recommended reading

author archives

Joseph Marks

Senior Correspondent

Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.

Results 851-860 of 1374

White House seeks ‘badass innovators’

May 23, 2012 This story has been updated. The White House is seeking 20 high-powered Web and mobile developers for short-term assignments aimed at reducing the government’s online footprint, making agency data more accessible and rendering federal contracting less onerous for small businesses, federal Chief Technology Officer Todd Park said Wednesday. The Presidential...

White House launches federal digital strategy

May 23, 2012 This story has been updated. The White House’s long-awaited Digital Strategy, released Wednesday, aims to ensure agencies manage mobile devices safely and affordably and to give citizens mobile access to everything from government websites and applications to raw survey and satellite data. The strategy, titled “Building a 21st Century Platform...

from govexec

Getting More Out of Technology

May 23, 2012 All About Face Time Since 2009, Brandon Friedman, director of online communications for the Veterans Affairs Department, has helped launch a VA blog, 150 Facebook pages and 70 Twitter feeds, all of which have garnered a wide audience of veterans. Though Friedman, a former Army infantry officer who served with...

A Sweet Spot for Geolocation Apps

May 22, 2012 About three-fourths of smartphone users are taking advantage of mapping services to find their way around and nearly 20 percent are using “geosocial services” such as Foursquare to “check in” at stores and restaurants, according to a new report from the Pew Internet and American Life Project. The rise in...

The Fine Print on Open Data

May 21, 2012 Gartner analyst Andrea Di Maio filed an interesting blog post recently pointing out some pitfalls of the new open data revolution. The most interesting part of Di Maio’s argument, at its most basic, is this: if government isn’t analyzing the data, then you’d better start worrying about who is. Under...

USASpending moves to big data cloud

May 21, 2012 The General Services Administration has moved its USASpending.gov site, which tracks and analyzes federal expenditures, to a privately owned big data cloud, officials announced Monday. A big data cloud essentially is a computer cloud with a built-in way of crunching big data using the Apache Hadoop system. Hadoop is the...

What Kind of Market Dominance Does Facebook Have?

May 18, 2012 The latest in a series of articles about the poor performance of Google+ raised two big questions for me this week: First, just what kind of dominance does Facebook have in the social marketplace? And, second, what does that mean for agency public affairs staffers? The article, from Fast Company,...

Initiative aims to reform government services around life events

May 16, 2012 A cadre of former federal information technology leaders has a novel plan for how to reduce billions of dollars in overlapping information technology services governmentwide: They want to look at the recipients of those services rather than at the agencies where they originate. The project, known as Smart Lean Government,...

Senators Give the Nod to a New Maternal Health App

May 15, 2012 Did you miss Mother’s Day? You’re not alone. A bipartisan group of senators announced Tuesday they’ll be honoring Mother’s Day Thursday with a briefing on the text4baby app, which texts prenatal tips to expectant mothers based on the stage of their pregnancy. Most of us wouldn’t get a pass on...

Think before you tweet

May 14, 2012 Tweets may take just seconds to compose, but before they go out federal agencies should devote substantial time to figuring out who their audience is, their rules of engagement and who will be managing their Twitter accounts, a report released Monday urged. Social media strategies should address how deeply agencies...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.