Exec Tech

Beth Angerman. Official photograph.

USSM builds on shared services

GSA's year-old shared services office laying the groundwork for new marketplace ecosystem.

Shutterstock image.

How HPCs crunch rivers of water data

Lawrence Livermore National Laboratory has come up with a way to use its supercomputing power to speed the sprawling data analysis associated with extremely complex public works.

Shutterstock image (by Tim Masters): okay sign emerging from a pile of shredded papers.

How to construct tomorrow's information management professional

The government lacks the workforce to handle the exponential growth of information and information assets.

Image from Shutterstock.

Convincing your team to buy into the cloud

A can-do spirit has enabled the FCC to make a dramatic leap forward in IT modernization. What could this mean for your IT shop?

Shutterstock image. Copyright: wavebreakmedia

Report: DOD must embrace open-source software

In a new report, the Center for a New American Security makes the case that DOD is failing to capitalize on the power of open-source software.

padlocked keyboard

Officials: Yearly budgeting stifles cybersecurity

Current and former officials argue that a one-year budgeting cycle impedes government cybersecurity and IT modernization.

Shutterstock image (by MaximP): network defense.

NPPD still hopeful on infrastructure protection

After a year, DHS remains optimistic that a proposed reorganization to link cyber and physical security operations will move forward.

18F offers specs on gov-wide login

In a public notice, the innovation group 18F offered a glimpse into the data a planned governmentwide login site would collect.

room of computers

Marine cyber chief: Do not fear RMF

Ray Letteer, chief of the Marine Corps' Cybersecurity Division, advocates faster adoption of the government's Risk Management Framework.

Shutterstock image.

How AI can be a game changer for government

Automating routine citizen services will allow federal employees to focus on more creative and fulfilling tasks.

Shutterstock image (by GlebStock): hacker with graphic user interface.

Why privilege can be risky

Privileged users, according to a new three-year study sponsored by Forcepoint and performed by the Ponemon Institute, are still a weak point for network security in federal networks.

Federal CIO Tony Scott

Scott ties two legacy IT efforts together

ITMF, Move IT legacy system renewal efforts aren’t mutually exclusive, said federal CIO.