Developer documentation shows agile development practices were used in building the site. Here's where that could have hurt.
Development of large, complex systems requires a method that also allows a progressive discovery of project scope and dependencies, along with identification and mitigation of key risks.
Risk assessment programs weigh factors beyond the traditional considerations of parole boards and seem to be having an effect.
At the 2013 Executive Leadership Conference, industry and government leaders called for practices that could cut costs and show returns.
The program, which had been delayed by spending cuts and furloughs, is testing if DOD users can connect to commercial cloud services while maintaining security through CAC authentication.
Virtustream is working with Unisys to move the SAP-based system to the cloud as part of Interior's efforts to move to the cloud.
FCC approves technical rules and directs its Office of Engineering and Technology to begin equipment certification process for the nationwide public safety broadband network.
A LifeSize system, designed for long-range use, proves to be the right recording tool for sessions at George Washington University.
GuardedID, which defends against keylogging and other snooping malware, is being released for mobile devices as a software developers' kit.
The agency also consolidated all IT offices and staff under the leadership of GSA CIO Casey Coleman to eliminate duplication and streamline IT operations.