Advertisement

You will be redirected to the page you want to view in  seconds.

 IT management

  1. Centers for Medicare and Medicaid Services Administrator Marilyn Tavenner, shown testifying on Healthcare.gov's initial enrollment troubles, has overseen a site and application process revamp. Mark Wilson/Getty Images

    Healthcare.gov preps for onslaught during open enrollment

    Overhauled site will face more consumers than ever before beginning Nov. 15.

    • Oct. 24, 2014
  2. SEWP IV contracts can be extended while SEWP V protests are decided, according to Program Manager Joanne Woytek. Rick Kozak/Federal Times

    Protests delay implementation of SEWP V contracts

    GAO is reviewing four bid protests for NASA's IT GWAC.

    • Oct. 24, 2014
  3. DHS Federal Network Resilience Director John Streufert gave a revised timeline for CMD solicitations and awards. Mike Morones/Staff

    Remaining CDM solicitations delayed to December and beyond

    Majority of contract award announcements expected by August.

    • Oct. 23, 2014
  4. Blake Hall (left), founder and CEO of ID.me, and Kimberley Little Sutherland (right), senior director of market planning for identity management for LexisNexis. Photos courtesy ID.me and LexisNexis

    ID management secondary focus of executive order

    Third section of an E.O. on payment cards includes mandates for securing access to citizen data.

    • Oct. 23, 2014
  5. Tech expert Ashkan Soltani will be joining the FTC as chief technologist in November. Chip Somodevilla/Getty Images

    Investigative reporter to join FTC as chief technologist

    Former reporter and technical expert Ashkan Soltani to return to FTC in November.

    • Oct. 23, 2014
  6. Sanjeev 'Sonny' Bhagowalia was appointed as the new CIO for the Treasury Department. Colin Kelly/Army Times Publishing Co.

    Hawaii's first CIO joins Treasury

    Sonny Bhagowalia returns to federal life to lead Treasury Department's IT efforts.

    • Oct. 22, 2014
  7. The Galaxy S 5 is one of several Samsung mobile devices approved to handle classified government data. Donald Bowers/Getty Images

    Samsung Galaxy devices approved for classified use

    Galaxy devices are first commercial mobile tech to make the government's classified list.

    • Oct. 22, 2014
  8. An NOAA employee allegedly downloaded restricted information about the nation's dams. Ethan Miller/Getty Images

    NOAA employee indicted on theft of infrastructure data

    Weather Service hydrologist charged with downloading restricted data on dams.

    • Oct. 21, 2014
  9. Ted Girard, Vice President, Delphix Federal? Courtesy

    Virtualization is key to consolidation

    Since the Federal Data Center Consolidation Initiative (FDCCI) was launched in 2010, modernization of legacy IT infrastructure has been a hot topic.

    • Oct. 20, 2014
  10. Man Looking At Computer Screen (Thinkstock) Chad Kawalec / Getty Images/Hemera

    'Operation DeathClick' targets defense contractors

    Cybersecurity analysts suggest attacks on federal systems not far behind.

    • Oct. 17, 2014
  11. Tom Sasala Mike Morones/Staff

    Pentagon's virtualized desktop infrastructure reaches 18,000 computers

    CTO Thomas Sasala: The program is living up to the promise of easier desktop management.

    • Oct. 17, 2014
  12. A security firm's logo for the Sandworm vulnerability. The name and image derive from Frank Herbert's science-fiction novel Dune. iSIGHT Partners

    Microsoft-based systems at risk from 'Sandworm' vulnerability

    Security gap in Microsoft products has been used to breach an American university, systems in Europe.

    • Oct. 16, 2014
  13. The market shift to converged services is 'foundational,' accordingt to Stan Soloway, president and CEO of the Professional Services Council. File

    Survey: Feds slow in adopting converged technology, services

    Only one in five have plans to procure software, infrastructure as a service.

    • Oct. 14, 2014
  14. The Obama administration is accelerating cybersecurity efforts within federal agencies and in the sectors responsible for critical infrastructure, said Michael Daniel, White House cybersecurity coordinator. Mike Morones

    White House working around cyber bill impasse

    The White House's top cybersecurity official said it's not more power the Obama administration is after it's getting organizations involved to head in the same direction.

    • Oct. 13, 2014
  15. Dr. Neil Evans, a Primary Care Internist at the Veteran's Medical Center, goes over records from a recent check-up with his patient, Renaldo Cade. (James J. Lee/Military Times Staff) James J. Lee/Military Times Staff

    VA announces $22.3B IT services contract

    Ceiling ranks T4NG contract third highest among RFPs expected in fiscal 2015.

    • Oct. 10, 2014
  16. Cray's Sonexion data storage system is included in a new DoD contract. Cray

    Cray takes DoD supercomputer contract

    The agreement comes through DoD's High Performance Computing Modernization Program.

    • Oct. 9, 2014
  17. Dr. Joseph JaJa (left) and Dr. Anupam Joshi (right). (USM) University System of Maryland

    Players picked for first federally-funded R&D center for cybersecurity

    MITRE Corp. and University System of Maryland will join NIST to help private industry solve cybersecurity problems.

    • Oct. 7, 2014
  18. A recent IG report found the Energy Department lacks a software asset management system and a full inventory of licenses. Randy Montoya

    Energy continues to overspend on software purchases

    IG report shows some progress in following the department's software purchasing policy, but not enough.

    • Oct. 6, 2014
  19. Jim Ghiloni, program executive officer (vice director) of GSA's One Acquisition Solution for Integrated Services program,in Crystal City, Virginia. Mike Morones/Staff

    What's different about OASIS?

    Jim Ghiloni, GSA's PEO for OASIS, on the role the contract will play for the federal government.

    • Oct. 3, 2014
  20. Michael Bruemmer is the vice president for Experian Data Breach Resolution.

    Data breaches: Be prepared or prepare to pay

    Experian's Michael Bruemmer explains how to prep your agency for a data breach.

    • Oct. 3, 2014
  21. DHS has been pushing for proactive scanning of agency networks, according to Deputy Undersecretary for Cybersecurity and Communications Phyllis Schneck. Rob Curtis/Staff

    New policy requires DHS to scan civilian systems

    OMB guidelines give Homeland Security power to perform regular security scans of other agencies.

    • Oct. 3, 2014
  22. Nitin Pradhan, managing partner of GOVonomy and former Transportation Department CIO, says agencies should purchase commerical off-the-shelf tech rather than put out requests for proposals. Rob Curtis/Staff

    Why agencies should embrace commercial tech

    GOVonomy co-founder Nitin Pradhan on the benefits of dropping RFPs and buying COTS.

    • Oct. 3, 2014
  23. Mark Forman is vice president for IT services and cloud initiatives at TASC Inc. Mark, who and holds the distinction of being the federal government's first CIO and administrator for E-Government and IT, possesses over 29 years' experience in IT and acquisition reform in the legislative and executive branches of government as well as in industry.

    6 fundamentals of project-management success

    TASC's Mark Forman shares the commom traits of successful project managers.

    • Oct. 3, 2014
  24. Challenge.gov launched to simplify competitive innovation

    A revamped Challenge.gov is giving federal agencies a central location to advertise and track competitive challenges used to spur innovation from the private the sector.

    • Oct. 3, 2014
  25. The Bureau of Labor Statistics projects a deficit of 1 million IT professionals and computer programmers by 2020. EPA

    Job training grants heavily favor IT, cybersecurity sector

    New wave of grant awards highlights need for more computer science grads.

    • Oct. 2, 2014
  26. Some agencies are embracing virtual desktop infrastructure, which allows employees remote access to agency data on personal devices but no storage capabilities. Mike Morones/Staff

    Emerging tech offers advanced security for BYOD programs

    Virtualization may be key to agency-approved use of personal devices.

    • Oct. 2, 2014
  27. Rep. Mike Rogers warns that 85 percent of critical networks are vulnerable. Chip Somodevilla/Getty Images

    U.S. not ready to launch offensive cyber attacks, says congressman

    As a House committee drafts a policy for cyber action, it remains uncertain that it will become effective anytime this year.

    • Oct. 1, 2014
  28. Woytek

    NASA awards SEWP V IT contracts

    Ordering from the latest version of the long-running IT GWAC begins Nov. 1.

    • Oct. 1, 2014
  29. iRobot's 510 PackBot, a bomb disposal and surveillance tool, can climb stairs and lift up to 15 pounds. iRobot

    Small unmanned systems find growing security role

    UAVs are just one piece of the universe of unmanned systems.

    • Sep. 29, 2014
  30. Social Security Administration's use of mobile technology needs to be supported by a better mobile policy. ADEK BERRY / AFP/Getty Images

    Social Security's lack of mobile policy leaves critical weaknesses

    IG report warns lack of comprehensive policy leaves agency vulnerable.

    • Sep. 29, 2014
  31. Mikey Dickerson, administrator of the newly created U.S. Digital Service. Whitehouse.gov

    Report: CIOs should follow Digital Service Playbook

    The first in series of independent reports endorses one of the new service's early efforts.

    • Sep. 26, 2014
  32. Shah, Executive Vice President, Octo Consulting Group Stephanie Zbinden

    How IT advances can improve grant management

    Semantic Web and linked-data technologies are changing the way we access and interact with complex data environments.

    • Sep. 26, 2014
  33. Network modernization is key to leveraging big data

    If agencies are willing to make the investment in trends like big data, cloud and mobility, it is critical to also invest in IT infrastructure.

    • Sep. 26, 2014
  34. The Department of Health and Human Services aims to have a health IT system with data flowing freely between care providers and researchers so patients receive care based on timely information. Sheila Vemmer/staff

    HHS spearheads health data interoperability work

    A shared roadmap will improve the ability of healthcare organizations to share information.

    • Sep. 25, 2014
  35. The FBI's Sentinel system, despite improvements, still has user-interface weaknesses, IG finds. FBI

    IG: User issues persist with FBI Sentinel project

    Search and indexing functions in particular need improvement, auditor says.

    • Sep. 23, 2014
  36. Justice's LawJobs app. Department of Justice

    Justice launches new 'Law Jobs' app

    The app 'aligns with President Obama's digital government strategy'

    • Sep. 22, 2014
Industry Circle

Your free source for the latest insights, trends, technology and forward thinking from industry leaders.

Visit industrycircle.com today!