Baghdad reduced to bytes Some experts question whether the Defense Department is overreaching with a simulation of Baghdad that tries to model most human factors
IAC facebook This year’s IAC Executive Committee embodies the high-level expertise that is essential to good government and the advancement of the IT industry
Voters are caught in an e-voting quandary
Are elections officials naive about e-voting, or are critics just pushing the wrong buttons?
DOD gives Internet balloting another try
Editorial: E-voting: The need for paper Information technology has an important role to play in voting, particularly after the 2000 presidential vote and the infamous hanging chads
Guerra: Quit the monopoly talk
Flu worries create urgency for planning
Federal agencies need to account for uninfected teleworkers, experts warn
GAO urges action on clearances
Burton takes a new angle on procurement
On the road to a better security blueprint The linking of threat management and EA design could yield huge potential benefits
SpyForce-AI protects against insider threats
Business sector, states seek e-cycling solutions
Lawmakers, recyclers are closely monitoring current programs to reach uniform approach
$300M contract will test limits of 8(a) capabilities
Defense rethinks its wireless needs
DOD seeks new policies and technologies to stay ahead of surging spectrum demand
Trust is the focus of ELC brainstorming
New spectrum policies could follow switch to digital TV
A business case for cybersecurity spending
Worst congressional Web sites
E-Mail this page
A two-year campaign that prompted the Department of Homeland Security to issue its first-ever emergency directive to agencies to shore up cyber defenses appears in part to have been an attempt to spy on U.S. government internet traffic.
A rule change allows furloughed feds and those working without pay to take out loans against their retirement during shutdowns.
Meet the women and men being honored for their exceptional contributions to federal IT.
Sign up for our newsletter.