A room with a view
Public safety agencies grapple with loads of data flowing into command centers.
A continental security job
Border officials eye technologies that help a limited corps of agents cover more ground.
What are your weaknesses?
Automated assessment tools help agencies steer limited resources to biggest vulnerabilities.
F Street shuffle
GSA draft reorganization plan gets cautious, critical reception.
DHS looks at interoperability using encryption software
Nonprofits accept the e-health records challenge
Editorial: A whole new world
Things have changed dramatically since "Computer Chaos" was published in 1994.
Brubaker: Before Clinger-Cohen, there was Chaos
The Computer Chaos report's impact on the way the government buys, uses technology continues to be felt.
Kelman: Are we better off now?
There is progress with procurement, but large programs still have not been fixed.
McConnell: Mission is the true driver
The big changes have come from events rather than new laws
Sprehe: Promises not yet fulfilled
Clinger-Cohen has been a major step forward in government management.
Flyzik: Top 10 benefits of Clinger-Cohen
We have a far better IT environment since its passage.
Can we have a word with you?
DOD employees flood agency with e-mail on pay-for-performance plans.
Under attack in the states
Conservative at helm of privacy panel
Keep on trucking
GPS wireless phones could record truck driver log data required by law.
Feds aren't aware of IPv6 benefits
Quick Look: The Alienware invasion
Firms outside the program are unfazed about competition
Fed contracting opens for disabled veterans
Confusion about set-aside rules could hamper its effectiveness
Feds prepare but say little about cyberdefense plans
NASA looks at insourcing
At loggerheads over cybersecurity
E-Mail this page
Steven Kelman suggests we should spend more time planning for the known risks on the horizon.
As COVID-19 exposed vulnerabilities in state and local government IT systems, the newly formed U.S. Digital Response stepped in to help.