Works in Progress

Blog archive

Work in Progress: Upcoming FCW features

Sept. 8: 360-degree Report: Emergency Management
This story will look at how technology such as geospatial information systems are being used to support urban and regional mass evacuation plans. The report will highlight successful strategies for coordinating different levels of government and jurisdictions, involving key private sector partners and integrating technology into the efforts.

Writer: Ben Bain (bbain AT 1105govinfo DOT com)

Sept. 15:  Program Management
Tight budgets that require agencies to do more with less. A push towards e-government built upon increasingly complex IT projects. More and more government activities outsourced to commercial contractors. These trends are making program management one of the most important and most difficult jobs in the government. How is government responding to these historic changes? What strategies are working and which are not?

Writer: Alan Joch (ajoch AT worldpath DOT net)

Sept. 15:  Exec-Tech – Mashups
A growing number of government agencies are exploring the use of mashups – independent, Web-based software application and database components that are coordinated into a single, useful application. This story will explain how mashups work, who’s using them, and tips for getting started.

Writer: John Moore  (jmwriter AT twcny DOT rr DOT com)

Sept. 22: Security Series Part I
A presidential order earlier this year launched the National Cybersecurity Initiative. Public information about the initiative is still extremely limited, but the program is expected to involve significant changes to how the government operates and monitors the security for its data networks. These changes, and the cost and secrecy surrounding the program, have raised concerns in some quarters.

What will this initiative mean for agencies across government and the way they manage their cybersecurity defenses? And is the program the most effective way to address the growing threats from state-based and independent online attackers?

Writer: Brian Robinson (brian AT hullite DOT com)

Sept. 29: Security Series Part II
Social media, blogs, podcasts, wikis and other Web 2.0 interactive tools allow government to work and connect with citizens and other partners in powerful new ways. But do these tools expose agencies to new security vulnerabilities? Learn how some pioneering agencies have assessed and addressed the security issues associated with these new applications.

Writer: John Moore  (jmwriter AT twcny DOT rr DOT com)

Oct. 6:  Security Series Part III
Cybersecurity is a linchpin of modern government operations, yet it is also one of the most challenging areas in terms of technology complexity, policy compliance and staff expertise and management. These factors explain why there is growing government interest in tapping outside expertise in the form of managed security services. This story will identify those cybersecurity systems, operations and related procedures that can be outsourced most successfully. It will also provide tips for selecting providers and managing contractor performance.

Writer: Douglas Beizer (dbeizer AT1105govinfo DOT com)

Posted by John Stein Monroe on Sep 02, 2008 at 12:20 PM


  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

  • Cloud
    cloud migration

    DHS cloud push comes with complications

    A pressing data center closure schedule and an ensuing scramble to move applications means that some Homeland Security components might need more than one hop to get to the cloud.

Stay Connected


Sign up for our newsletter.

I agree to this site's Privacy Policy.