Baghdad reduced to bytes Some experts question whether the Defense Department is overreaching with a simulation of Baghdad that tries to model most human factors
IAC facebook This year’s IAC Executive Committee embodies the high-level expertise that is essential to good government and the advancement of the IT industry
Voters are caught in an e-voting quandary
Are elections officials naive about e-voting, or are critics just pushing the wrong buttons?
DOD gives Internet balloting another try
Editorial: E-voting: The need for paper Information technology has an important role to play in voting, particularly after the 2000 presidential vote and the infamous hanging chads
Guerra: Quit the monopoly talk
Flu worries create urgency for planning
Federal agencies need to account for uninfected teleworkers, experts warn
GAO urges action on clearances
Burton takes a new angle on procurement
On the road to a better security blueprint The linking of threat management and EA design could yield huge potential benefits
SpyForce-AI protects against insider threats
Business sector, states seek e-cycling solutions
Lawmakers, recyclers are closely monitoring current programs to reach uniform approach
$300M contract will test limits of 8(a) capabilities
Defense rethinks its wireless needs
DOD seeks new policies and technologies to stay ahead of surging spectrum demand
Trust is the focus of ELC brainstorming
New spectrum policies could follow switch to digital TV
A business case for cybersecurity spending
Worst congressional Web sites
E-Mail this page
Save the date for 28th annual Federal 100 Awards Gala.
March 30, 2017
The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.
In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.
The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.
With the pre-award protests all resolved in GSA's favor, is the $50 billion IT services contract now bulletproof?
A brief history of the Holman Rule, and what it likely means for appropriations, agency programs and individual feds.
Some state government officials object to the Department of Homeland Security's move to add election infrastructure to the roster of 16 existing federal "critical infrastructure" areas.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2016 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com