for the compulsive gadget grabber
Unflinching focus on value and program needs helps rein in temptation
to buy the latest and greatest toys
Get smart about
Neglect the basics and you’ll risk having days of high-profile grief
of the Week: Be careful what you ask for
the CIO the power of the purse
Scott Charbo will gain broad control of IT spending in DHS directorates
DOD renews acquisition
reform by focusing on unearned fees
plan to clean up data
Despite the controversy surrounding her, the GSA administrator’s
main goal should be leaving the agency better than she found it
small is small?
than a grade
bad to do good
Government Printing Office looks to learn from its mistakes to improve
GSA tries sweetening
telework with new federal regulations
give open source added clout
Familiar suppliers provide a higher comfort level for agencies
procurement stalls once again
GSA is mum on next steps as judge denies government’s request for
GSA seeks a
catalyst role in its plans for an IPv6 program office
gain the advantage on health IT issues
With Democrats now in charge on Capitol Hill, the rush for national health
IT legislation is on
prove it’s possible to fix GAO high-risk programs
VA gives thumbs
down to thumb drives
agencies to improve E-FOIA compliance
toons told the story
Buzz of the Week
Editorials: Submission guidelines
Take the FCW.com poll
E-Mail this page
Nominations are now being accepted for the 2017 Federal 100 Awards.
Submit yours today!
The software whiz behind Pixar's movies Rob Cook surprised even himself by coming out of a "failed retirement" to take a top technology job at the General Services Administration.
FCW profiles 30 women and men who are doing great things in federal IT -- and who are poised to be the leaders of tomorrow.
The intelligence agency is shifting its collection of declassified documents from an offline National Archives workstation to the public-facing CIA.gov website.
Help us identify the outstanding women and men in federal IT.
Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.
Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2016 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com