battle for spectrum
Growing demand and a finite supply of radio frequencies could force confrontation
— and compromise — between the U.S. government and competing
A techie reminisces about bygone products
of the Week: Distraction reaction
uncertain about move to Vista
Transportation, Army and possibly others put holds on Vista to await testing
Amid fresh allegations,
GSA administrator ‘invited’ to testify
Army tries to
sell Land Warrior overseas
Many signs indicate that everything is not right with procurement
so few skilled managers?
Address the brain drain, and don’t penalize the best people in government
need for a new way
time for software as a service
for the optimal organization
New transformation director brings Silicon Valley innovation to DOD’s
DOD says it
pays to ‘Check It’
systems experience growing pains
be the missing leg of IPv6
for preventing service outages
Configuration management databases can alert managers to dangerous interactions
balancing rules and results
Lawmakers are busy offering legislative fixes
for recent government contracting concerns
ethics rule for contractors
watch lists leave CIOs baffled
They want more specifics on why projects are on the lists and how to move
OMB tries new
tactic for fixing financial reporting problems
and DHS face off over Real ID
embraces Web 2.0 tools
HHS to launch
FCW Time Machine
1990: Flight strips survive
Buzz of the Week
Editorials: Submission guidelines
Take the FCW.com poll
E-Mail this page
Nominations are now being accepted for the 2017 Federal 100 Awards.
Submit yours today!
The software whiz behind Pixar's movies Rob Cook surprised even himself by coming out of a "failed retirement" to take a top technology job at the General Services Administration.
FCW profiles 30 women and men who are doing great things in federal IT -- and who are poised to be the leaders of tomorrow.
The intelligence agency is shifting its collection of declassified documents from an offline National Archives workstation to the public-facing CIA.gov website.
Help us identify the outstanding women and men in federal IT.
Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.
Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2016 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com