It's a wireless world
Like it or not, smart phones and handheld messaging devices are all over government. Here’s how to make sure this invasion of mobile devices doesn’t drain your organization’s budget or threaten its security.
Mobile security requires an action plan
Security is one of the biggest management challenges that agencies face with mobile wireless devices. Chief among managers’ worries is the risks associated with employees using their own smart phones and personal digital assistants for official work.
Buzz of the Week: Doan’s in-tense hearing
Waxman asks GSA’s Doan to resign
Panel leader casts a no-confidence vote, while Republicans call the hearing a waste
Government buys bulk encryption
Budget debate could grow acerbic
Editorial: Innovation matters
The government should play a significant role in information technology innovation
Nadler: Staying inside the bounds
Welles: Your retirement ballpark
Sade: I learned to love the FAR
GSA leader got hooked on procurement as a college student in a co-op program
GAO hires private lawyers
DOD reforms target bureaucracy
The new diet plan: Virtualization, then major consolidation
Most organizations will require new tools and techniques to reap the full benefits
DHS has too many buying chiefs
Lawmakers blame agency’s organization for the contracting problems it faces
Industry: ‘Why don’t fedsget it?’
DOD uses IT in stability operations
Forthcoming policy will define new rules for sharing data with NGOs and other groups
2009 will be big year for IRS
NARA says no to DRM software
Travel gear for the 21st century
Editorials: Submission guidelines
Take the FCW.com poll
E-Mail this page
Nominations are now being accepted for the 2017 Federal 100 Awards.
Submit yours today!
The software whiz behind Pixar's movies Rob Cook surprised even himself by coming out of a "failed retirement" to take a top technology job at the General Services Administration.
FCW profiles 30 women and men who are doing great things in federal IT -- and who are poised to be the leaders of tomorrow.
The intelligence agency is shifting its collection of declassified documents from an offline National Archives workstation to the public-facing CIA.gov website.
Help us identify the outstanding women and men in federal IT.
Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.
Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2016 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com