It's a wireless world
Like it or not, smart phones and handheld messaging devices are all over government. Here’s how to make sure this invasion of mobile devices doesn’t drain your organization’s budget or threaten its security.
Mobile security requires an action plan
Security is one of the biggest management challenges that agencies face with mobile wireless devices. Chief among managers’ worries is the risks associated with employees using their own smart phones and personal digital assistants for official work.
Buzz of the Week: Doan’s in-tense hearing
Waxman asks GSA’s Doan to resign
Panel leader casts a no-confidence vote, while Republicans call the hearing a waste
Government buys bulk encryption
Budget debate could grow acerbic
Editorial: Innovation matters
The government should play a significant role in information technology innovation
Nadler: Staying inside the bounds
Welles: Your retirement ballpark
Sade: I learned to love the FAR
GSA leader got hooked on procurement as a college student in a co-op program
GAO hires private lawyers
DOD reforms target bureaucracy
The new diet plan: Virtualization, then major consolidation
Most organizations will require new tools and techniques to reap the full benefits
DHS has too many buying chiefs
Lawmakers blame agency’s organization for the contracting problems it faces
Industry: ‘Why don’t fedsget it?’
DOD uses IT in stability operations
Forthcoming policy will define new rules for sharing data with NGOs and other groups
2009 will be big year for IRS
NARA says no to DRM software
Travel gear for the 21st century
Editorials: Submission guidelines
Take the FCW.com poll
E-Mail this page
Meet 100 women and men who are doing great things in federal IT.
Click here for the full list
In an exclusive interview, Jimaye Sones, who was Defense Information Systems Agency comptroller from 2005 to 2013, says he was reassigned after revealing questionable accounting practices at the agency.
Through computer forensics training and internships, veterans are helping Immigration and Customs Enforcement tackle a backlog in child exploitation cases.
After two months on the job studying DOD's cybersecurity and IT needs, Secretary Ashton Carter is set to unveil a new Pentagon cyber strategy in Silicon Valley.
The failure of massive federal IT projects can usually be traced to poor management. The solution is as multilayered as the projects themselves.
Delivering business outcomes with continuously changing IT portfolios requires project managers to have a more entrepreneurial skill set.
The interconnectivity of the Internet of Things makes cyber threats inevitable, says NIST fellow Ron Ross.
Federal CIO Tony Scott says the new law could mean some CIOs will be out of work.
Most CFO Act agencies have made budget requests to fund Digital Services teams.
Nominations for the 2015 awards are now being accepted -- here's what you need to know to put forth a winner.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com