Subscribe to the Free Print Edition!
Celebrating 25 Years
Sprint
researchstore


Industry Resources

IT security

“People are going to get in. We need to start designing a different strategy that accepts the network is permeable and designs around instead what’s on the network. The network isn’t valuable, it’s the data on the network, that at rest and being used.” Read More...


Desktop Services

Over the next 5 years virtualization and open source computing are going to dramatically increase productivity and radically transform the desktop environment. Read More...


Green Computing

The emphasis is not just on virtualization, it’s creating an ecosystem. The idea is to integrate the demand curve with cooling and electricity. Read More...


Information Sharing & Assurance

Information sharing is all about delivering the right information in the right format to the right person at the right time. Read More...


Virtualization

Virtualization – data center, desktop, application and OS – technologies can have far reaching positive impacts. It’s no wonder government is exploring how to make it work. And there is no shortage of suppliers who are eager to help government virtualize. Read More...


Managed Services

A Managed Service transfers day-to-day responsibility as a strategic method for improved effective and efficient operations. Typically, the provider is accountable for the functionality and performance while the client retains overall management responsibility. Read More...

2008 Tech Watch Reports:

Tech Watch: Mobile IT

Dynamic government is mobile; secure wireless is the norm; and anywhere, anytime access to data and robust IT applications are expected as baseline services. That’s not for future government, that’s for today’s government. Read More...


FPC-65 defines COOP as the activities that ensure essential functions are performed. This includes delineating essential functions; specifying succession plans and emergency delegations; safekeeping of vital records and databases; identifying alternate sites; providing interoperable communications; and validating the capability through tests, training, and exercises. Read More...


In a work environment where mobility is becoming the norm rather than the exception, users expect their technology to stand up to the rigors of being used in almost every imaginable condition. In short, they expect their technology to be as rugged as their real-lives are. Read More...

Virtualization sets up the platform for all the other things that make a server consolidated environment work well and allows you to leverage existing IT investments. Read More...


The journey is just beginning. As agencies move from FTS 2001 to Networx, the process of transforming the way your agency does business will begin to take shape. Whether an agency manages its own network infrastructure or chooses to go the Managed Services route, an evolution and revolution in government’s network capabilities is beginning to take place. Read More...

2008 Salute Reports:

Network Centric Solutions

Network-Centric capabilities allow the force to attain an improved information position that can partially ‘lift the fog of war’ and enable commanders to improve their decision making and fight in ways that were not previously possible. Read More...

2008 Agency Reports:

DHS is targeting five priority goals essential to preserving freedom and privacy, meeting future challenges and fulfilling its mission of securing America. To provide its 208,000 personnel the tools and support they need to meet these goals, DHS is seeking $50.5 billion in FYO9 – an increase of 6.8% over FY08. Read More...


Throughout government there are professionals like you who are planning, implementing and then evaluating IT infrastructures, applications and networks. You are truly shaping your agency’s future. Read More...

2008 Contract Guides and Agency Guidebooks:

The Program Executive Office was established in 1987 as Program Executive Office, Standard ArmyManagement Information Systems (PEO STAMIS) to helpimplement the Goldwater-Nichols Act. The Army Reorganization on October 26, 2001 resulted in the change to Program Executive Office, Enterprise Information Systems (PEO EIS). Read More...


To date, more than 16,000 individuals have been placed on the Department of Defense Biometrics Watchlist (a list of identities of interest to the Department), including more than 1,800 high value targets; more than 1,600 insurgents have been placed on ‘security hold’ – significant milestones in force protection. Read More...


Alliant and Alliant Small Business (SB) are GSA’s enterprise flagship GWACs; built to service your IT requirements for the next 10 years. Read More...


In today’s connected world, those who would do us harm are connected perhaps more effectively than we are. According to a recent article in “Wired” magazine (“How Technology Lost the War: In Iraq, the Critical Networks Are Social – Not Electronic”, November 27, 2007) insurgents in Iraq “cherry pick” the best U.S. technology – disposable email addresses, anonymous Internet accounts, and the latest radios. Read More...


US-VISIT, the Western Hemisphere Travel Initiative (WHTI) and the Secure Border Initiative (SBI) are the cornerstones of America’s efforts to control our nation’s borders. Read More...


NASA’s SEWP IV (Solutions for Enterprise-Wide Procurement) GWAC gives you access to nearly 1 million unique IT products from more than 2,000 manufacturers. Read More...


The bottom line is Networx is supposed to improve the productivity of staff and the efficiencies of your agencies telecommunications services. So, what’s in it for you and your agency? Read More...

Satellite technologies should be an important part of every federal agency’s networking strategy. Satellite-based solutions offer agencies path diversity and a redundant networking option, enabling employees to continue working even if the agency’s primary terrestrial network fails. Read More...


CHESS: A New Name, Continuing A Mighty Mission Computer Hardware, Enterprise Software and Solutions (CHESS) has the mission to support all Army customers’ commercial IT requirements – quickly and economically. Read More...


The 754th Electronic Systems Group (754 ELSG) provides and supports secure combat information systems and networks that increase the capabilities of our commanders and leaders of the United States Air Force (USAF), the Department of Defense and other Federal Government Agencies. Read More...


Use GSA Advantage® as a one-stop shop for IT products and services from pre-qualified vendors. Use Advantage’s e-Buy online buying tool to get quotes for your computer and network needs. Read More...

2008 Government Infrastructure Reports:

Network Management

Every function of a government agency relies in some way on a robust and secure network and the intangible skills of the enlightened network manager. Read More...


Project Management

Managers can’t always avoid risk, so they need plans to avoid the risks they can and cope with those that arise. Read More...


Security Management

There is evolution happening moving from protecting networks first to protecting the data first. Read More...

2008 Special Reports:

Emergency Preparedness & Response

P25 compliant systems are being increasingly deployed with radios able to communicate in analog and digital mode providing a high degree of equipment interoperability, compatibility and economy of scale. Read More...


Green Solutions Guide

While many government executives may not be all that familiar with the “green” vernacular, most are forging ahead by recycling equipment, reducing power use through conservation and by adhering to “green” requirements in their primary tech-related acquisitions, according to the results of a recent online survey by the 1105 Government Information Group. Read More...


Perspectives from the Top research

For the third year in a row, the 1105 Government Information Group has conducted an online survey of top-level government executives to examine their technological and management priorities, to uncover what’s driving their IT investments today, and in the coming year. Read More...


Security Directives and Compliance

One thing is clear about 21st century cyber warfare: The nation is fighting some very sophisticated, well resourced adversaries. They are coming at us hot and heavy. And many times – maybe unknowingly -- we invite them through our front doors and welcome them inside our Information Systems. Read More...


Training & Simulation

What we are trying to do is to build training environments that deal with human variability to try to most effectively and efficiently train soldiers to certain standards. So this gets pretty sophisticated in terms of the way we will train our soldiers in the future. Read More...


SOA

SOA promises to help agencies rapidly reconfigure their business and more easily position IT resources to serve it. Through it they will improve business agility – through the sharing and reuse of infrastructure, services, information, and solutions. Read More...

2008 Solution and Buyers Guides:

GSA/GWAC Buyers Guide

GWAC planners take great care is selecting industry GWAC contract holders, making sure these “industry partners” really represent the “best of the best” among the large and small business IT product and services providers. Take advantage of a wide variety of choices – one of which is sure to meet your unique needs. Read More...


DOD and Security Buyers Guide

Two major contracting forces – GSA and DOD’s Enterprise Software Initiative (ESI) – joined up to form DAR and the DAR Tiger Team (DARTT) as part of the ESI and GSA SmartBUY program in 2006. The idea was to determine and then qualify the best commercial encryption systems for protecting sensitive data on mobile devices and removable storage media and reduce the costs government would pay to obtain the systems. Read More...


Transforming Data Center

The ongoing economic crisis, two wars and the impact of the current presidential transition will complicate ongoing federal agency IT efforts to consolidate, modernize and transform data center operations in the coming year. Read More...