Skip to main content

Become an Insider

Sign up today to receive premium content!

Sign Up
Home Home MENU
Log in

Mobile menu

  • Topics
  • Agencies
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • More
    • Reviews
    • News
    • Events
    • White Papers
    • Must Follow Influencers
    • Feds in the Field
    • CapITal
    • 2020 Census
    • Windows 10 Migration
    • Election Security
    • About Insider
  • Search

Main menu

  • Topics
  • Agencies
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • More
    • Reviews
    • News
    • Events
    • White Papers
    • Must Follow Influencers
    • Feds in the Field
    • CapITal
    • 2020 Census
    • Windows 10 Migration
    • Election Security
    • About Insider
  • Search
  • Energy & Utilities
  • Enterprise
  • Financial Services
  • Legal
  • Manufacturing
  • Nonprofit
  • Retail
  • Small Business
  • Sports & Entertainment
  • Startups

Trending Now

  • Cloud
  • Data Analytics
  • Data Center
  • Digital Workspace
  • Hardware
  • Internet
  • Management
  • Networking
  • Security
  • Software

Trending Now

Windows 10 tips and tricks

Software

Manage Windows 10 Settings for Better Performance

Data security illustration

Security

Q&A: As Agencies Seek Resilience After Cyberattacks, Tools Adapt to Meet New Needs

What is a cybersecurity audit

Security

What Is a Cybersecurity Audit and Why Is It Important?

FedTech IT Influencers
30 Federal IT Influencers Worth a Follow in 2021
Jul 29 2021

Federal technology leaders offer insights and thought leadership on a sharp rise in cyberattacks, the shift to hybrid work and much more.

FedTech q1 2022 cover

FedTech Magazine

Current Issue | Archive
  • twitter
  • feed

Articles By Elizabeth Neus

Elizabeth Neus
About the Author:

Elizabeth Neus is the managing editor of FedTech and the producer of FedTech's award-winning Feds in the Field video series. The Washington Nationals are her team; 80s Brit pop is her sound.

Follow On: Twitter
white hamburgers

Hardware

DARPA Plans to Make Replicators for Real

3D printing could provide edible 'biomass' in areas where food is scarce.

FT-Perf-5-9-22.jpg

Software

Software Factories for the Military Scale DevSecOps
GITEC zero trust

Security

With Initial Plans Submitted, Federal Agencies Begin the Journey to Zero Trust
FTQ2_GITEC_FutureOfWork_Webby

Digital Workspace

Data Aids Agencies in Making Personnel Decisions as Pandemic Eases
FTQ21_QA_Washington

Digital Workspace

Q&A: USDA CIO Gary Washington Traces the Agency’s Telework History
FTQ2_QA_Roat

Management

Q&A: Deputy Federal CIO Maria Roat Looks Back at an Innovative Career
High performance computing

Data Center

Q&A: HPC Solutions Work for Agencies and Projects of All Sizes
Data security illustration

Security

Q&A: As Agencies Seek Resilience After Cyberattacks, Tools Adapt to Meet New Needs
Army CIO Dr. Raj Iyer seen at the Pentagon’s Hall of Heroes Dec. 15, 2020, to recognize Farhan Khan for his new role as Director of Architecture, Data and Standards.

Management

Q&A: Army CIO Raj Iyer Leads a New Digital Strategy
An F/A-18E Super Hornet assigned to the Eagles of Strike Fighter Squadron One Five (VFA-115) on the flight deck aboard USS Ronald Reagan (CVN 76), awaiting the next launch cycle.

Management

Q&A: Air Force CIO Lauren Knausenberger Moves the Service in an Agile Direction
U.S. flag made of computer code

Security

Imagine Nation ELC 2021: Biden’s Executive Order on Cybersecurity Creates a Map to a Safer Future
  • Load More Stories

aaa 1

Register

Advertisement

Trending Now

Windows 10 tips and tricks

Manage Windows 10 Settings for Better Performance

Data security illustration

Q&A: As Agencies Seek Resilience After Cyberattacks, Tools Adapt to Meet New Needs

What is a cybersecurity audit

What Is a Cybersecurity Audit and Why Is It Important?

blue maze

Fact or Fallacy: Sorting Out the Concerns About Zero Trust

Join FedTech as we cover Imagine Nation ELC 2019

Event

Imagine Nation ELC 2019

Subtopics

Hashing vs. Encryption: What’s The Difference?

Security

What Is the Difference Between Hashing and Encryption for Federal Agencies?

FedTech

Technology Solutions That Drive Government

  • About Us
  • Contact Us
  • Privacy
  • Terms & Conditions
  • Site Map
  • FedTech:

  • CDW:

Visit Some Of Our Other Technology Websites:

  • BizTech
  • EdTech
  • StateTech
  • HealthTech

Tap into practical IT advice from CDW experts.

Visit the Research Hub

Get FedTech in your Inbox Browse Email Archives
newsletter screenshot
Subscribe to FedTech Magazine Browse Magazine Archives
FedTech q1 2022 cover
Back To Top

Copyright © 2022 CDW LLC 200 N. Milwaukee Avenue, Vernon Hills, IL 60061