President Obama's meeting with leading technology executives reaffirmed the importance of tackling challenges in smaller chunks, holding leaders accountable, while still respecting regard for privacy, writes Robert Holleyman, CEO of Business Software Alliance.
According to J. Greg Hanson, the doomsday scenario of the Y2K bug never played out, thanks to many technology and business professionals who worked hard to make it a non-event. But while the predicted disaster wasn't significant, the effort to avert it certainly was, and we have been reaping the benefits ever since.
Acquisition target makes products for business process management.
When learning a DNS management system, avoid the vendor’s support if you can and don’t be afraid to take a hands-on approach.
When its old DNS-DHCP solution reached its end of life, Idaho’s largest university went shopping for more functionality and ease of management for its large, complex network.
Inadequate staffing and poor program management have caused delays in development and implementation of the Veterans Affairs Department’s proposed Financial and Logistics Integrated Technology Enterprise.
The County of San Joaquin’s Information Systems Division has improved the county’s ability to manage arrests, issue warrants and maintain crime histories with a custom-built, Web-based system that links 1,600 users and 18 agencies countywide.
The Transportation Department is deploying Métier's WorkLenz project and portfolio management software to streamline management of its $3 billion IT portfolio, improve its mandated OMB reports and comply with IT Dashboard requirements.
Cloud computing still has a lot of uncertainties -- among them a lack of maturity among many of its potential services -- but the path toward this nest era of enterprise computing is beginning to take shape.
Web 2.0 is great technology that has a role in all public-facing government Web sites and in the next wave of application development, but don't confuse its use with the less glamorous side of transparency.
The national laboratory overseeing the nation’s nuclear stockpile has some serious security shortfalls, according to auditors.
At the International Semantic Web Conference, data linking experts gave examples of how linking government data can work — one involving agency spending data and one on sharing IT architectures.
The specifications provides an overview of the Security Content Automation Protocol and how developers can integrate it into their product.
The Data.gov concept of operations document sets out an evolutionary path for accessing federal datasets, involving both outward improvements for consumers of the site and inward improvements to agency processes.
GSA's David McClure outlines IT issues requiring added attention during panel on collaboration and transparency at IAC-ACT's Executive Leadership Conference.