by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : September 30, 2015
DEPARTMENTS 10 COMMENTARY 4 hopes for better contracting next year BY STEVE KELMAN Why shadow BYOD is your next big problem BY BOB STEVENS 2 9 B OOKSHELF 5 books for your reading list BY FCW STAFF 3 1 CIO PERSPECTIVE IT insecurity: Aggressive use of security solutions BY RICHARD A. SPIRES 3 3 FCW INDEX 34 BACK STORY 9 signs you’ve been the victim of a breach Contents TRENDING 3 DEFENSE Halvorsen wants to change the economics of cyberspace FCW CALENDAR Where you need to be next 6 BRIEFS FDA expands access to medical device data, DHS seeks to develop cyber ‘drawbridge,’ and a new team approach toITR&DatDHS 8 OVERSIGHT Did 307,000 vets die while awaiting care? And VA seeks next-generation ID cards. 4 September 30, 2015 FCW.COM 12 6 hidden costs of continuing resolutions 14 16 firms to turn to for agile 16 16.7 reasons to watch the CSC/SRA deal (and 2.7 billion small causes for concern) 20 14 rising stars in federal IT 21 10 top stories on FCW.com 22 5 reasons shared services are slow to stick 26 50 top systems integrators 27 20 top GSA Schedule 70 companies 27 20 top service-disabled veteran-owned companies 28 20 top woman-owned companies 28 20 top minority-owned companies Federal List 0930fcw_004.indd 4 9/9/15 11:36 AM
September 15, 2015