A new survey suggests federal information technology managers expect to adopt Microsoft’s new Windows 7 operating system more broadly and more quickly than they did with Microsoft’s Vista OS.
Although the Social Security Administration's IT infrastructure is providing reliable service to state and federal agencies, internal pressures and continued growth in demand for data make planning for the future imperative, GAO says.
Federal agencies could eventually save 85 percent of their yearly IT infrastructure budgets by moving operations to either a public, private or hybrid cloud, according to a study by Booz Allen Hamilton.
The first specifications for the Government IPv6 test program are being released by NIST for a 30-day comment period.
We highlight 10 high-impact IT projects in government projects — and the men and women behind them — that have earned this year’s GCN Award for Agency IT Achievement.
The DHS inspector general has found vulnerabilities related to uneven security patch management in the department's nine most popular Web sites.
An agreement continues ICANN’s system-wide governance of the Internet’s core domain names and IP addresses for the foreseeable future. But it also calls for a transparent, multi-stakeholder, private-sector-led model for running the international network.
The Homeland Security Department is considering getting rid of all functional categories and allowing broad competition for the possible EAGLE II-Unrestricted acquisition vehicle.
As the pool of IPv4 addresses dries up, agencies need to begin planning now for an Internet whose growth will be in the IPv6 address space, according to American Registry for Internet Numbers President John Curran.
Lawmakers are told that, despite improvements in management of large-scale IT programs, DHS efforts to consolidate a sprawling IT infrastructure while bringing new mission capabilities online are hampered by inadequate oversight.
A study of six months worth of data about cyberattacks and patch management show that unpatched applications are the chinks in network defenses that are being exploited by criminals and nation-states.
A failure to realize the process changes involved has doomed some identity management systems, but there have also been successful deployments. And integrated identity management and access control suites are making it easier to achieve the desired result.