recommended reading

author archives

Joseph Marks

Senior Correspondent

Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.

Results 731-740 of 1368

White House seeks unified system to manage interns

September 10, 2012 The Executive Office of the President wants to retire the mélange of different programs it uses to manage internship hopefuls into a single unified system, according to solicitation documents released Saturday. The new system should at least be able to manage application materials from the roughly 3,650 people who apply...

Getting the prize purse right in tech contests is a challenge all its own

September 7, 2012 What’s the toughest part about putting together a government-sponsored prize competition to develop new and innovative technologies? It’s not finding problems in need of a solution or drawing in competitors, according to Gregory Downing, executive director for innovation at the Health and Human Services Department. The toughest part is determining...

Now’s the time for federal innovation, CIO says

September 6, 2012 Tight budgets aren’t the only things putting pressure on federal technologists these days, federal Chief Information Officer Steven VanRoekel said Thursday. There’s also pressure from cyberattackers that’s “unprecedented in its scope” and pressure from citizens trained by the private sector to expect convenient, Web-based systems for all their transactions, he...

Bringing the private sector into federal innovation

September 6, 2012 Taking an innovative approach to social programs isn’t merely a matter of adopting new ideas, Jonathan Greenblatt said Thursday; it’s also about finding new funders. Greenblatt is director of the White House Social Innovation and Civic Participation Office, which is exploring ways to drive more financial support to social programs...

Pentagon Releases Radiation Exposure Estimates for Japan-Based Troops

September 6, 2012 A Defense Department website launched Wednesday provides estimates of radiation exposure for adults and children at 13 U.S. military bases in mainland Japan following the 2011 explosion at the Fukushima Dai-ichi nuclear power plant. The department plans to expand the site by the end of the year to include exposure...

DNC’s Twitter victory wasn’t won on a level playing field

September 5, 2012 Michelle Obama’s ability to inspire nearly twice as many tweets per minute as Republican nominee Mitt Romney during her Democratic National Convention speech Tuesday night may have been due to more than being “personal and real.” The first lady had a home turf advantage. Democrats are significantly more likely than...

We the People nets more than 3 million signatures

September 4, 2012 More than 2.5 million people have signed online petitions posted to the White House’s We the People website since its September 2011 launch, according to its Tuesday blog post. Those people have appended more than 3 million signatures to about 46,000 petitions, the blog post states. We the People was...

DNC touts open government initiatives in party platform

September 4, 2012 This story was updated to note that the GOP platform did not address open government. Democrats used their party platform, posted online Tuesday, as an opportunity to tout transparency advances under the Obama administration such as the president’s Open Government Initiative and the government information trove Data.gov. The platform praises...

from govexec

Tech Roundup

September 1, 2012 Cellular Revolution The Veterans Affairs Department is looking to consolidate its cellphone billing into a national contract that covers voice and data airtime, as well as hardware such as smartphones and tablet computers. The national mobile device and services contract would include the department’s 300,000 employees in all 50 states,...

from govexec

Powering Down

September 1, 2012 Government data centers work like any other factory. They produce something: in this case, the computer systems that power websites, manage payrolls and store vital information. They also have to eat up raw materials to do it: the electricity that runs those banks of computer servers and the air conditioning...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.