recommended reading

author archives

Joseph Marks

Senior Correspondent

Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.

Results 781-790 of 1368

Video: Longest running Earth-imaging satellite turns 40

July 23, 2012 During four decades in operation, NASA’s Landsat satellite system has tracked the destruction of tropical rainforests, the loss of conservation areas to forest fires, and the shrinking of lakes and inland seas due to irrigation. The longest-running Earth-imaging satellite also has provided free data for researchers studying everything from climate...

USAID considers medical tracking technology in Haiti

July 20, 2012 The U.S. Agency for International Development’s Haiti mission is considering a program to outfit “a large, but yet-to-be determined segment of the Haitian people” with smart cards to track them from doctor to doctor during the medical referral process, according to an announcement on the government’s grants and contracts website....

Streaming Data is One Thing, Interpreting It is Another

July 20, 2012 The first audience question during the inaugural General Services Administration webinar on implementing the federal digital strategy hit on one of the major thorns in the government’s new push for open data. Why should I open up my data, the questioner asked, when someone can simply grab that data and...

Biggest Barriers to Online Elections Are No Longer Technical

July 20, 2012 The greatest barrier to online voting isn’t the technology but accounting for the possibility of fraud and intimidation when poll watchers aren’t monitoring the actual event, an elections expert said Thursday. Full-fledged online voting in Estonia and a pilot program in Norway have found a creative fix by allowing voters...

Half of technology leaders are bullish on big data

July 20, 2012 About half of technology experts think the gathering and analysis of troves of big data will produce a “huge positive” for society, while about 40 percent think it will produce a “big negative,” a study released Friday by the Pew Internet and American Life Project found. Big data generally refers...

Recovery board’s ‘wall of shame’ gets smaller

July 20, 2012 The board charged with monitoring spending for the 2009 economic stimulus package tagged fewer noncompliers with its reporting system during the most recent quarter than any other period since the law went into effect, according to a blog post Tuesday. Only 303 of roughly 140,000 spending reports failed to come...

Coming soon: An economic stats app from Census

July 19, 2012 The U.S. Census Bureau plans to launch an economic statistics app for iPhone and Android devices in a matter of weeks, outgoing director Robert Groves told lawmakers Wednesday. The agency also is streaming much of its data through an application programming interface, so companies, nonprofits and tech savvy individuals can...

Agencies are still trying to figure out how many data centers they have, GAO says

July 19, 2012 Agencies largely complied with a September 2011 deadline to report on their data center consolidation plans but 21 of the 24 agencies covered by the requirement had not actually completed a full data center inventory, a government watchdog reported Wednesday. Only one of the agencies had completed its consolidation plan...

DATA Act, Scene two: Drop the independent board

July 18, 2012 Sen. Mark Warner, D-Va., plans to reintroduce federal spending transparency legislation without a provision for an independent oversight board that government budget officials have criticized, he told the Senate’s Homeland Security and Government Affairs Committee on Wednesday. Government watchdogs, however, say some independent oversight is needed to ensure agencies take...

Cloud’s Culture Change Comes at the Top and the Bottom

July 18, 2012 When government officials describe a cultural barrier to cloud computing, they’re usually talking about ground-level changes. When a workers’ email is glitchy he wants to call someone at a help desk two floors down not 2,000 miles away, and managers feel more comfortable when employees are working on projects at...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.