Exec Tech


bar chart made of $100

Could big-data analytics improve federal procurement?

Experts agree that applying analytics to acquisition could yield results in terms of cost and quality -- with the right data and know-how.

Shutterstock image: examining computer code.

Can CDM change the game?

The Continuous Diagnostics and Mitigation program represents a dramatic shift from the government's traditional focus on certifying systems as secure and then rechecking them every so often.

Image from Shutterstock.com

IGs and cloud, smartphones and predators, and more

News and notes from around the federal IT community.

HealthCare.gov Screenshot, September 2014

Revamped HealthCare.gov site ready for prime time, officials say

CMS executives describe testing efforts, preview changes made for next open enrollment period.

National security implications for financial system cyberattacks?

Investigators have told the president they don't yet know who is behind the attacks, but a new Proofpoint report offers some clues.

Social Media Tree

Twitter's soft power

A former U.S. diplomat argues that social media is extending the range and influence of foreign leaders

Shutterstock image: wall of gears.

What we've got here is failure to communicate ...

At EA 2014, enterprise architects from across government grappled with the challenge of getting outsiders to understand what they do.

Shutterstock image: urban, digital design.

Urban design tool taps DOE's building database

Researchers developed LakeSim to deal with problems in urban planning and assess a redevelopment project's long-term effects on energy and transportation needs.

privacy keyboard

NSA IT, a better interface for CBP, data worries and more

News and notes from around the federal IT community.

Shutterstock image: ballot box.

Big structural challenges face e-voting in the U.S.

An Atlantic Council report explores the challenges of online and mobile device-based voting.

Shutterstock image: minimalist image of data-driven cloud technology.

Navigating the risks of storing information in the cloud

Concerns range from vulnerability to hacking to data ownership to the stability of cloud providers.

Image from Shutterstock.

GPO cloud, Army IT, cyber insurance and more

News and notes from around the federal IT community.

Who's Fed 100-worthy?

Nominations are now open for the 2015 Federal 100 awards. Get the details and submit your picks!