Pick a service
Federal agencies will spend the next two years making connection selections that will shape their telecom and data communications for a decade
NSPS moves off dead center, but not by much
DOD’s controversial National Security Personnel System faces continuing resistance from employee unions and an authorization time clock that is running out
Buzz of the Week: DHS' turn in the hot seat
GSA sets HSPD-12 price point
GSA’s lower card cost forces Interior to rethink its plans as a secure card provider
Lawmakers grill DHS' CIO
Waxman: E-mail records are a mess
Editorial: More headlines than help
FCW shares hopeful and depressing points about the main players at a Doan hearing
Wagner: Lessons from the past
Okay: Fair opportunity explained
Hayden wants fewer CIA contractors
Director sets a goal of reducing contractor workforce by 10 percent in 15 months
Lawmakers disappointed by federal telework gains
Dual-mode: Two is better than one
Smart phones that switch between cellular and Wi-Fi could reduce telecom expenses
Encryption BPAs are open to all
Contracts awarded under GSA’s SmartBuy signal better intergovernmental relations
Devices bring new security policies
Red, black handhelds are an innovation that will require new security procedures
Justice breaks 1-hour rule
Beam me up, Scotty?
Editorials: Submission guidelines
Take the FCW.com poll
E-Mail this page
Nominations are now being accepted for the 2017 Federal 100 Awards.
Submit yours today!
The software whiz behind Pixar's movies Rob Cook surprised even himself by coming out of a "failed retirement" to take a top technology job at the General Services Administration.
FCW profiles 30 women and men who are doing great things in federal IT -- and who are poised to be the leaders of tomorrow.
The intelligence agency is shifting its collection of declassified documents from an offline National Archives workstation to the public-facing CIA.gov website.
Help us identify the outstanding women and men in federal IT.
Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.
Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2016 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com