People

Google, GSA hit Web 2.0 minefield

Internet users have grown accustomed to seeking videos on YouTube, but the federal government is having a tougher time getting its content there.

Cybersecurity

Stimulus bill primes the pump

Federal information technology contractors could see a flurry of activity this year if Congress approves the roughly $32 billion in IT investments included the Obama administration’s economic stimulus bill (S.1).

People

Recommended Reading for Jan. 26

Social networking in perspective; E-gov: Recommended listening; Battling botnets; Advice for new listeners.

Cybersecurity

Defense cybersecurity budget request likely a third more than reported

More than $1 billion in fiscal 2009 IT security budget request embedded in general program spending, not linked to networks, research group estimates.

Digital Government

Senate stimulus bill also contains windfall for federal agencies

None

Digital Government

IronKey Enterprise Silver Bullet Service

Free whitepaper about managing USB flash drives!

Digital Government

Eliminate the Risk of Lost or Stolen USB Flash Drives

Free whitepaper about avoiding malicious insiders!

Digital Government

The Perils of Using the Wrong Approach to USB Flash Drive Security

Only Hardware Ensures that Data Stays In and Malware Stays Out, from IronKey

Modernization

A new kind of record-keeper

The next National Archivist could fix decades of problems in digital management.

Ideas

Tech No Stranger to Inaugural Addresses

One last note about the inauguration. It's not surprising that Obama mentioned technology (and science) in his inaugural address. After all, technology -- or its synonym, digital -- will play a supporting role in much of what Obama wants to accomplish. From Obama's speech:

Ideas

Obama Unveils Cybersecurity Agenda

Buried under the <a href="http://www.whitehouse.gov/agenda/homeland_security/">Homeland Security agenda</a> section on WhiteHouse.gov is the administration's plan to protect our national information networks. The entire cybersecurity section is copied after the jump: