recommended reading

author archives

Results 1-8 of 8

Deadly Railroad Crossings Challenge States

March 31, 2016 This article was originally published at Stateline, an initiative of The Pew Charitable Trusts, and was written by Judi Hasson. On a rain-soaked evening in December, 70-year-old Phyllis LeBlanc and her husband, Steven, were ferrying home her 12-year-old twin grandsons from their birthday party at a Lafayette, Louisiana, trampoline park....

Cities Embrace Big-Ticket Transit Projects

January 7, 2016 This story by Judi Hasson was originally published by Stateline, an initiative of The Pew Charitable Trusts. Voters approved 24 of 34 public transit-related ballot initiatives in 2015, most involving sales or property tax increases for rail and bus projects. That was the highest number of transit-related ballot initiatives in...

Internet Protocol Version 6

May 7, 2008 What Is This? IPv6 stands for Internet Protocol version 6. It also is referred to as the Next Generation Internet. IPv6 will expand the Internet with new coding, ways to transmit data and provide more Web addresses. Internet users are running out of space under the IPv4 format, which uses...

Business Intelligence

February 22, 2008 What is it? Business intelligence uses software programs to analyze huge amounts of electronic data collected by a federal agency or private company. It is increasingly being used to dig through seemingly unrelated data to find relationships that explain events, and predict future ones, so an organization can plan its...

from govexec

Dangerous Digits

September 12, 2007 Security used to be pretty straightforward stuff: Apply the patches that software makers and security firms issued every week, and you could rest assured that you were 95 percent protected from hackers or viruses. Now the threats are a lot more serious and a lot more difficult to fight. Among...

from govexec

Dangerous Digits

September 1, 2007 Beware asking customers to type in data on the Web-the text fields can allow hackers to sneak malicious code onto your site. This is the third in an occasional series on how to create a program that improves network security-without spending your entire working day doing it. Security used to...

from govexec

Dodging the Spear Phisher

August 22, 2007 Your Human Resources department sends you an e-mail asking for your home address -- again. And, oh, by the way, please verify your user name and password, too. "Gee," you think, "can't they keep their records straight?" You hastily type a reply and send it off. What you don't know...

from govexec

Dodging the Spear Phisher

August 15, 2007 Protecting government data hinges on training employees not to take the bait. This is the second in an occasional series on how to increase network security-without spending your entire working day doing it. Your Human Resources department sends you an e-mail asking for your home address-again. And, oh, by the...