AUTHOR ARCHIVES

Christopher Mims

Results 91-100 of 108

Why Bitcoin 'Millionaires' Could Accidentally Become Tax Felons

April 10, 2013 FROM NEXTGOV arrow If you’re an American who bought bitcoins at around $80 less than a month ago and sold them today for around $237, congratulations! You may be on your way to accidentally committing tax fraud. That’s because you’ll run afoul of authorities if you don’t report what you made on bitcoin...

The Biggest Cyberattack in the History of the Internet is Happening Right Now

March 28, 2013 FROM NEXTGOV arrow At this very moment, the largest cyber attack ever declared is emanating from a decommissioned, nuclear-war proof NATO bunker with five foot-thick concrete walls and a reputation for harboring spammers and cybercriminals. It’s all part of a dustup between CyberBunker—so named for the building just outside Kloetinge, in the Netherlands,...

How the Internet Is Making Us Poor

March 27, 2013 FROM NEXTGOV arrow Everyone knows the story of how robots replaced humans on the factory floor. But in the broader sweep of automation versus labor, a trend with far greater significance for the middle class—in rich countries, at any rate—has been relatively overlooked: the replacement of knowledge workers with software. One reason for...

By the End of This Year, China Will Have as Many Android Users as the U.S. Has People

March 25, 2013 FROM NEXTGOV arrow More than 300 million Chinese will have Android smartphones by the end of this year, according to China-focused Android app store Wandoujia. That’s a growth rate of 34% since 2012, when the country had 224 million Android users. While it’s hard to imagine that growth can continue at this pace,...

How Making Microchips 3D Could Unleash an Age of “Cognitive Computing”

March 21, 2013 FROM NEXTGOV arrow When it comes to the never-ending struggle to innovate in microchips, Hector Ruiz is a veteran. He was for 10 years the CEO of AMD—the David to Intel’s Goliath in the battle for marketshare of the chips that powered a generation of PCs. He’s just written a not-at-all-subtle book about...

The Future of Twitter Is Robots Tweeting at Each Other

March 21, 2013 FROM NEXTGOV arrow Twitter is full of weird stuff none of us ever notice because it mostly just looks like spam or nonsense. But if you look closely, as some have, you’ll find spies using Twitter to communicate with each other in code, environmental sensorsbroadcasting useful data, a toaster with 2,000 followers and...

'Brainpainting' Offers Hope for Interacting with Computers by Thought Alone

March 6, 2013 FROM NEXTGOV arrow Amplifiers for the human brain, designed to allow people with paralysis to interact with the world, aren’t the most easily understood technology. So g.tec, the company that makes them, has come up with the following creative marketing strategy: Convince us that we’ll soon be interacting with computers through thought alone....

Syrian Electronic Army’s Twitter Hacking Campaign Racks Up Another Victory

March 1, 2013 FROM NEXTGOV arrow If you want a view into the governments arrayed on either side of Syria’s civil war, the Syrian Electronic Army’s hacking of the Qatar Foundation’s Facebook andTwitter accounts is a good place to start. From the hacked Qatar Foundation Twitter account. Pro-Assad hackers—that is, hackers who support the current regime...

31 Percent of Kenya’s GDP is Spent Through Mobile Phones

February 28, 2013 FROM NEXTGOV arrow Pundits like to talk about how developing countries can “leapfrog” rich countries by skipping certain stages of development—for example, by going straight to an economy based on renewable energy without first passing through a phase of messy fossil-fuel based industrialization—but it rarely happens. M-Pesa, the system of mobile payments first...

'Bring Your Own Bandwidth' Means a Future of Ultra-Cheap Calls

February 20, 2013 FROM NEXTGOV arrow Republic Wireless—”the mobile network that runs on freedom”—will sell people in the US unlimited voice, texting and data for $20 a month, full stop. Those kind of prices might be common in, say, India (albeit at much slower speeds) but they’re unheard of in the US, outside of carriers that...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    View
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    View
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    View
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    View
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    View
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    View
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    View

When you download a report, your information may be shared with the underwriters of that document.