OMB's Data Center Optimization Initiative gives agencies new metrics and goals for fiscal 2018.
The Treasury Department and the Office of Management and Budget need to better monitor agencies' efforts to implement the Digital Accountability and Transparency Act, or they risk jeopardizing the law's timely enactment.
The Unified Shared Services Management office is asking industry how it can improve the way agencies pay federal employees.
Voting machines and the databases behind them don't clearly fall into any of DHS' categories of critical infrastructure, but some experts say that should change.
The Government Accountability Office plays a big role in determining whether agencies are successfully implementing FITARA.
The long-awaited update to Circular A-130 addresses a range of cybersecurity issues, including insider threats and feds' use of personal email accounts at work.
A new site, developed by OMB and USDS, gives feds a one-stop shop for information and best practices for digital services acquisition.
Savvy agency leaders are already integrating holistic ERM into decision-making processes as they wait for new guidance from OMB.
The contracting regime run by the Army's Computer Hardware, Enterprise Software and Solutions is moving into a new phase with big implications for federal IT acquisition.
Armed with data on their spending patterns, suppliers and markets, agencies can manage their demand for IT and shape suppliers' behavior.
GSA's inspector general says the agency must do a better job of ensuring the government receives competitive pricing from resellers, which often charge different prices on different contracts.
The administration has called for a $3.1 billion revolving IT Modernization Fund. That's a small share of the more than $80 billion agencies spend annually on IT, but still counts are real money. FCW puts it in perspective
IT COST Commission releases new taxonomy and metrics for managing IT spend, and says big agency savings can result from better data.
The Cloud.gov team details its ongoing efforts to secure a provisional authority to operate.
Cyberattacks will occur. Preparation is the key -- and civilian agencies could take a cue from the military’s sustained readiness model.
In the latest issue: Looking back on three decades of big stories in federal IT.
Get the full issue
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com