Management


soldier using tablet pc

Unpacking Terry Halvorsen’s 3 reasons for pursuing BYOD

Bob Stevens contends that the Pentagon's test program is proof of BYOD's importance.

Shutterstock image: government access keyboard.

Agencies seek at least $75 million in digital service funding

Most CFO Act agencies have made budget requests to fund Digital Services teams.

Victor Gavin the Navy

Mobile: It's not just IT, it's an adventure

PEO-EIS Victor Gavin says the Navy wants to adopt not only new technologies, but also a mobile mindset.

Frank Kendall

Cyber takes center stage in Pentagon's new acquisition guidance

Better Buying Power 3.0 adds cybersecurity to the list of potential trouble spots in weapons, IT and other acquisitions.

Shutterstock image: executive board room.

Good management or measurement make-work?

Goals are good, but reporting requirements can easily get out of hand.

Lt. Col. Timothy Kneeland, commander of JBSA

At Joint Base San Antonio, Air Force lags on JRSS

Lt. Col. Timothy Kneeland, commander of Joint Base San Antonio’s 502nd Communications Squadron, says the base’s Air Force component is running behind on a key DOD IT modernization project.

Wikimedia image: The U.S. Navy variant of the F-35 Joint Strike Fighter, the F-35C, conducts a test flight over the Chesapeake Bay.

Analyzing the F-35, fighting algal blooms and strategic planning at DHS

News and notes from around the federal IT community.

Image of the Pentagon

DOD's IPv6 transition lags

The Pentagon was supposed to wrap up its IPv6 transition in 2012, but an IG report says the effort stalled because IT officials didn't make it a priority.

Shutterstock image: discussing a contract.

A key job opening for category management and wide-open (office) spaces

News and notes from around the federal IT community.

FAA delays procurement to respond to hack

Unspecified cyberattack prompts agency to rethink its Security Operations Center requirements

Shutterstock image (by Tsyhun): mobile data report.

'At will' employment for SES: What could possibly go wrong?

Plenty, according to a recent survey of Senior Executive Service leaders, who are worried about congressional efforts to make them at-will employees.

Shutterstock image: shadowed hacker.

Piecing together the insider threat puzzle

Software and automation are crucial to preventing leaks and sabotage, but they're not the only tools deployed by agencies that collect and guard secret information.