How to reorganize that is the question
No easy fix for DOD security issues
Finger-pointing leads to Army IT portfolio plan
Comings and goings
Editorial: Tales of the Fed 100
Why the system works
This year’s listings show that individuals, not systems, make things happen.
Glenn Beach: Ammunition redux
Kenneth Buetow: A force in the battle against cancer
Robert Roth: Fighting forest fires
Timothy Fong: He doesn’t know ‘quit’
John Okay: Fixing a Networx disconnect
Maureen Jewell: Taming the fed frontier under a big sky
Steve Peck: Passionate player
Dempsey and Louie: On a tightrope
Sheila McCoy: Champion of information assurance
Stan Soloway: Advocate for competition
E-Mail this page
In the latest issue: Looking back on three decades of big stories in federal IT.
Get the full issue
Help us identify the outstanding women and men in federal IT.
Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.
Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.
The government's departing top acquisition official said she leaves behind a solid foundation on which to build more effective and efficient federal IT.
The National Background Investigations Bureau announced the appointment of its first director as the agency prepares to take over processing government background checks.
Sen. James Lankford (R-Okla.) said agencies are missing out on younger workers because of the government's rigidity, particularly its protracted hiring process.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2016 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com