Latest ""
Federal workers, both Democrat and Republican, eager to vote this fall
Past behavior shows this population will show up big at the polls. How feds will vote is less clear.
Ask Reg: Once I retire, do I get more money for unused sick leave?
Leave payout in your annuities can give your retirement check a boost.
Is telework a ‘reasonable accommodation’ for pregnant federal workers?
The EEOC regulation also stipulates accommodations for workers seeking abortions or infertility treatments.
Leave benefit for feds getting COVID-19 booster shots upheld by OPM
"The administration strongly encourages federal employees to get recommended doses of updated COVID-19 vaccines."
Opinion
How to boost customer experience with secure cross-agency data sharing
The Federal Data Strategy directs agencies to assess and proactively address the procedural, regulatory, legal and cultural barriers to sharing data.
By Evan Davis
Feds to make moving government jobs abroad easier for military spouses
The Pentagon and State Department will make it easier for military spouses to take federal civilian jobs overseas following a permanent change of station.
By Karen Jowers
When is Tax Day this year?
Every April, Tax Day comes around as the official filing deadline for Americans to submit income tax returns to the federal government.
Ask Reg: How does military buyback affect my leave balance?
SCD Retirement reflects service time that is credited toward your retirement eligibility.
Biden administration finalizes rule to prevent return of Schedule F
Former President Donald Trump had sought to reclassify tens of thousands of federal employees into at-will status, making them easier to dismiss.
Opinion
How federal agencies can separate AI hype from reality
Be wary of claims that an AI solution can effortlessly scale to meet any demand. Scalability is a significant challenge in AI.
By John Mark Suhy
Opinion
Adding to regulatory burdens doesn’t necessarily improve cybersecurity
Pursuing such policies may actually reduce national security by diverting resources from legitimate activities to secure networks and systems.
By Liselotte Odgaard and Roslyn Layton