration
Fervor over formats cools for now
Massachusetts says yes to at least two nonproprietary document formats
COIs: Too much of a good thing?
E-discovery, e-gov’s latest flavor
Government’s black hole
Editorials: Submission guidelines
Take the FCW.com poll
E-Mail this page
Meet 100 women and men who are doing great things in federal IT.
Click here for the full list
In an exclusive interview, Jimaye Sones, who was Defense Information Systems Agency comptroller from 2005 to 2013, says he was reassigned after revealing questionable accounting practices at the agency.
Through computer forensics training and internships, veterans are helping Immigration and Customs Enforcement tackle a backlog in child exploitation cases.
After two months on the job studying DOD's cybersecurity and IT needs, Secretary Ashton Carter is set to unveil a new Pentagon cyber strategy in Silicon Valley.
The failure of massive federal IT projects can usually be traced to poor management. The solution is as multilayered as the projects themselves.
Delivering business outcomes with continuously changing IT portfolios requires project managers to have a more entrepreneurial skill set.
The interconnectivity of the Internet of Things makes cyber threats inevitable, says NIST fellow Ron Ross.
Federal CIO Tony Scott says the new law could mean some CIOs will be out of work.
Most CFO Act agencies have made budget requests to fund Digital Services teams.
Nominations for the 2015 awards are now being accepted -- here's what you need to know to put forth a winner.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com