The federal IT Dashboard might lack the capabilities of more robust applications in managing large-scale IT projects. But it does something those applications can’t by providing an increasingly comprehensive picture of where federal IT dollars are going — and, in some cases, going to waste.
Federal Web sites are finding innovative ways to serve the public that complement, if not rival, what’s taking place in the private sector.
Cloud computing -- and its potential effect on future government technology initiatives -- finds its way onto the congressional stage.
The long-awaited Senate cybersecurity bill, introduced by Sens. Joe Lieberman, Susan Collins and Thomas Carper, succeeds in providing a greater good in defending against cyberattacks and deserves to be enacted.
The move toward cloud computing will likely be a long one for agencies. But as of May 20, there’s no doubt it is well underway.
New legislation that would give the cybersecurity coordinator post new authority, including budget control, comes as welcome news.
A new interagency approach to streamlining the security certification of shared software holds promise for government cloud computing.
New GAO reports make clear how difficult it is making governmentwide changes in institutionalized IT practices.
The problem with legislating new information security practices is how quickly technologies evolve and unleash new and unforeseen kinds of threats. The better alternative, most experts agree, is instituting sound risk management disciplines.
The residence of clouds and data will become increasingly important -- and so will the aging and conflicting laws that govern data.
The 2011 budget proposal — the first the Obama administration can call its own — reinforced the administration's emphasis on gathering and communicating performance information to improve outcomes and strengthen problem-solving networks.
The burst of activity in Forge.mil suggests that government is not only learning how to embrace open-source software in applications once reserved for proprietary projects, but that open source is becoming an increasingly important resource for it, Editor Wyatt Kash explains.
The ability of hackers to get past network defenses and siphon source code from one of the world's most resourceful technology players is a stark reminder -- as if we needed one -- of the need for faster and more comprehensive national cyber security reforms.
Although military policies have hindered the adoption of many consumer technologies, you might be surprised that one of the nation’s most advanced networks for supporting mobile workers is emerging from the Army.
Cloud computing still has a lot of uncertainties -- among them a lack of maturity among many of its potential services -- but the path toward this nest era of enterprise computing is beginning to take shape.