recommended reading

author archives

Joseph Marks

Senior Correspondent

Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.

Results 841-850 of 1368

Microsoft launches Office 365 for Government in a segregated cloud

May 30, 2012 Microsoft now is offering its Office 365 suite of word processing and collaboration products in a government-only cloud, the company announced in a blog post Wednesday. The software company launched Office 365 in July 2011. It’s an updated version of the software giant's Business Productivity Online Standard Suite, which includes...

Is Your Job a Social Network? Sometimes.

May 30, 2012 Gadi Ben-Yehuda has an interesting post over at GovLoop about the extent to which the modern workplace resembles a social network. The post was sparked by this New York Times article in which Facebook co-founder Dustin Moskovitz knocked the workplace-focused social network Yammer, saying “work is not a social network,...

Top tech official calls for new panel to help liberate government data

May 25, 2012 Federal Chief Technology Officer Todd Park called on the White House’s team of science and technology advisers Friday to create a special subcommittee to advise his office on projects to disseminate government data to private sector developers and entrepreneurs. Park envisions the subcommittee of the President's Council of Advisors on...

OMB exaggerated 25-point plan performance, GAO says

May 24, 2012 The Office of Management and Budget has fully completed only three of the 10 pillars of its information technology reform plan, despite having declared in December that it had closed out seven, a government watchdog told a Senate panel Thursday. The Government Accountability Office picked the 10 disputed agenda items,...

White House seeks ‘badass innovators’

May 23, 2012 This story has been updated. The White House is seeking 20 high-powered Web and mobile developers for short-term assignments aimed at reducing the government’s online footprint, making agency data more accessible and rendering federal contracting less onerous for small businesses, federal Chief Technology Officer Todd Park said Wednesday. The Presidential...

White House launches federal digital strategy

May 23, 2012 This story has been updated. The White House’s long-awaited Digital Strategy, released Wednesday, aims to ensure agencies manage mobile devices safely and affordably and to give citizens mobile access to everything from government websites and applications to raw survey and satellite data. The strategy, titled “Building a 21st Century Platform...

from govexec

Getting More Out of Technology

May 23, 2012 All About Face Time Since 2009, Brandon Friedman, director of online communications for the Veterans Affairs Department, has helped launch a VA blog, 150 Facebook pages and 70 Twitter feeds, all of which have garnered a wide audience of veterans. Though Friedman, a former Army infantry officer who served with...

A Sweet Spot for Geolocation Apps

May 22, 2012 About three-fourths of smartphone users are taking advantage of mapping services to find their way around and nearly 20 percent are using “geosocial services” such as Foursquare to “check in” at stores and restaurants, according to a new report from the Pew Internet and American Life Project. The rise in...

The Fine Print on Open Data

May 21, 2012 Gartner analyst Andrea Di Maio filed an interesting blog post recently pointing out some pitfalls of the new open data revolution. The most interesting part of Di Maio’s argument, at its most basic, is this: if government isn’t analyzing the data, then you’d better start worrying about who is. Under...

USASpending moves to big data cloud

May 21, 2012 The General Services Administration has moved its USASpending.gov site, which tracks and analyzes federal expenditures, to a privately owned big data cloud, officials announced Monday. A big data cloud essentially is a computer cloud with a built-in way of crunching big data using the Apache Hadoop system. Hadoop is the...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.