Emerging threats spur technology updates and a new class of security devices
Justice IG report: Protect laptop data
But when it comes to securing classified information, are two drives better than one?
Frequently asked questions: Enterprise service buses
Don't know about enterprise service buses? Here is the place to start.
The procurement leadership vacuum
The resignation of GSA Administrator Perry will impact contracting community and the agency's realignment.
Rumble continues over e-gov funding
Editorial: Setting an example
Kelman: An ounce of prevention?
Welles: Telework is a no-brainer
Raises are not an entitlement
Officials say government pay must be merit-based
FBI lacks resources for hiring and training
IT gaps slow DHS training
Splitting the PC
Two approaches to help you ease your desktop management woes
Florida courts work to strengthen IT security
Review: Network analyzer churns out useful security reports
Linux developer ready for scrutiny
Red Hat submits next version of Linux for Common Criteria evaluation
Dell touts new BPA as model
PITAC gets new life as part of PCAST
Combination of two committees could help raise IT issues to higher level
CDC shuffles IT responsibilities
Wanted: New DHS privacy officer
E-Mail this page
Nominations for the 2016 Federal 100 Awards are now being accepted.
Submit your pick today!
With some 14 million letters already out and millions more expected to hit mailboxes by the end of the month, the Office of Personnel Management expects to wrap up notifications to breach victims in the coming weeks.
Steve Kelman continues the conversation on fixing government acquisition.
A governmentwide email retention strategy could have a broad impact on the public and our nation’s history.
Agency CIOs can lead real and lasting change with the help of other government leaders and old-school performance grades.
The Inspector General nominee at the Department of Veterans Affairs told a Senate panel he could institute reform in the short time he'll have on the job.
A reciprocal travel program with 38 participating countries allows for visa-free visits, but a key U.S. senator warns of troubling gaps in the security data.
Antiquated computer systems based on legacy code are a problem for government not just because they are hard to secure, but because it is hard to find people to run them.
Steven Kelman unpacks the argument that social media can negatively affect organizational performance.
GSA's in-house startup tried a reverse auction micro-purchase approach to buying code, and it turned out one techie was willing to work for far cheaper than anyone had imagined.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com