Love/hate relationship with NMCI The Navy and Marine Corps have learned many lessons from the massive ' and controversial ' outsourcing project
Virtual serviers, real threats Agencies face new security management challenges when they adopt server virtualization
20 years of marvels and missteps Come along for Federal Computer Week's guided information technology tour
Roads to recovery Military health IT planners consider ways to meet recommendations from the president's commission on improving care for wounded warriors
Buzz of the Week: Warfare 2.0
Is this the road to GSA's recovery? Agency officials announce plans to fix sagging assisted acquisition services
AF cyber command takes shape
Young feds bring intell change
Editorial: A time for listening NASA's response to employees' concerns about Homeland Security Presidential Directive 12 is proof that, in some ways, the federal government is stuck in a bygone era.
Wagner: Year-end spending
Welles: Go ahead, show off
Crisis leaders are a special breed Harvard researchers develop yardstick to predict decision-making abilities
ATF agents get Web portal access
Security is telework's weakest link
Let software perform guard duty Think of network access control as the sentry that keeps unsafe computers off your network
DOD takes steps to cut contract costs House urges military to reduce spending on services through better oversight
Unions press their case against A-76
GSA beats goal of awarding contracts in 30 days or less
Appropriations bills in limbo Administration threatens to veto several bills because they would exceed spending limits
Grant law renewal uncertain
NIST prepares due diligence standards for cybersecurity
Secrecy by the numbers
Editorials: Submission guidelines
Take the FCW.com poll
E-Mail this page
Nominations are now open for the 2015 Federal 100 awards. Get the details and submit your picks!
Make a nomination today
Slowly but surely, the agency's ability to handle cybersecurity has evolved -- but experts say key hurdles remain.
Department credits a fully deployed computer system with helping make a sizable dent in the department’s disability claims backlog.
A key contributor to Clinger-Cohen argues that federal IT has failed to take advantage of the tools that law provided.
A new report surveys the many different approaches to launching a dedicated innovation shop in government.
Nominations for 2015 are being accepted now through Dec. 23.
The flip side of default data encryption on mobile devices is that a lost or stolen device won't yield up its secrets -- an important feature for many federal employees.
A decade after the 9/11 Commission identified agencies' reluctance to share information as a dangerous shortcoming, the government is moving in the right direction.
The latest offering is intended to help agencies speed the process of deploying authorized cloud solutions.
Cartoonist John Klossner on the telltale indicators that not everything is running through the CIO.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com