Policy


government industry dialog

Program management: The contractor's role

Here is what it takes, both officially and informally, to make the partnership between an agency and a contractor succeed.

House Majority Leader John Boehner (AP photos)

Budget capitulations

Congress no longer even tries to get real appropriations done by Sept. 30. Here's the fiscal 2015 reality.

The perils of petascale IT projects

Why SBInet, HealthCare.gov and ECSS are just the beginning of large-scale IT project failures.

handshake

GSA: No freeze on adding vendors to services schedules

Agency had planned a pause, but found a better solution that can accommodate new additions.

Michael Hettinger

Federal acquisition: Art or science?

Mike Hettinger argues that we need acquisition officials who understand not only the letter of the FAR, but also the spirit of its intent.

screen capture of HealthCare.gov site

$500 million in HealthCare.gov spending explained

An IG report details 60 contracts that went into building the Federally Facilitated Marketplace.

Shutterstock image: the White House.

White House fellows, dire debt predictions and more

News and notes from around the federal IT community.

Shutterstock image: cloud technology connections.

Taming the wild west of cloud acquisition

Federal buyers have a variety of ways to approach cloud services. Here are some strategies for cutting through the chaos to find the best solution for your agency.

Beyond BYOD: Who oversees the apps?

Official "bring your own app" policies are still few and far between, but agencies are adapting to their employees' demands.

Shutterstock image: vector of managerial skills utilized throughout a project.

Contracting case studies, AWS security, CANES consolidation and more

News and notes from around the federal IT community.

Thomas Sharpe

GSA unveils unified acquisition strategy

the Federal Acquisition Service aims to be both a better provider and a trusted adviser.

DHS logo

CDM enters stage two: Critical applications

DHS has secured funding for a program to tackle the next layer of network vulnerabilities.