AUTHOR ARCHIVES

Connor Simpson

Results 71-80 of 107

Ahmadinejad wants to be Iran’s first astronaut

February 4, 2013 FROM NEXTGOV arrow What monkey? Unfazed by questions about whether his country's space monkey mission was staged, Iranian President Mahmoud Ahmadinejad is pretty gung ho about being his country's first man sent to space. "I am ready to be the first human to be sent to space by Iranian scientists," Ahmadinejad said on...

No, Anonymous doesn't have access to U.S. warheads

January 28, 2013 FROM NEXTGOV arrow If you were skimming the news this morning, we could understand why you might be confused and thinking that the hacking collective Anonymous has access to real U.S. warheads. Stop worrying, they don't. They allege they do have sensitive information about the Justice Department, though. The group took over the...

Joe Biden's Google hangout takes on assault weapons and the NRA

January 25, 2013 FROM NEXTGOV arrow "I don't view it as gun control, I view it as gun safety." That was Vice President Joe Biden's key message during a Google+ hangout on Thursday afternoon as his road show pitching the Obama administration's new gun proposals took to a friendly part of the web. But that's a...

Democratic senator promises a budget this year

January 21, 2013 Sen. Chuck Schumer promised the Senate would pass a budget that includes tax reforms this year on NBC's Meet the Press. "First, it’s not true that we haven’t had budget control in effect the last several years. The budget control act of 2011 put in rigid spending cuts," Schumer said,...

Obama's inauguration might have trouble paying its bills

January 14, 2013 So, Obama's big second term inauguration is a little more than a week away, and apparently they're really behind on financing. Like, $10 million behind. You would think coming up with a measly $50 million for a second-term inauguration would be easy after raising $1 billion for his campaign. But...

The administration really doesn't want to talk about the drone that killed an American citizen

January 3, 2013 FROM NEXTGOV arrow In the latest sign that President Obama's targeted killing program may be forever shrouded in secrecy, U.S. District Judge Colleen McMahon has denied a Freedom of Information Request from the American Civil Liberties Union and The New York Times over the death of Abdulrahman al-Awlaki, the 16-year-old American-born son of...

Why Is Eric Schmidt Going to North Korea?

January 3, 2013 FROM NEXTGOV arrow Don't call him an ambassador, and don't count on Google North Korea just yet, but Google executive chairman Eric Schmidt is going on a North Korean vacation with former New Mexico Gov. Bill Richardson, reports the Associated Press. Google's place in Kim Jong-un's alleged "industrial revolution" remains very much unclear,...

Bandits make off with $1.3 million worth of Apple products in Paris

January 2, 2013 FROM NEXTGOV arrow Some people in Paris were apparently unsatisfied with the post-Christmas sales at the Apple store in Paris, France, so they decided to give themselves a five-finger discount to the tune of $1.3 million. Now that's some extreme couponing. A few hours before midnight Monday night, the Wall Street Journal reports...

Be careful when downloading your Twitter archive

December 17, 2012 FROM NEXTGOV arrow Twitter is rolling out the long-awaited feature of downloading your entire tweet history, it seems, but be careful. You might not like what you find in there. Sometimes we remember our tweets with rose-colored lenses. The Next Web was the first to notice a few users posting about being able...

One man is now tweeting every known U.S. drone strike

December 12, 2012 FROM NEXTGOV arrow Josh Begley set out to tweet a complete history of known U.S. drone strikes Tuesday with the goal of doing it all in ten minutes. Except there were way too many strikes to tweet, so his original plan fell apart pretty quickly. You might recognize Begley's name. He is the...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.