People

Be adaptable, SSA's CIO tells program managers

Thomas Hughes said predicting trends and focusing on agencies' missions should be their main goals.

Ideas

Visit DHS Privacy Web Site -- Please

None

People

Mike Butler wants to card you

Leader of GSA’s smart card program will use his vision to guide the HSPD-12 effort

People

Power Players | 1 - Rep. Henry Waxman (D-Calif.)

Chairman of the House Oversight and Government Reform Committee.

People

Power Players | 2 - Karen Evans

Administrator of e-government and information technology at the Office of Management and Budget.

People

Power Players | 3 - David Wennergren

Deputy assistant secretary of Defense for information management and technology and deputy chief information officer and vice chairman of the CIO Council.

People

Power Players | 4 - Shay Assad

Director of procurement and acquisition policy at the Defense Department.

People

Power Players | 5 - David Walker

Comptroller General of the United States.

People

Power Players | 6 - Rep. Tom Davis (R-Va.)

Ranking member of the House Oversight and Government Reform Committee.

People

Power Players | 7 - Scott Charbo and Robert Howard

Charbo is chief information officer at the Homeland Security Department, and Howard is CIO at the Veterans Affairs Department.

People

Power Players | 8 - Martha Dorris, Venkatapathi Puvvada and Leslie Steele

Dorris is president of the American Council for Technology, Puvvada is chairman of the Industry Advisory Council, and Steele is executive vice chairwoman of IAC.

People

Power Players | 9 - Paul Brubaker

Administrator of the Transportation Department’s Research and Innovative Technology Administration.

People

Power Players | 10 - Anne Armstrong and Neal Vitale

Armstrong is president and group publisher of 1105 Government Information Group and Vitale is president and chief executive officer of 1105 Media.

Digital Government

Technology briefs

Adobe PDF bug jeopardizes securityThe Adobe PDF could be used to compromise a system running on Microsoft Windows XP, Adobe confirmed last week week. Remote code embedded in a PDF could be executed in Versions 8.1 and earlier of Adobe Reader, Adobe Acrobat or Acrobat Elements. Adobe Acrobat 3D is also vulnerable. All those programs must be used in conjunction with Internet Explorer 7 to trigger the exploitation. According to the SANS Institute, which…

People

FEMA readies emergency system

Web-based disaster response system will push timely information to first responders

Digital Government

Wagner: Why SOA matters

Service-oriented architecture might seem difficult, but it offers government a way out of the swamp

People

Welles: Avoid e-mail drudgery

Cleaning up message clutter simply requires following these 9 principles of organization

Acquisition

Kelman: The art of negotiation

Many contracting officials are showing business savvy on behalf of the government. GSA should help them.

People

Updated homeland security strategy emphasizes resilience

The 62-page document outlines continued preparedness and prevention efforts, including border security, surveillance, biometrics and information sharing.

People

Ninth House hires VP for Federal Division

James Thorpe joins the company from IBM.