Are two cores better than one? Dual-core notebooks hit the ground running
Tapping into the perfect tablet Six points to consider when
shopping for pen-based computers
An e-prescription for Medicaid Information technology could help save Medicaid, but complexity and a lack of standard practices continue to hobble the program
Union criticizes OPM's telework guidelines NTEU says new pandemic telework rules lack employee negotiation, equipment supply rights
Vets to get free credit monitoring
CIA-backed investment stirs health privacy fears
Editorial: Competition matters GSA’s attempt to bring more contracts under its purview is misguided
Doan: There is no profit cap
Allen: New rules of contract ethics
Susan Lawrence faces down adversity
Army gave 18-year-old Lawrence a path from Ida Grove, Iowa, to the Middle East
Many paths to the fast lane
Agencies have multiple options to speed up their wide-area network links
Brubaker back in the results business
Procentrix aims to maximize agency processes, systems
NASA helps woo tech companies
Reverse auctions become a diplomatic tool
Agencies still in the red on financial performance Score cards continue to show low grades for most agencies
Study finds low e-records IQ
House committee sets IT priorities for DHS
Census director raises a red flag about the upcoming e-census
GPO dots the i’s on a new performance-based contract
A few minutes with...Edward Adams
E-Mail this page
Nominations are now being accepted for the 2017 Federal 100 Awards.
Submit yours today!
The software whiz behind Pixar's movies Rob Cook surprised even himself by coming out of a "failed retirement" to take a top technology job at the General Services Administration.
FCW profiles 30 women and men who are doing great things in federal IT -- and who are poised to be the leaders of tomorrow.
The intelligence agency is shifting its collection of declassified documents from an offline National Archives workstation to the public-facing CIA.gov website.
Help us identify the outstanding women and men in federal IT.
Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.
Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2016 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com