AUTHOR ARCHIVES

Results 21-30 of 235

Instant Messaging From The Web

April 23, 2007 FROM NEXTGOV arrow As instant messaging gains more converts, it still has one big drawback: Users of, say, Google chat cannot instant message users of, say, Yahoo! And then there’s the whole downloading software portion of it -- a pain especially for computer users denied downloading privileges. Meebo to the rescue! It’s a...

Justice Joins Suit Against 3 IT Companies

April 20, 2007 FROM NEXTGOV arrow The Justice Department is joining whistleblower suits against Hewlett-Packard, Accenture, and Sun Microsystems, alleging the companies favored technology companies in exchange for kickbacks. The three companies “submitted false claims to the United States for information technology hardware and services on numerous government contracts from the late 1990s to the present,”...

Ex-Qwest CEO Guilty

April 20, 2007 FROM NEXTGOV arrow Former Qwest chieftain Joseph Nacchio is guilty of 19 counts of insider trading. Nacchio was on trial in Denver federal court for 42 counts of insider trading. The jury found him not guilty on 23 counts. The former chief executive officer sold $100.8 million worth of Qwest stock in 2001...

More Vacation, Relax Less

April 20, 2007 FROM NEXTGOV arrow Managers are more likely than underlings to take vacation time, according to a new survey of U.S. workers. New York-based employment agency Hudson found that 53 percent of managers “have plans to take both a full vacation and a long weekend compared to 44 percent of non-managers.” All workers generally...

Tip Thursday - Cookies

April 19, 2007 FROM NEXTGOV arrow Welcome to Tech Insider’s Tip Thursday, in which we bring you computing tips and computing information you can easily apply at your desktop. This week: cookies. By now most of us know that Web sites deposit little chunks of themselves onto your hard drive. So-called cookies aren’t executable programs (one...

Chinese Police Get Cap-Mounted Cameras

April 19, 2007 FROM NEXTGOV arrow Chinese police officers are trying out cap-mounted video cameras, reports the online news service Ananova. The flashlight-shaped cameras, which weigh less than two ounces, have 1 gigabyte of storage, enough to record about 1 hour of video, according to the article, which cites Xinhua, the official China state news agency....

USB Device Simulates Mouse Movement

April 18, 2007 FROM NEXTGOV arrow Another example of why cybersecurity is a matter of trust and behavior, not technology: a USB device that simulates the movement of a mouse. Some PCs and Web sites will automatically log out users after a period of apparent inactivity, such as a few minutes of no detectable movement of...

Cuomo to Verizon: First, Fix The Phones

April 18, 2007 FROM NEXTGOV arrow New York state Attorney General Andy Cuomo has criticized Verizon, which provides local telephone service on the East Coast, for “chronically poor” telephone repair service, reports Reuters. Verizon, which became a significant federal contractor when it bought MCI in 2005, is seeking permission from New York regulators to expand “its...

Blackberry Suffers Outage

April 18, 2007 FROM NEXTGOV arrow Blackberry wireless e-mail devices suffered interruptions of service Tuesday evening that appeared to be ending Wednesday morning, according to multiple news sources. The Blackberry outage appears to have only affected North American users. An early morning call to the Blackberry U.S. technical support line was answered with a recorded message...

No Word Yet on Charging CA's Wang

April 17, 2007 FROM NEXTGOV arrow The U.S. federal attorney's office and CA Inc. officials aren't saying whether they’ll pursue legal action against CA founder Charles Wang for alleged accounting fraud, InfoWorld reports. A CA board report released last week accuses Wang, who stepped down as the company’s chief executive officer in 2002, of accounting fraud...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.