Exec Tech


Shutterstock image: illuminated light bulb signifying an innovative idea.

18F to launch consulting group and project dashboard

The consulting service arose from the ongoing challenge of being called in to fix IT projects long after they were funded, scoped and set in motion.

computers and globe_data sharing

Shared services for mapping and a GSA promotion

News and notes from around the federal IT community.

futuristic cyberwar

New cyber doctrine shows more offense, transparency

The Pentagon has outlined a military strategy that goes beyond previous doctrine in its focus on offensive cyber operations.

Reginald Brothers of DHS

DHS sketches the tech future

The department's Science and Technology Directorate aims for seamless cybersecurity infrastructure as part of its long-term plan for technological development.

Former Commerce Department CIO Simon Szykman

Szykman's new job, plus facial recognition and Air Force satellites plans

News and notes from around the federal IT community.

NGA ebola mapping tool.

NGA releases unclassified mapping tool for Ebola relief

The National Geospatial-Intelligence Agency wants to support Ebola relief with a customizable mapping tool.

Shutterstock image: global, international connections.

A mountain of net neutrality comments, a privacy paradox, ransomware warnings and more

News and notes from around the federal IT community.

Shutterstock image: cloud hands.

Moving to the cloud (or finding reasons to wait)

A new survey of federal cloud efforts finds a number of pitfalls, both real and perceived, as agencies migrate to a cloud services provider.

Karen DeSalvo

DeSalvo shifts focus from health IT to Ebola crisis

HHS's national coordinator for health information technology has been named acting assistant secretary for health, effective immediately.

James Tunnessen

At CIS, they DID(IT)

James Tunnessen has instilled a sense of urgency in the IT team as head of digital innovation and development at Citizenship and Immigration Services.

Image from Shutterstock.com

Is open source really a security concern?

A new report suggests common components contain serious vulnerabilities, but an open source advocate argues that's only half the data.

Shutterstock image: mobile enterprise.

It takes DISA 3.5 hours to activate a single classified mobile phone -- here's why

Over-the-air provisioning remains a challenge for classified mobile devices.