We highlight 10 high-impact IT projects in government projects — and the men and women behind them — that have earned this year’s GCN Award for Agency IT Achievement.
The IRS recorded more than 51,000 cases of taxpayer identity theft in 2008 and paid out $15 million in fraudulent refunds, and a GAO report finds that internal information security weaknesses constitute some of the most significant challenges faced by the agency.
The DHS inspector general has found vulnerabilities related to uneven security patch management in the department's nine most popular Web sites.
Preserving millions of physical items in LOC collections and the terabytes of new data being produced so that they will be accessible in a digital future.
The new agreement under which ICANN will run the Internet’s domain name and addressing system is part of an evolution away from U.S. stewardship of the global network, increasing the role of other nations but not eliminating the United States' “special role” in Internet governance.
For the first time, online traffic to government Web sites in the United Kingdom from social-networking sites and forums has surpassed the amount of traffic the government sites received from news and media sites.
Google introduced a coding plug-in for Web site developers that instructs Microsoft Internet Explorer browsers to use Google Chrome technologies.
Following the lead of Amazon, the General Services Administration has gotten into the online sales business, launching a storefront operation called Apps.gov that resells online information technology services.
Republican Rep. John Culberson of Texas is using technology from SharedBook to invite his constituents to participate in, comment on and debate a pending health care bill in the House of Representatives.
The Defense Department has taken the federal lead in deployed cloud computing solutions. Let’s look at four examples of DOD’s cloud efforts and five lessons other agencies can learn from the department’s experience.
The current status of IPv6 networking in no way ensures security, but agencies can begin working with vendors now to ensure that better security is built in by the time the new protocols are in general use.
In a speech Monday at the Brooking Institution, Julius Genachowski said he wants to adopt formal rules to ensure that Internet carriers do not unduly interfere with traffic on their networks.