Digital Government

Demand for IT security workers heats up

Job postings on Dice reach all-time high.

People

A toxic work environment threatens acquisition personnel gains

Agencies have made progress in hiring talented acquisition professionals, but unreasonable scrutiny from all sides is encouraging risk avoidance and stifling innovation, according to the Procurement Round Table.

People

Accountability vs. performance

There's a big difference between complying with directives and actually improving performance, observes Steve Kelman.

Digital Government

The Army’s handheld radio war

The procurement is worth billions of dollars.

Modernization

All of Apple's new small stuff: iPad Mini and a slimmer iMac

Products will be available beginning in November and December.

Modernization

DISA seeks app store, device management

System ultimately could serve the entire Defense Department.

People

Obama remark gives sequestration hope

A remark in the Oct. 22 presidential debate has led to speculation about the prospect of averting budget cuts set to hit in January.

Cybersecurity

Why cyber threats in the states should worry Washington

Like the federal government, states are struggling with constrained budgets and talent shortfalls -- and their risks could bring trouble to the national level.

Emerging Tech

Smartphones aren’t mini computers

Move from Web to mobile is tougher than expected.

Digital Government

What to watch for in the lame-duck session

After the election and before inauguration, how will Congress address knotty issues such as sequestration?

Digital Government

Federal website satisfaction dips slightly

Transactional sites perform better than informational and recruiting sites.

Digital Government

Why we're still waiting on the 'Yelpification' of health care

Reviewing doctors -- what seems like a simple, effective way to empower and inform patients -- isn't so straightforward.

People

BYOD resistance explained

The adoption of 'bring-your-own-device' policies is slow in some agencies. At a recent event, experts explained some of the reasons and concerns.

Cybersecurity

BYOD can quickly become BYOM -- bring your own malware

Employers may find it easier and less costly to buy and maintain the devices employees need.

Cybersecurity

Risk management: An inside view

With no accepted common concept about what constitutes risk management in IT, management strategies are a challenge, argues a former agency CISO.