What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here

Upcoming FCW Features

Work in Progress: Upcoming FCW features

November 17: Exec-Tech

How high energy prices are prompting government to look anew at smart transportation technologies.

Contact: John Zyskowski, jzyskowski AT 1105govinfo DOT com

November 17 CXO Lessons Learned

Government officials are starting to discover that embracing new technology can be a powerful recruiting tool for reaching tech-savvy young people. Through examples like the Army Experience Center located in a Philadelphia shopping mall, learn how government can showcase its tech skills to the next generation of service members and civilian employees.

Writer: Doug Beizer, dbeizer AT 1105govinfo DOT com

December 8: Special Report: Homeland Security

Unlike traditional technology projects focused on cutting costs or increasing productivity, homeland security IT programs must succeed in an environment characterized by urgent security concerns and often controversial policies. How do government IT executives stay the course when policy and technology needs diverge? 

Writer: Ben Bain, bbain AT 1105govinfo DOT com

 December 8: Smart Managers Guide

When it comes to server virtualization, the question is not “if” but “when” agencies will deploy this cost-saving new technology. Virtualization can mean many changes for how IT departments have operated for the past ten to fifteen years. This story will tell executives what changes to expect and provide tips for making a virtualization deployment successful.

Writer: Alan Joch, ajoch AT worldpath DOT net

December 15: Exec Tech

Learn why appropriate use policies are important to keep employees’ Internet and e-mail usage productive and to avoid security and legal liability problems. Find out what the policy should cover and the types of tools that can help enforce such policies.

Contact: John Zyskowski, jzyskowski AT 1105govinfo DOT com

 December 15: 2008 Year In Review

Contact appropriate beat reporters directly by e-mail (see FCW.com for addresses) with suggestions and leads for analysis of top policy, management and procurement issues during the Bush administration. Examples include enterprise architecture, telework, privacy versus security, FISMA, agency scorecards, etc.

Posted on Oct 31, 2008 at 9:03 AM0 comments

Work in Progress: Upcoming FCW features

Sept. 8: 360-degree Report: Emergency Management
This story will look at how technology such as geospatial information systems are being used to support urban and regional mass evacuation plans. The report will highlight successful strategies for coordinating different levels of government and jurisdictions, involving key private sector partners and integrating technology into the efforts.

Writer: Ben Bain (bbain AT 1105govinfo DOT com)

Sept. 15:  Program Management
Tight budgets that require agencies to do more with less. A push towards e-government built upon increasingly complex IT projects. More and more government activities outsourced to commercial contractors. These trends are making program management one of the most important and most difficult jobs in the government. How is government responding to these historic changes? What strategies are working and which are not?

Writer: Alan Joch (ajoch AT worldpath DOT net)

Sept. 15:  Exec-Tech – Mashups
A growing number of government agencies are exploring the use of mashups – independent, Web-based software application and database components that are coordinated into a single, useful application. This story will explain how mashups work, who’s using them, and tips for getting started.

Writer: John Moore  (jmwriter AT twcny DOT rr DOT com)

Sept. 22: Security Series Part I
A presidential order earlier this year launched the National Cybersecurity Initiative. Public information about the initiative is still extremely limited, but the program is expected to involve significant changes to how the government operates and monitors the security for its data networks. These changes, and the cost and secrecy surrounding the program, have raised concerns in some quarters.

What will this initiative mean for agencies across government and the way they manage their cybersecurity defenses? And is the program the most effective way to address the growing threats from state-based and independent online attackers?

Writer: Brian Robinson (brian AT hullite DOT com)

Sept. 29: Security Series Part II
Social media, blogs, podcasts, wikis and other Web 2.0 interactive tools allow government to work and connect with citizens and other partners in powerful new ways. But do these tools expose agencies to new security vulnerabilities? Learn how some pioneering agencies have assessed and addressed the security issues associated with these new applications.

Writer: John Moore  (jmwriter AT twcny DOT rr DOT com)

Oct. 6:  Security Series Part III
Cybersecurity is a linchpin of modern government operations, yet it is also one of the most challenging areas in terms of technology complexity, policy compliance and staff expertise and management. These factors explain why there is growing government interest in tapping outside expertise in the form of managed security services. This story will identify those cybersecurity systems, operations and related procedures that can be outsourced most successfully. It will also provide tips for selecting providers and managing contractor performance.

Writer: Douglas Beizer (dbeizer AT1105govinfo DOT com)

Posted by John Stein Monroe on Sep 02, 2008 at 12:20 PM0 comments

Share this Page

Federal Computer Week eNewsletters

  • Subscribe to Newsletters Subscribe

    Federal Computer Week's eNewsletters deliver the latest policy and management news to your inbox.