A room with a view
Public safety agencies grapple with loads of data flowing into command centers.
A continental security job
Border officials eye technologies that help a limited corps of agents cover more ground.
What are your weaknesses?
Automated assessment tools help agencies steer limited resources to biggest vulnerabilities.
F Street shuffle
GSA draft reorganization plan gets cautious, critical reception.
DHS looks at interoperability using encryption software
Nonprofits accept the e-health records challenge
Editorial: A whole new world
Things have changed dramatically since "Computer Chaos" was published in 1994.
Brubaker: Before Clinger-Cohen, there was Chaos
The Computer Chaos report's impact on the way the government buys, uses technology continues to be felt.
Kelman: Are we better off now?
There is progress with procurement, but large programs still have not been fixed.
McConnell: Mission is the true driver
The big changes have come from events rather than new laws
Sprehe: Promises not yet fulfilled
Clinger-Cohen has been a major step forward in government management.
Flyzik: Top 10 benefits of Clinger-Cohen
We have a far better IT environment since its passage.
Can we have a word with you?
DOD employees flood agency with e-mail on pay-for-performance plans.
Under attack in the states
Conservative at helm of privacy panel
Keep on trucking
GPS wireless phones could record truck driver log data required by law.
Feds aren't aware of IPv6 benefits
Quick Look: The Alienware invasion
Firms outside the program are unfazed about competition
Fed contracting opens for disabled veterans
Confusion about set-aside rules could hamper its effectiveness
Feds prepare but say little about cyberdefense plans
NASA looks at insourcing
At loggerheads over cybersecurity
E-Mail this page
Save the date for 28th annual Federal 100 Awards Gala.
March 30, 2017
The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.
In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.
The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.
With the pre-award protests all resolved in GSA's favor, is the $50 billion IT services contract now bulletproof?
A brief history of the Holman Rule, and what it likely means for appropriations, agency programs and individual feds.
Some state government officials object to the Department of Homeland Security's move to add election infrastructure to the roster of 16 existing federal "critical infrastructure" areas.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2016 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com