Taming mobile data 5 steps and 3 tools to stop sensitive information from walking out the door
Diamonds in the data Federal agencies increasingly use data mining to extract valuable info buried in large databases
Making EVM matter Earned value management has been around for decades but is now becoming an essential part of how agencies manage projects. Why should you care?
Migrating to IPv6 With deadlines looming, agencies need to get serious about upgrading their data networks to the next-generation IP
FEMA pledges better disaster relief fund payouts
Poor use of IT frequently led to payment of fraudulent claims in 2005
DOE security upgrades could better protect data
New Google portal delves into gov sites
Editorial: Maintaining control After years of being just talk, data mining is in vogue.
Welles: Whistle-blowers are wary
Rand identifies workforce-planning risks
Limited data could slow management efforts to match DOD workforce to supply and demand
CXOs focus on collaboration as key to better management
Supercomputing takes NASA to infinity and beyond
From science to space exploration, the world’s fourth-fastest computer is an agency asset
Roadblocks hamper emergency response system coordination
Fed contractors want thorough overhaul of clearance processing
Poll details many faults in ‘wholesale systemic failure’
SPACs gain ground in federal M&A action
PART earns partial credit from critics
Both sides agree that the program rating tool, despite flaws, has few competitors
Health IT lawmakers study privacy
Key House leader pushes for FAA telecom project funding
Financial Line of Business questioned
A grand time
E-Mail this page
Nominations are now open for the 2015 Federal 100 awards. Get the details and submit your picks!
Make a nomination today
Slowly but surely, the agency's ability to handle cybersecurity has evolved -- but experts say key hurdles remain.
Department credits a fully deployed computer system with helping make a sizable dent in the department’s disability claims backlog.
A key contributor to Clinger-Cohen argues that federal IT has failed to take advantage of the tools that law provided.
A new report surveys the many different approaches to launching a dedicated innovation shop in government.
Nominations for 2015 are being accepted now through Dec. 23.
The flip side of default data encryption on mobile devices is that a lost or stolen device won't yield up its secrets -- an important feature for many federal employees.
A decade after the 9/11 Commission identified agencies' reluctance to share information as a dangerous shortcoming, the government is moving in the right direction.
The latest offering is intended to help agencies speed the process of deploying authorized cloud solutions.
Cartoonist John Klossner on the telltale indicators that not everything is running through the CIO.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com