Fireside chats for the 21st century Podcasts are a new way for the government to reach out to citizens
Wired for telework Federal agencies struggle to overcome reservations about a flexible work option they must offer eligible employees
Doan: Restoring customer confidence is job one
The new administrator wants GSA to be the government’s premier procurement agency
VA probes employee access to sensitive data
Federal health services choose VA imaging standard
Editorial: The real debate As people fret about perceived ethical issues, what they are really concerned about it whether the government is over outsourced
Welles: Wash hands, floss teeth
House bill defunds parts of NSPS
Citing basic workers’ rights, Congress and courts denounce DOD personnel system
The first 90 days: Success strategies
Mainframe at your service
Service-oriented architecture is making big iron a first-class player — again
E-Security stops data loss
Education to drive state, local IT spending in ’07
But vendors will feel effects of unemployment, higher energy prices, fewer federal dollars
Federal City to rise on the banks of the Mississippi
No one-size-fits-all approach for EVM
New FAR rule allows agencies to tailor their IT project management policies
Dennet lays out priorities for OFPP
DHS: EAGLE will solidify standards
Welcoming new citizens
E-Mail this page
Nominations are now being accepted for the 2017 Federal 100 Awards.
Submit yours today!
The software whiz behind Pixar's movies Rob Cook surprised even himself by coming out of a "failed retirement" to take a top technology job at the General Services Administration.
FCW profiles 30 women and men who are doing great things in federal IT -- and who are poised to be the leaders of tomorrow.
The intelligence agency is shifting its collection of declassified documents from an offline National Archives workstation to the public-facing CIA.gov website.
Help us identify the outstanding women and men in federal IT.
Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.
Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2016 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com