People
Be adaptable, SSA's CIO tells program managers
Thomas Hughes said predicting trends and focusing on agencies' missions should be their main goals.
People
Mike Butler wants to card you
Leader of GSA’s smart card program will use his vision to guide the HSPD-12 effort
People
Power Players | 1 - Rep. Henry Waxman (D-Calif.)
Chairman of the House Oversight and Government Reform Committee.
People
Power Players | 2 - Karen Evans
Administrator of e-government and information technology at the Office of Management and Budget.
People
Power Players | 3 - David Wennergren
Deputy assistant secretary of Defense for information management and technology and deputy chief information officer and vice chairman of the CIO Council.
People
Power Players | 4 - Shay Assad
Director of procurement and acquisition policy at the Defense Department.
People
Power Players | 6 - Rep. Tom Davis (R-Va.)
Ranking member of the House Oversight and Government Reform Committee.
People
Power Players | 7 - Scott Charbo and Robert Howard
Charbo is chief information officer at the Homeland Security Department, and Howard is CIO at the Veterans Affairs Department.
People
Power Players | 8 - Martha Dorris, Venkatapathi Puvvada and Leslie Steele
Dorris is president of the American Council for Technology, Puvvada is chairman of the Industry Advisory Council, and Steele is executive vice chairwoman of IAC.
People
Power Players | 9 - Paul Brubaker
Administrator of the Transportation Department’s Research and Innovative Technology Administration.
People
Power Players | 10 - Anne Armstrong and Neal Vitale
Armstrong is president and group publisher of 1105 Government Information Group and Vitale is president and chief executive officer of 1105 Media.
Digital Government
Technology briefs
Adobe PDF bug jeopardizes securityThe Adobe PDF could be used to compromise a system running on Microsoft Windows XP, Adobe confirmed last week week. Remote code embedded in a PDF could be executed in Versions 8.1 and earlier of Adobe Reader, Adobe Acrobat or Acrobat Elements. Adobe Acrobat 3D is also vulnerable. All those programs must be used in conjunction with Internet Explorer 7 to trigger the exploitation. According to the SANS Institute, which…
People
FEMA readies emergency system
Web-based disaster response system will push timely information to first responders
Digital Government
Wagner: Why SOA matters
Service-oriented architecture might seem difficult, but it offers government a way out of the swamp
People
Welles: Avoid e-mail drudgery
Cleaning up message clutter simply requires following these 9 principles of organization
Acquisition
Kelman: The art of negotiation
Many contracting officials are showing business savvy on behalf of the government. GSA should help them.
People