recommended reading

Innovation fellows help you navigate the federal Web

The bar lives at the bottom of the MyGov site.

The bar lives at the bottom of the MyGov site. // MyGov

A team of Presidential Innovation Fellows tasked with making the federal Web presence more navigable launched the beta version of a new toolbar Wednesday focused on doing just that.

The MyGov Discovery Bar will slide into view when users reach the bottom of a federal Web page suggesting related government pages the reader might be interested in, according to a blog post.

The team described the toolbar’s suggestions as similar to what would come up using the government-only search engine on the General Services Administration’s page or the “People who bought this item, also bought” recommendations on News websites use similar tools to alert visitors to related stories.

MyGov hopes to eventually offer the toolbar as a plug in for frequent federal website visitors and to have some agencies automatically install the toolbar on their sites, team member Ben Balter said.

The government has struggled since early in the Obama administration to make its Web presence more comprehensible and navigable, including by launching an initiative to trim outdated dot-gov sites and by launching Business USA, a single Web interface for small businesses that combines content from numerous agencies.

MyGov’s toolbar operates by associating certain content tags with a government webpage and recommending related pages regardless of which agency hosts them. Users of the beta service will be able to look at the tags associated with their pages and to offer feedback, the MyGov team said.

MyGov is one of five teams of Presidential Innovation Fellows. The fellows are all experts and entrepreneurs from outside government on temporary assignment to tackle a thorny government technology problem. The program was the brainchild of Chief Technology Officer Todd Park.

Other Presidential Innovation Fellows teams are focused on making government procurement easier for small businesses, making government data more accessible, making personal health data more accessible and helping the government shift to electronic payments abroad rather than cash.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.