Nextgov - All Content technology news, best practices, and web 2.0 tools.en-usFri, 06 Mar 2015 17:02:49 -0500FTC Pits Humans Against Robocalls in New Contest FTC is looking for anyone who can block, forward and predict which phone calls are made by automated systems.Mohana RavindranathFri, 06 Mar 2015 17:02:49 -0500 TechVideo: Open Data and Citizen Engagement fifth installment in our collaboration with Socrata's Open Data TV.Caitlin FairchildFri, 06 Mar 2015 15:51:41 -0500 Datara2studio/Shutterstock.comBrit Allegedly Extracted Data from Pentagon Satellite System data compromised includes employee contact information and mobile device ID numbers.Nextgov StaffFri, 06 Mar 2015 15:35:34 -0500 Con Telecom IT Support Worker, Bilk Mandarin Oriental Guests and Trigger Bogus Bomb Alarm at a Mall another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 06 Mar 2015 14:58:21 -0500 Bell/Shutterstock.comSenators: We Need a National Strategy for the Internet of Things bipartisan group urged the United States to articulate a national strategy for developing, and deploying, the 'Internet of Things.'Mohana RavindranathFri, 06 Mar 2015 13:20:04 -0500 TechSenate Armed Services Committee member, Sen. Deb Fischer, R-Neb.J. Scott Applewhite/APNew CIO Wants Fresh Pair of Eyes to Look at Federal IT Problems IT Solutions Challenge will consist of several working groups of “rising stars” from the IT world tasked with zeroing in on tech issues in the federal government.Jack MooreFri, 06 Mar 2015 13:11:26 -0500 BriefingMaksim Kabakou/Shutterstock.comCable and Telecom Giants Are Taking the FCC to Court Over Net Neutrality Rules are three arguments cable and telecom giants are likely to use to try to kill the rules.Brendan Sasso, National JournalFri, 06 Mar 2015 12:27:58 -0500 BriefingFCC Chairman Tom WheelerJose Luis Magana/APWhy the Mobile Industry Wants to Kill the Password data rather than voice or text becomes the big reason people use their mobile phones, networks want to extract more value from their users.Leo Mirani, QuartzFri, 06 Mar 2015 12:21:08 -0500 Prykhodov/Shutterstock.comAttention, Cyber Pros: The Pentagon Wants You -- 3,000 of You military has been given the go-ahead to fast-track the hiring of 3,000 computer whiz civilians.Aliya SternsteinThu, 05 Mar 2015 17:12:24 -0500 military cyber professionals conduct an exercise during Cyber Flag 13-1, Nov. 8, 2012, at Nellis Air Force Base, Nev. US Air ForcePentagon Adds Social Media Whiz to Team new director for digital media and strategy will revamp DOD's communication via social media.Hallie GoldenThu, 05 Mar 2015 16:46:32 -0500 Secretary Ash CarterManuel Balce Ceneta/AP4 Things to Know about the Federal IT Budget Proposal IT procurements and system modernizations provide a road map of agencies’ spending priorities in the year ahead.Jack MooreThu, 05 Mar 2015 15:56:03 -0500 BriefingCienpies Design/Shutterstock.comGAO: CMS Isn't Doing Enough to Address Failures the botched rollout, the Centers for Medicare & Medicaid Services haven't adequately improved itsIT processes, a recent report found.Mohana RavindranathThu, 05 Mar 2015 13:29:52 -0500 - Health ITGil C/Shutterstock.comSorry Consumers, Companies Have Little Incentive to Invest in Better Cybersecurity actual expenses from the recent and high-profile breaches at Sony, Target and Home Depot amount to less than 1% of each company’s annual revenues.Benjamin Dean, QuartzThu, 05 Mar 2015 13:29:27 -0500 New US Net Neutrality Rules Are Shaping the Internet Worldwide see FCC's decision as the first open-Internet domino, but critics are warning of darker possibilities.Kaveh Waddell, National JournalThu, 05 Mar 2015 12:58:30 -0500 Briefingpeterfactors/Shutterstock.comDoes the Focus on Snowden Undermine Surveillance Reform Discussions? headlines and narratives overshadow the importance of the Snowden leaks in understanding U.S. government surveillance.Frank KonkelThu, 05 Mar 2015 10:33:31 -0500 Tech - Emerging TechFormer U.S. National Security Agency contractor Edward Snowden, who is in Moscow, is seen on a giant screen during a live video conference for an interview with Amnesty International.Charles Platiau/APFallout from Clinton’s Private Emails: How Secure are Agency Email Systems? government email accounts are no locked fortresses, and some shirk key federal security regulations.Aliya SternsteinThu, 05 Mar 2015 09:08:38 -0500 Matthews/AP File PhotoHouse Committee Prods Energy Department to Use More Supercomputers House Committee on Science, Space and Technology approved a bill that would require the Energy Department to invest in supercomputing research.Mohana RavindranathWed, 04 Mar 2015 17:10:24 -0500 TechThe Energy Department's Jaguar SupercomputerOak Ridge National LaboratoryVideo: Open Data and a More Effective, More Efficient Government fourth installment in our collaboration with Socrata's Open Data TV.Caitlin FairchildWed, 04 Mar 2015 17:07:01 -0500 Dataphipatbig/Shutterstock.comCommerce Department Launches Private Sector Data Brain Trust members of the newly created Data Advisory Council stem from some of the private sector’s leading tech companies.Hallie GoldenWed, 04 Mar 2015 16:36:18 -0500 BriefingCommerce Secretary Penny PritzkerJ. Scott Applewhite/APSome Smartphone Apps Have to Be Cleared by the FDA with a medical purpose need some approvalDr. Corinna Lathan, QuartzWed, 04 Mar 2015 16:10:10 -0500 Don’t Have to Know How to Code to Make it Big in Tech are some characteristics of the tech world that have nothing to do with coding or technical preparation — and everything to do with attitude, emotional intelligence and flexibility.Karen Wickre, QuartzWed, 04 Mar 2015 15:54:03 -0500 Briefing - Wired WorkplaceMark Lennihan/APFISMA by the Numbers: The Biggest Cyber Threats at These 5 Agencies incidents targeting federal agencies are on the rise.Caitlin Fairchild and Jack MooreWed, 04 Mar 2015 14:54:05 -0500 Wasserman/Shutterstock.comTime is Running Out to Reform NSA Mass Surveillance two years after Edward Snowden’s explosive revelations, surveillance reform remains in doubt as the window of opportunity closes.Dustin Volz, National JournalWed, 04 Mar 2015 13:41:52 -0500 Luis Magana/APMore Security Fears Surround Clinton’s 'Homebrew' Email Server“Clinton's decision to forgo the State Department's servers is inexplicable and inexcusable,” says one security expert.Dustin Volz, National JournalWed, 04 Mar 2015 13:31:05 -0500 Secretary of State Hillary ClintonCarolyn Kaster/APSenate Offices Want New System to Track Website Vulnerabilities Senate wants commercial, off-the-shelf software to scan, identify and help resolve vulnerabilities across 140 different Senate office websites.Jack MooreWed, 04 Mar 2015 13:22:44 -0500 Bourdages/