The new door openers
Defense Department officials used HSPD-12 smart cards in10 trial runs to test their
feasibility for providing improved building access security
It's hand-holding time
Employees facing background checks will need reassurance and training to help them adjust to the new smart cards
Federal Computer Week checked in with 25 agencies to see how they are implementing
Homeland Security Presidential Directive 12
EVM: A dash of cold water
Social Security Administration officials found that earned value management data is valuable only if it’s widely shared — so they publish EVM data on the agency’s intranet
Buzz of the Week: Quixotic battles
Windows configs late, but coming
Delays could mean agencies won’t have secure baseline installed until early 2008
GSA: We’ll change to black
DHS' latest red flag: Job holes
Editorial: Is FCW 'Doan obsessed?'
The General Services Administration is important, and that is reflected in news coverage
Kelman: Creating value and trust
New curriculum empowers leaders
IRM College prepares leaders for roles in transforming their organizations
A new take on crowd control
Can virtual directories help managers impose order on unruly directories?
FEC gives bounce to fundraising data
8(a) small businesses take a tumble
GSA enforces STARS contract by dropping 197 companies that failed to meet sales target
OPM restarts its financial migration
Fervor over formats cools for now
Massachusetts says yes to at least two nonproprietary document formats
COIs: Too much of a good thing?
E-discovery, e-gov’s latest flavor
Government’s black hole
Editorials: Submission guidelines
Take the FCW.com poll
E-Mail this page
Nominations are now open for the 2015 Federal 100 awards. Get the details and submit your picks!
Make a nomination today
Slowly but surely, the agency's ability to handle cybersecurity has evolved -- but experts say key hurdles remain.
Department credits a fully deployed computer system with helping make a sizable dent in the department’s disability claims backlog.
A key contributor to Clinger-Cohen argues that federal IT has failed to take advantage of the tools that law provided.
A new report surveys the many different approaches to launching a dedicated innovation shop in government.
Nominations for 2015 are being accepted now through Dec. 23.
The flip side of default data encryption on mobile devices is that a lost or stolen device won't yield up its secrets -- an important feature for many federal employees.
A decade after the 9/11 Commission identified agencies' reluctance to share information as a dangerous shortcoming, the government is moving in the right direction.
The latest offering is intended to help agencies speed the process of deploying authorized cloud solutions.
Cartoonist John Klossner on the telltale indicators that not everything is running through the CIO.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com