Federal Computer Week: Site Map

Last issue's news
Online news archive
Back issues of Federal Computer Week


Up to their ears in issues
There's no shortage of work for chief privacy officers.

Privacy in a post-Sept. 11 world
There's no shortage of work for chief privacy officers.

European Union charts a new course for data privacy
United Kingdom makes plans for identity registry and national ID card.

Voice over IP exposed
VOIP can lower telecom costs and help with network consolidation — and cause security problems if not handled right.


President pulls the plug on PITAC
Failure to renew the IT advisory committee raises concerns about research budgets

IT's musical chairs

E-gov faces budget cuts



Comings and goings


Editorial: The need for privacy officers

Welles: Summer winds of change

Sprehe: FBI gets it right

Kelman: Purchase cards: Priceless


Growing government program managers
VA created in-house training program to fill a talent shortage.

Telework tango


Five steps to managing risk
Experts recommend going on the offensive to deal with vulnerabilities.

Hands on: In search of the perfect notebook PC

The Pipeline

The data reference model gets real


Adobe looks to add Flash
Macromedia’s Flash Platform enables building of Web applications.

Lose the file cabinets


California bill would restrict RFID use
State could be sending signal that data privacy matters.

Auditors highlight patent automation problems

NSF seeks broad Internet research agenda

Lawmakers debate merits of fingerprints

Extreme makeover for financial management?


  • Comment
    customer experience (garagestock/Shutterstock.com)

    Leveraging the TMF to improve customer experience

    Focusing on customer experience as part of the Technology Modernization Fund investment strategy will enable agencies to improve service and build trust in government.

  • FCW Perspectives
    zero trust network

    Why zero trust is having a moment

    Improved technologies and growing threats have agencies actively pursuing dynamic and context-driven security.

Stay Connected