Projecting a good image
Use these three buying criteria to make your short list for multimedia projectors
Storage on the quick Step-by-step guide to buying the right entry-level network-attached storage system
Picture perfect High-end displays now offer size and performance without sacrificing desk space or tight budgets
GSA regions struggle to generate revenues
Internal figures show regions earning far less in IT Solutions business than planned so far this year
Critics of proposed IRS rule raise privacy concerns
Editorial: A glimmer of hope GSA needs senior political leadership positions filled so the agency can deal with its problems. Doan’s nomination has already lifted the spirits of GSA’s employees.
Kelman: Google still rules
Spurway: Battle of the paperwork bulge
Springer makes her mark in Washington
OPM director applies management skills to creating a more effective federal workforce
Few women in top tech roles
Utah takes an integrated approach to human services
Software helps state agencies share information and provide benefits
Lenovo ThinkPads get jazzed up
CSC puts out the ‘for sale’ sign
Company’s acquisition would affect rivals, small businesses
USPS to stamp out e-waste
GPO in a hurry to get to the future
Agency gives vendors 30 days for Future Digital System proposals
States denounce federal pre-emption
FCW.com’s most-read stories
E-Mail this page
Nominations are now being accepted for the 2017 Federal 100 Awards.
Submit yours today!
The software whiz behind Pixar's movies Rob Cook surprised even himself by coming out of a "failed retirement" to take a top technology job at the General Services Administration.
FCW profiles 30 women and men who are doing great things in federal IT -- and who are poised to be the leaders of tomorrow.
The intelligence agency is shifting its collection of declassified documents from an offline National Archives workstation to the public-facing CIA.gov website.
Help us identify the outstanding women and men in federal IT.
Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.
Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2016 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com