The computer recycling bin
Agencies' approaches to recycling electronics are largely piecemeal.
FAQs: Web application security
Defending the application layer.
An excerpt from a book by William Eggers.
DOD Buyers' Guide
A comprehensive guide to military contracts offering computer hardware, software and services.
Health care IT agenda inches forward
HHS secretary makes a pitch for public/private partnership.
Troubled JTRS hits another roadblock
Networx RFPs under review
Comings and goings
Editorial: A brave new world
Kelman: The e-gov pulse
Andrues: Grading the teachers
Depository librarians face uncertain future
Controversy swirls around GPO plan to cut back on print titles.
Hill renews call for emergency preparedness
TSA screeners need faster Internet access
NOAA offers access to new radar data
Java-based application lets scientists quickly view and retrieve information.
Labs help military make right tech choices
Fed agencies edge toward VOIP
Solar flare resurges
Sun reinvents its image with new products and services.
On the circuit
Crossing the chasm
House may take DHS to the woodshed
Unfinished work drives bill to strip $800 million from new budget.
Another approach to warfighting integration
OMB to review interagency purchasing deals
E-Mail this page
Nominations for the 2016 Federal 100 Awards are now being accepted.
Submit your pick today!
With some 14 million letters already out and millions more expected to hit mailboxes by the end of the month, the Office of Personnel Management expects to wrap up notifications to breach victims in the coming weeks.
Steve Kelman continues the conversation on fixing government acquisition.
A governmentwide email retention strategy could have a broad impact on the public and our nation’s history.
Agency CIOs can lead real and lasting change with the help of other government leaders and old-school performance grades.
The Inspector General nominee at the Department of Veterans Affairs told a Senate panel he could institute reform in the short time he'll have on the job.
A reciprocal travel program with 38 participating countries allows for visa-free visits, but a key U.S. senator warns of troubling gaps in the security data.
Antiquated computer systems based on legacy code are a problem for government not just because they are hard to secure, but because it is hard to find people to run them.
Steven Kelman unpacks the argument that social media can negatively affect organizational performance.
GSA's in-house startup tried a reverse auction micro-purchase approach to buying code, and it turned out one techie was willing to work for far cheaper than anyone had imagined.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com