EA: What is it? 10 thoughts/10 people on enterprise architecture
OMB scores high on EA Even some of OMB's frequent critics say the House agency has been an effective advocate of enterprise architecture
The new public-safety language The National Information Exchange Model provides a rallying point for government and industry to coordinate homeland security efforts
Up close and impersonal Encrypted indexing techniques let security agencies exchange information more freely without sacrificing personal privacy
Find a link to Carnegie Mellon University's Data Privacy Lab.
Buzz of the Week
Is IT security getting short shrift? Concerned former DOD officials call for greater use of cybersecurity metrics
OPM stung by thefts
Military can't buy IT fast enough
Editorial: Dressing up EA's mission Dick Burk has done much for enterprise architecture and linking EA to agency missions
NASA needs boomer expertise Brain drain could mean a serious setback for the agency's next trip to the moon
Defense unions optimistic
CFOs: Use more financial data
CIO University refills the pipeline
NSA begins crypto upgrade 15-year plan to fund new encoding technology
ITIL's stock rises
GSA issues stricter rules on year-end spending requests Agency asks for breathing room to award contracts before the end of the fiscal year
Richard Burk: EA evangelist OMB's retiring chief architect preaches the virtues of enterprise architecture
A case for EA
Editorials: Submission guidelines
Take the FCW.com poll
E-Mail this page
Nominations are now being accepted for the 2017 Federal 100 Awards.
Submit yours today!
The software whiz behind Pixar's movies Rob Cook surprised even himself by coming out of a "failed retirement" to take a top technology job at the General Services Administration.
FCW profiles 30 women and men who are doing great things in federal IT -- and who are poised to be the leaders of tomorrow.
The intelligence agency is shifting its collection of declassified documents from an offline National Archives workstation to the public-facing CIA.gov website.
Help us identify the outstanding women and men in federal IT.
Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.
Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2016 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com