Skip to main content

Become an Insider

Sign up today to receive premium content!

Sign Up
Home Home MENU
Log in

Mobile menu

  • Topics
  • Agencies
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • More
    • Reviews
    • News
    • Events
    • White Papers
    • Must Follow Influencers
    • Feds in the Field
    • CapITal
    • 2020 Census
    • Windows 10 Migration
    • Election Security
    • About Insider
  • Search

Main menu

  • Topics
  • Agencies
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • More
    • Reviews
    • News
    • Events
    • White Papers
    • Must Follow Influencers
    • Feds in the Field
    • CapITal
    • 2020 Census
    • Windows 10 Migration
    • Election Security
    • About Insider
  • Search
  • Energy & Utilities
  • Enterprise
  • Financial Services
  • Legal
  • Manufacturing
  • Nonprofit
  • Retail
  • Small Business
  • Sports & Entertainment
  • Startups

Trending Now

  • Cloud
  • Data Analytics
  • Data Center
  • Digital Workspace
  • Hardware
  • Internet
  • Management
  • Networking
  • Security
  • Software

Trending Now

Windows 10 tips and tricks

Software

Manage Windows 10 Settings for Better Performance

Data security illustration

Security

Q&A: As Agencies Seek Resilience After Cyberattacks, Tools Adapt to Meet New Needs

What is a cybersecurity audit

Security

What Is a Cybersecurity Audit and Why Is It Important?

FedTech IT Influencers
30 Federal IT Influencers Worth a Follow in 2021
Jul 29 2021

Federal technology leaders offer insights and thought leadership on a sharp rise in cyberattacks, the shift to hybrid work and much more.

FedTech q1 2022 cover

FedTech Magazine

Current Issue | Archive
  • twitter
  • feed

Articles By Wylie Wong

About the Author:

Wylie Wong is a freelance journalist who specializes in business, technology and sports. He is a regular contributor to the CDW family of technology magazines.

Follow On: Twitter
DOD training

Digital Workspace

Virtual Classrooms Expand Learning Opportunities for Federal Workers

The Army and the State Department deployed remote technology to provide mandatory employee training during the pandemic.

Mobile security

Security

Census Bureau Built Extra Security into Its Field Devices
Census Bureau

Digital Workspace

Census Goes All Digital with Door-to-Door Field Operations
Zero trust security

Security

Zero-Trust Architecture Gains Ground in Federal Cybersecurity
U.S. Senate

Digital Workspace

At the Senate’s First Virtual Hearing, an Expert Delivers Testimony from a Truck
Virtual meetings

Digital Workspace

Agencies Move Meetings Online as In-Person Conferences Disappear
Shadow IT

Cloud

Shadow IT Provides Clues to the Tech That Federal Workers Really Need
Indian Health Service

Management

How Agencies Can Leave Legacy IT Systems
The Census Bureau’s Device as a Service project will help enumerators capture as much data as possible, says the bureau’s Michael Thieme.

Digital Workspace

The Census Bureau Makes Device as a Service Count
The 55th Wing’s Recovery Operations Center staff works 16-hour shifts disseminating information to the base populace regarding the flooding caused by the Missouri River on March 19, 2019. The river breached the levee system, which widened the river’s footprint, covering half the base.

Data Center

3 Business Continuity and Disaster Recovery Tips for Feds
“We got personnel working again  within 96 hours  of the flood starting.” — Maj. Mike Scott,  55th Communications  Squadron, Offutt Air Force  Base, Nebraska

Data Center

How Disaster Recovery Plans Keep Agencies Running
  • Load More Stories

aaa 1

Register

Advertisement

Trending Now

Windows 10 tips and tricks

Manage Windows 10 Settings for Better Performance

Data security illustration

Q&A: As Agencies Seek Resilience After Cyberattacks, Tools Adapt to Meet New Needs

What is a cybersecurity audit

What Is a Cybersecurity Audit and Why Is It Important?

blue maze

Fact or Fallacy: Sorting Out the Concerns About Zero Trust

Join FedTech as we cover Imagine Nation ELC 2019

Event

Imagine Nation ELC 2019

Subtopics

Hashing vs. Encryption: What’s The Difference?

Security

What Is the Difference Between Hashing and Encryption for Federal Agencies?

FedTech

Technology Solutions That Drive Government

  • About Us
  • Contact Us
  • Privacy
  • Terms & Conditions
  • Site Map
  • FedTech:

  • CDW:

Visit Some Of Our Other Technology Websites:

  • BizTech
  • EdTech
  • StateTech
  • HealthTech

Tap into practical IT advice from CDW experts.

Visit the Research Hub

Get FedTech in your Inbox Browse Email Archives
newsletter screenshot
Subscribe to FedTech Magazine Browse Magazine Archives
FedTech q1 2022 cover
Back To Top

Copyright © 2022 CDW LLC 200 N. Milwaukee Avenue, Vernon Hills, IL 60061