Modernization
Stimulus law Web site in flux
An online dialogue to improve the Recovery.gov Web site functioned better than an RFI, according to the National Academy of Public Administration's analysis.
Cybersecurity
New bill seeks to replace Real ID with PASS ID
Legislation that proponents say could revitalize the moribund Real ID program would do so by removing expensive and controversial information technology requirements from current law. However, critics said the new bill would not really solve the problems they see with the program.
People
Spacebook launches at NASA Goddard
NASA’s Goddard Space Flight Center has developed a homegrown social-networking application that provides all NASA employees with the types of features found in Facebook but in a secure environment.
Digital Government
What is 'meaningful use?'
The Health IT Policy Committee is revising a proposed framework for defining and setting benchmarks for meaningful use of health IT.
Cybersecurity
Lawmakers differ on DHS data center funding
House and Senate bills to fund the Homeland Security Department in fiscal 2010 are at odds over how much money to give DHS for its data center consolidation program.
Cybersecurity
DOD's cyber command takes shape
Defense Department officials are ironing out the details of a new major military command in charge of DOD’s cyber mission. However, they have not made a formal announcement that spells out the new command's scope.
People
Editor's Desk: All in moderation
What do you think? I mean, really. We’d like to know what’s on your mind, writes FCW Editor-in-Chief David Rapp.
Cybersecurity
DHS centralizes cybersecurity programs
Homeland Security Secretary Janet Napolitano said DHS' many cybersecurity functions have been centralized under Philip Reitinger.
Modernization
HUD expands multilingual Web site
HUD site offers information about fair housing to people with limited English skills.
Digital Government
Veterans Affairs CIO launches bold plan to stop IT project failures
Program managers must meet milestones to deliver system components in six months or less, or face removal from a project.
Cybersecurity