Sign Up for the Magazine

Departments

Tech Watch

If you're using Windows Server 2008, take a glimpse at ways to make use of its onboard virtualization tool, Hyper-V.

The Business of IT

It takes smart planning and preparation to cut over to a thin-client architecture.

Product Review

Counter security threats with solid endpoint security.

Product Review

Fortinet serves up one UTM box that lets you rule them all.

Best Practices

An IT pro offers advice on how to manage what may be a very destructive worm.

Tech Insights

Try these steps to gain and keep control of that seemingly endless flow of e-mail.

The Business of IT

As federal technology organizations begin to adapt to the new administration's goals, CIOs must address a pair of continuing, high-visibility concerns: IT security and budgetary constraints.

Bridging the Gap

As the government crafts broader metrics and benchmarks, consider energy-efficiency steps your IT shop can take now.

Best Practices

Preventing data leakage through your agency's system ports requires a smart plan of action combined with vigilant monitoring of your users' mobile devices.

Best Practices

Turn on TPM to help empower encryption.

Best Practices

To create successful metrics for security programs, keep your focus on measuring effectiveness, not performance.

Best Practices

Workarounds can help you adjust to the new OS.

Best Practices

Take your best shot at collaboration and surveillance using IP cameras.

FedTech Interview

General Services Administration CIO

Best Practices

Follow these tips to improve your network's performance.

Product Review

ATI graphics card lets power graphics users run multiple apps simultaneously.

The Business of IT

With preparation, CIOs can ready their federal IT shops to take a leading role in the transition.

Bridging the Gap

With a move to IP networks, VoIP fail-over and remote monitoring provide agencies a COOP option during a crisis.

Tech Insights

Six options for extending the life of older PCs.

Tech Insights

Take these steps to develop a successful program.

Best Practices

Before you apply NIST's templates for FDCC, make sure to take a few precautionary measures.

Tech Insights

Feds and experts relay 5 smart ideas for emergency notification.

Product Review

GuardianEdge Hard Disk Encryption protects data on mobile devices and removable media.

Features

Feature

Technologies that federal IT chiefs have their eye on for 2009.

Feature

A unique campus provides an enduring safeguard for the nation's collection of films, TV programs, radio broadcasts and sound recordings.

Feature

Agencies go beyond wireless hot spots to provide critical network connectivity anytime, anywhere.