Agencies risk unwitting release of sensitive information using popular office software
Search fusion Support grows for new way to integrate information analysis and retrieval tools
Visualizing the Army’s new tank Why the network is the main battle piece in the Future Combat Systems
Bush nominates new GSA administrator
Doan would bring IT business background to troubled agency
Senator examines SBA work
Pentium computers vulnerable to cyberattack
Editorial: A time for openness It is hardly news that GSA has problems. Those problems are multifaceted and have been building for years.
Nelson: Turning GSA around
Welles: Telework coming alive?
Slovin: The proverbial fox guarding the henhouse
Consistent customer service still an elusive goal
Managers say the best contact centers have service-oriented workers and automation
OPM pitches public service
Navy seeks to capture skills data
Army sets new benchmark for IP telephony
Infantry commanders can now use a phone and place a VOIP call from the battlefield
Symantec to protect databases
Software adds muscle to organizational charting
Companies turn to acquisition for growth
Aerospace and defense firms expand IT efforts; midsize services providers get larger
Hughes rethinks satellite strategy
No longer a performance model, TSA’s ITMS provides lessons
DHS IG finds that the contract lacked the proper performance measures
Lawmakers turn to IT for grant accountability
Love it or hate it, it’s the law
Benefiting Children’s Inn at NIH
E-Mail this page
Nominations are now being accepted for the 2017 Federal 100 Awards.
Submit yours today!
FCW profiles 30 women and men who are doing great things in federal IT -- and who are poised to be the leaders of tomorrow.
The intelligence agency is shifting its collection of declassified documents from an offline National Archives workstation to the public-facing CIA.gov website.
Help us identify the outstanding women and men in federal IT.
Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.
Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.
The government's departing top acquisition official said she leaves behind a solid foundation on which to build more effective and efficient federal IT.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2016 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com