Policy


Shutterstock image: passport and visa application.

Bill targets visa waiver loophole

Bipartisan legislation would give DHS the authority to suspend participation in the Visa Waiver program for any country that fails to provide information related to terror threats.

Shutterstock image.

IC falling behind on plans for continuous evaluation of cleared personnel

The exact size of the security clearance re-check backlog is closely held by the government, but it could affect more than 1.1 million individuals.

Alan Balutis larger version

8 predictions to put on your calendar

Cisco's Alan Balutis shares his thoughts on what will happen in the coming year.

Image of the Pentagon

Better Buying Power 3.0: How the Pentagon hopes to save its technological advantage

The next phase of defense acquisition reform is an effort to balance strategic spending on technology with budget pressures.

Shutterstock image.

Congress approves stopgap spending bill

Continuing resolution will fund agencies through Dec. 11.

Shutterstock image.

Palantir's GSA pricing info posted on Hacker News site

The post includes a price list taken from the GSA Advantage ordering system -- which GSA says is not even accurate -- for Palantir Technologies' Gotham and Metropolis products.

Shutterstock image: medical records.

House bill would ease 'meaningful use' provisions on EHRs

Doctors and hospitals are increasingly pushing back against the government’s schedule for adoption of electronic health records.

Thomas Sharpe

Sharpe explains what's in the hallways

The head of the Federal Acquisition Service says “category hallways” will be beacons to federal buyers and suppliers looking for ways to manage the procurement process.

transferring funds

Venture capital, lame ducks, crime maps and more

News and notes from around the federal IT community.

Shutterstock image: cooperation, pieces to the puzzle.

Uncle Sam's List goes public

The formerly feds-only project is a one-stop shop for agencies to find and buy shared services.

Trust issues

Although tools to combat insider threats are maturing, DOD and the intelligence community know that technology is just part of the solution.

eye in the sky

Cloud computing under siege

Why advocates of data localization are missing the real security risks.