Nextgov - All Content technology news, best practices, and web 2.0 tools.en-usThu, 30 Jul 2015 16:28:42 -0400Trade Group Collecting Tips on Federal Cybersecurity for White House plans to take its recommendations to the White House, the CIO and the Federal CIO Council.Mohana RavindranathThu, 30 Jul 2015 16:28:42 -0400 BriefingTanarch/Shutterstock.comVideo: Curious about Windows 10? Here Are the Features You Need to Know's latest offering could make the workday a breeze.Caitlin FairchildThu, 30 Jul 2015 16:09:39 -0400 TechMicrosoft CEO Satya Nadella demonstrates new features of new OS Windows 10Elaine Thompson/APWhite House Gets Superserious about Supercomputing new order directs agencies within the federal government to work together -- and with the private sector -- on high-performance computers.Mohana RavindranathThu, 30 Jul 2015 15:32:45 -0400 TechThe Energy Department's Titan SupercomputerOak Ridge National Laboratory4 Myths of Citizen Experience is required for success is to abandon old myths and fundamentally shift our thinking.Josh PlaskoffThu, 30 Jul 2015 15:03:24 -0400 - Tech Insidervenimo/Shutterstock.comFake Data Sets Could Safeguard Privacy datasets allow researchers to study social systems without compromising individual identities—but how reliable is the information they’re using?Viviane Callier, The AtlanticThu, 30 Jul 2015 13:54:39 -0400 Kabakou/Shutterstock.comConsumers Rant to FCC about Net Neutrality have filed complaints against Comcast, AT&T and other Internet service providers.Brendan Sasso, National JournalThu, 30 Jul 2015 13:44:19 -0400 BriefingFCC Chairman Tom WheelerLauren Victoria Burke/APThere's Now an X-Ray Pill You Can Swallow new development could make important medical procedures like colonoscopies a little less invasive.Mike Murphy, QuartzThu, 30 Jul 2015 13:26:48 -0400 Girl/Shutterstock.comBill to Let DHS Monitor Internet Traffic on Government Systems Advances federal data security upgrade would the agency closer to the center of cybersecurity operations.Aliya SternsteinThu, 30 Jul 2015 10:01:07 -0400 view of the National Cybersecurity and Communications Integration Center before remarks by President Barack Obama, on Tuesday, Jan. 13, 2015, in Arlington, Va. Obama renewed his call for Congress to pass cybersecurity legislation, including a proposal tHouse Talks 'Internet of Things,' Data Privacy discussed how data could be both useful to consumers -- and also a potentially risky asset.Mohana RavindranathWed, 29 Jul 2015 16:57:37 -0400 TechRep. Jerrold Nadler, D-N.Y.Lauren Victoria Burke/APVideo: How Android Phones Can Be Hacked With One Text 95 percent of Android users are at risk.Caitlin FairchildWed, 29 Jul 2015 16:55:11 -0400 Dolgikh/Shutterstock.comShadow IT on the Rise But Feds Unsure How to Tackle Security Risks federal technology decision-makers say they see widespread use of shadow IT in their agency, but consider themselves Ill-equipped to handle its accompanying security risks.Hallie GoldenWed, 29 Jul 2015 16:45:39 -0400 S./Shutterstock.comUPDATED: Leidos Wins Massive Pentagon Health Care Records Contract Defense Healthcare Management Systems Modernization contract’s base value is $4.3 billion over 10 years, with an expected 18-year lifecycle value of $9 billion.Frank KonkelWed, 29 Jul 2015 15:32:29 -0400 possible/Shutterstock.comWhite House Preps New Cyber Policy Dealing with Federal Contractors proposal, which could be published as early as today, follows hacks at two background checkers that compromised the security of personnel who handle U.S. secrets.Aliya SternsteinWed, 29 Jul 2015 14:56:58 -0400 Cam/Shutterstock.comWhy Science Students Need to Think Outside the Lab students miss the most important education of all: how to relate their specialization to others in an increasingly interconnected world.Susan D. Gillespie, Kevin S. Jones, and Sophia Krzys Acord, QuartzWed, 29 Jul 2015 14:20:57 -0400 TechSergey Nivens/Shutterstock.comCongress Running Out of Time on Cyber Bill hurdles remain for the Senate's proposed cybersecurity legislation, which is competing with at least two other issues for a vote before recess.Kaveh Waddell, National JournalWed, 29 Jul 2015 14:07:14 -0400 Majority Whip John Cornyn, R-TexasSusan Walsh/APWhite House Nixes Edward Snowden Pardon Request“Mr. Snowden's dangerous decision to steal and disclose classified information had severe consequences for the security of our country and the people who work day in and day out to protect it.”Dustin Volz, National JournalWed, 29 Jul 2015 14:01:37 -0400 U.S. National Security Agency contractor Edward Snowden.Charles Platiau/APWill Digital Service Funding Survive Congressional Penny Pinching? Senate appropriations committee last week approved an annual spending measure that would grant USDS just one-third of the new funding President Barack Obama requested to scale up the team.Jack MooreWed, 29 Jul 2015 12:45:55 -0400 BriefingAllison Herreid/Shutterstock.comThe Future-Forward Cybersecurity Fix U.S. government is playing catch-up on security primarily because it has not been able to keep up with the advances in technology over the last decade.Chris EdwardsWed, 29 Jul 2015 10:06:34 -0400 - Tech Insider10 Years After Katrina, NOAA Preps for Launch of Powerful New Weather Satellites first Geostationary Operational Environmental Satellite-R series will produce “30 times the data at five times the rate and twice the resolution” of the current crop of geostationary satellites.Frank KonkelTue, 28 Jul 2015 17:11:57 -0400 Tech - Emerging TechThe fully-integrated GOES-R satellite is shown in a clean room at a Lockheed Martin facility in Littleton, Colorado. NOAAWhite House Grievance Portal Gets Upgraded White House will now aim to respond within 60 days.Hallie GoldenTue, 28 Jul 2015 16:11:47 -0400 BriefingThe White HouseVideo: Forget Driverless Cars. The Invisible Car is Almost Here LED screens can make the roads less dangerous.Caitlin FairchildTue, 28 Jul 2015 16:08:47 -0400 TechA simulation of Jaguar's 'invisible' car technology.CNETHHS On the Lookout for a Deputy CIO deputy CIO will help coordinate the department's cloud strategy, among other responsibilities.Mohana RavindranathTue, 28 Jul 2015 15:51:08 -0400 BriefingGil C/Shutterstock.com4 Steps to Boost Records Management Practices employees and managers aren't confident about what actually constitutes a record.April ChenTue, 28 Jul 2015 15:45:11 -0400 - Tech Insiderjdwfoto/Shutterstock.comWhy Identity-Theft Protection Isn’t All It’s Cracked Up To Be of data breaches are still vulnerable even with identity theft protection.Kaveh Waddell, National JournalTue, 28 Jul 2015 14:03:46 -0400 Water, Power on Pentagon Installations Need Better Protection Planning planning could help DOD protect its utilities from cyberattack and unexpected storms, a GAO report said.Mohana RavindranathTue, 28 Jul 2015 12:15:55 -0400 user Michael Baird