The case for SOA
Service-oriented architecture might not be easy to develop, but the economics are hard to ignore, according to participants in an FCW roundtable discussion
iSCSI bridges the storage gap Lower-cost Fibre Channel alternative can help small-to-midsize offices consolidate storage
Business transformation is turning heads A Pentagon team is getting rave reviews for making progress with a program long known for inertia
Auditors warn FBI not to repeat mistakes
CIO says funding for all IT modernization needs is lacking
Hale resigns from DHS
DISA needs tech to push data
Editorial: Yes, GSA does matter We believe the GSA is worth saving as it takes steps to address its current problems.
Bibb: GSA: Evolving with the times
Welles: Decompress your stress
NASA’s new mission: Manage institutional knowledge
Space agency will use collaborative technologies to capture and share lessons learned
GAO assesses Katrina oversight
DISA says ‘yes, sir’ to telework
Louisiana invests in immersive technology
State backs high-performance computing facility to attract wide range of industries
Video surveillance gets smart
Data center targets small integrators
Baltimore start-up is counting on smaller firms to need continuity-of-operations space
Embarcadero refines strategy
USGS lifts suspension on A-76 jobs competition
Controversy will not impede agency’s plans to consolidate electronic-mapping functions
IRS.gov scores with citizens
E-Mail this page
Nominations are now being accepted for the 2017 Federal 100 Awards.
Submit yours today!
The software whiz behind Pixar's movies Rob Cook surprised even himself by coming out of a "failed retirement" to take a top technology job at the General Services Administration.
FCW profiles 30 women and men who are doing great things in federal IT -- and who are poised to be the leaders of tomorrow.
The intelligence agency is shifting its collection of declassified documents from an offline National Archives workstation to the public-facing CIA.gov website.
Help us identify the outstanding women and men in federal IT.
Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.
Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2016 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com