- Welcome Guest
- Sign In
Federal regulations designed to protect children's privacy cover the burgeoning mobile apps business as well as other online vehicles accessible through laptops or desktops. In fact, providers of mobile apps need to pay attention to the privacy impact not only of services offered specifically to children, but also those targeting the broader community that are nevertheless accessible to children...
A major initiative to improve federal information technology management, including IT procurement, got a boost recently, even though the person behind the reform had left federal service. Just days after taking over as federal chief information officer, Steven VanRoekel posted a blog supporting a new role for federal agency CIOs. ...
Managers of federal agency websites will be focusing on customer relations to meet the requirements of an ambitious program designed to improve the value of the government's online public resources. Over the next two months or so, agencies will be drilling down into their website mechanisms to determine whether their electronic presence truly meets the needs of the public -- in much the same way as a private sector firm measures audience satisfaction...
The U.S. government's new chief information officer wasted little time in directing federal agencies to significantly improve the way they manage information technology resources. Steven VanRoekel, who took over the federal CIO post on Aug. 4, quickly issued a directive designed to push agencies to meet an Obama administration goal for operating federal websites more efficiently.
U.S. government agencies are moving quickly to incorporate social media into their IT programs. For organizations with huge public constituencies, adopting Facebook, Twitter and YouTube as major communication channels makes a lot of sense. However, in the rush to utilize social media, federal agencies have had some misfires in their handling of privacy and security requirements...
The old sports maxim "There is no 'I' in team" is getting repackaged for use in the U.S. government's approach to acquiring information technology and related services. Federal agencies are being urged to utilize a team approach as they collectively spend US$80 billion per year for IT products and services ...
The U.S. government is actively pursuing a major shift in information technology operations that emphasizes the use of cloud technology. While this effort eventually may reduce the amount of "on-site" electronic equipment used by federal agencies, other forces are at work that will keep the government's demand for electronic devices and components at a high level. Throughout the federal government, agencies are shifting to using more portable devices such as laptops, cellphones, netbooks and tablets...
The Congressional debate over the U.S. budget has been in the limelight for months, but other critical issues are proving difficult to resolve as well. A case in point is the goal of lawmakers to develop a comprehensive national cybersecurity policy. There are many conflicting approaches to the issue, including a proposal offered by the Obama administration, a Senate bill, suggestions emanating from the House and trade group recommendations...
Federal agencies will be much more careful in how they spend taxpayer funds for information technology in the future. Proposed budget cuts and a new White House initiative designed to cut US$6 billion in professional services contracting underscore a significant change in IT procurement ...
As Washington hunkers down for an era of tight federal budgets, information technology vendors can take some comfort in a projected modest rate of growth in federal IT investments. Between 2011 and 2016, federal spending for IT should grow by 12 percent, in total, for an average compound annual rate of growth of about 1.7 percent. ...
When the U.S. government goes to the market for information technology, various contracting mechanisms come into play. In fact, as IT evolves, contracting follows, witness recent efforts at the General Services Administration to develop special procurement vehicles for both cloud technology and wireless services ...
Competing for federal contracts is tough -- and protesting the award of a federal contract may be even tougher. But a ruling by a federal agency appears to have improved the ability of all vendors -- not just IT firms -- to utilize key legal channels for protesting the award of federal contracts ...
The mushrooming use of wireless devices by the general public has spilled over to the federal government as agencies try to match their employees' personal use of mobile equipment with similar devices for use on the job. An emerging issue in federal mobile media use is that there is no overall government acquisition mechanism for acquiring wireless capabilities in any rational fashion...
Protecting sensitive information in the electronic age is a critical matter -- but the question of what the term "critical" really means has become a vexing problem for lawmakers dealing with cybersecurity issues. Equally challenging is defining the role that government should play in protecting all parties engaged in the use of information technology.
Thousands of federal employees will be using cloud-based email systems as government agencies take their first steps in meeting a mandate to inaugurate cloud services within their information technology systems. The White House has directed 25 large agencies to launch at least one cloud-migration project by the end of the year and two more by mid-2012...
Federal chief information officers appear to be heeding the unofficial Missouri state slogan: "I'm from Missouri -- Show Me." In a challenging time for procurement of IT systems and services, CIOs are trying to adopt improved methods for acquiring and managing information resources. ...
Information technology providers and politicians on both sides of the aisle are applauding the Obama administration for wading into the complex issue of cybersecurity. The administration issued its package of Internet security legislative proposals last week, spurring hopes that the U.S. Congress would approve a comprehensive national program this year...
Vendors seeking to provide cloud-based information technology to federal agencies now have some idea of the potential market for their offerings. The General Services Administration (GSA) has asked vendors to submit bid and qualification information that could lead to their selection as contractors for email systems operating via cloud platforms. ...
A key element in the shifting political winds in Washington is a call for less business regulation, especially from the conservative wing of the now ascendant Republican majority in the U.S. House of Representatives. ...
The Obama administration has come up with a proposal for both improving and simplifying identity protection for consumers using the Internet, computers, and mobile devices. The plan would greatly reduce the need for consumers to use and remember multiple passwords or fill out separate privacy forms for multiple online accounts ...
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/cybersecurity-collaboration.jpg
https://www.linuxinsider.com/story/can-public-private-partnerships-improve-open-source-security-177379.html
Can Public-Private Partnerships Improve Open-Source Security?
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/developer-happy.jpg
https://www.linuxinsider.com/story/post-open-licensing-could-offer-software-devs-funding-alternatives-177371.html
Post-Open Licensing Could Offer Software Devs Funding Alternatives
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/open-source-business.jpg
https://www.linuxinsider.com/story/open-source-experts-2024-outlook-for-ai-security-sustainability-177250.html
Open-Source Experts’ 2024 Outlook for AI, Security, Sustainability
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/09/crm-gears.jpg
https://www.linuxinsider.com/story/open-source-overhaul-revitalizes-pipeliner-crm-through-forced-rebuild-177361.html
Open-Source Overhaul Revitalizes Pipeliner CRM Through Forced Rebuild
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineers-code.jpg
https://www.linuxinsider.com/story/more-linux-malware-means-more-linux-monitoring-177174.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/smartphone-user-happy.jpg
https://www.linuxinsider.com/story/how-to-speed-up-a-suddenly-slow-android-phone-178982.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/07/Acer-Chromebook-Plus-516-GE.jpg
https://www.linuxinsider.com/story/acer-chromebook-plus-516-ge-redefines-gaming-style-computing-performance-179261.html
Acer Chromebook Plus 516 GE Redefines Gaming Style, Computing Performance
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/03/computer-programmer.jpg
https://www.linuxinsider.com/story/upgrade-to-ubuntu-pro-for-5-years-of-free-extended-support-177388.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/06/backup.jpg
https://www.linuxinsider.com/story/essential-tips-for-reliable-linux-backups-177398.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/02/IT-team.jpg
https://www.linuxinsider.com/story/cyber-forecast-for-2023-and-beyond-hang-on-for-a-bumpy-digital-ride-177752.html
Cyber Forecast for 2023 and Beyond: Hang on for a Bumpy Digital Ride
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/04/Noble-Numbat.jpg
https://www.linuxinsider.com/story/upgrading-to-ubuntu-24-04-lts-noble-numbat-step-by-step-guide-177359.html
Upgrading to Ubuntu 24.04 LTS Noble Numbat: Step-by-Step Guide