How to reorganize that is the question
No easy fix for DOD security issues
Finger-pointing leads to Army IT portfolio plan
Comings and goings
Editorial: Tales of the Fed 100
Why the system works
This year’s listings show that individuals, not systems, make things happen.
Glenn Beach: Ammunition redux
Kenneth Buetow: A force in the battle against cancer
Robert Roth: Fighting forest fires
Timothy Fong: He doesn’t know ‘quit’
John Okay: Fixing a Networx disconnect
Maureen Jewell: Taming the fed frontier under a big sky
Steve Peck: Passionate player
Dempsey and Louie: On a tightrope
Sheila McCoy: Champion of information assurance
Stan Soloway: Advocate for competition
E-Mail this page
Save the date for 28th annual Federal 100 Awards Gala.
March 30, 2017
The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.
With the pre-award protests all resolved in GSA's favor, is the $50 billion IT services contract now bulletproof?
A brief history of the Holman Rule, and what it likely means for appropriations, agency programs and individual feds.
Some state government officials object to the Department of Homeland Security's move to add election infrastructure to the roster of 16 existing federal "critical infrastructure" areas.
The one-year revival of the Holman Rule in the House gives lawmakers the authority to reduce the federal workforce or cut employee pay legislatively.
Steve Kelman suggests that satellite launches hold a lesson -- and a warning -- for the future of IT acquisition.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2016 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com