Common Desktop, the Foundation for IC ITE, Expands Footprint Common Desktop, the Foundation for IC ITE, Expands Footprint
Common Desktop, the Foundation for IC ITE, Expands Footprint
GEMG 250×250
ATARC FISS 250×250
gdit cloud 250×250
Brainstorm Cyber 250×250
Celebrate AFCEA 250×250
WAMU Spark 250×250
GM 250×250

Sign Up For Our Newsletter

Fields marked with an * are required

Stay informed!
Get GovTechWorks delivered to your inbox

Latest Articles

Talking Tech: Bringing Stakeholders Together

Talking Tech: Bringing Stakeholders Together

Connecting emerging technologies to the government agencies that can put them to work is a critical mission for the Advanced Technology Academic Research Center. The center helps foster communication and exchange between government, industry and academia.

NICE Rewrites the Rules for Cyber Certs at DHS

NICE Rewrites the Rules for Cyber Certs at DHS

The Department of Homeland Security is using the National Initiative for Cybersecurity Education (NICE) to redefine cyber jobs and recruit cyber talent. Cyber certifications may never be the same.

State & Local

To Do Agile Development, Contractors Should Be Agile, Too

Innovation in government demands flexibility – from developers, system users and contracting officers, alike.

Read More

What's New

7 Habits of Highly Successful Cloud Pioneers

Why are some agencies so far ahead of others in cloud adoption? What makes early adopters successful while wary skeptics cling to their servers? Here are seven key things any organization can do to accelerate cloud adoption today.

Cyber Pros Log into Desktop Cyber Training – For Free

The Cybersecurity Online Learning program delivers continuing education to .gov or .mil agency system administrators, computer information security officers and other government cyber pros at no charge, a cost that can’t be beat.

GEMG Tower

Talking Tech Videos

What We’re Reading

Renee-Wynn

NASA’s ‘act of desperation’ Demonstrates Continued Cyber Deficiencies

One of NASA’s main networks used by almost every employee and contractor and managed by Hewlett Packard Enterprise is in such bad shape, the agency’s chief information officer could no longer accept the risk and let the cybersecurity authorization expire.

0 comments
GSA Logo

GSA’s 4th Quarter Buying Event Turns Category Management Talk Into Action

Over the last few years, there has been a lot of talk about the goals of the Obama administration’s category management initiative, particularly around getting agencies to buy as one entity.

0 comments
Terry Halvorsen

DoD Unveils New IT ‘way forward’

Defense Department officials in a document released Aug. 18 outlined a new plan for getting ahead in information technology, focusing heavily on commercial capabilities, cybersecurity and updates to how the Pentagon manages IT.

0 comments
NSA

Powerful NSA Hacking Tools Have Been Revealed Online

Strings of code were released to the Internet by a group calling themselves “the Shadow Brokers”. They claim the code is a tool that can be used to hack into any computer.

0 comments
contracts

DoD Now Awarding More Than Half Its Contract Spending Without Competitive Bids

This week marks the two-year point since the Defense Department — worried that only 56.5 percent of its contracted dollars involved a meaningful competition between two or more vendors — issued a series of corrective actions to reverse a downward slide that’s been ongoing for nearly a decade.

0 comments
Pentagon

What’s In Pentagon Newly Released IT Vision?

Defense Department officials in a document released Aug. 18 outlined a new plan for getting ahead in information technology, focusing heavily on commercial capabilities, cybersecurity and updates to how the Pentagon manages IT.

0 comments
Airforce-coms

There’s a Big Loophole in the Pentagon’s Guide to Eavesdropping

The new rules reflect a shift in intel-gathering from phone-tapping to capturing conversations on the internet.

0 comments
Fed-IT-Admin

Federal IT Administrators Struggle With Legacy Systems

A new survey shows that despite prioritizing system upgrades, 71 percent use old operating systems to run important applications.

0 comments