Results 31-40 of 235

Busting the Myth of the Superhacker

April 17, 2007 FROM NEXTGOV arrow Everyone knows the legend of the superhacker, the supersmart electronic code breaker tearing through security barriers. But University of Colorado Law School professor Paul Ohm writes that the incidence and danger of superhackers, or whom he calls "superusers," tend to be exaggerated. Ohm cites a study by two University of...

The Bad-Boss Pattern

April 17, 2007 FROM NEXTGOV arrow In the April 9 issue of New York Magazine, author Steve Fishman writes an in-depth article laying out why so many workers dislike their bosses. Fishman quotes Robert Sutton, a Stanford professor who studies the topic, who says bosses tend to give off "subtle nasty moves like glaring and condescending...

Former CA Chief 'Masterminded Fraud'

April 16, 2007 FROM NEXTGOV arrow A culture of corruption pervaded the security software company and government contractor CA Inc. almost from its inception, according to a report issued by the company's corporate board Thursday. According to the report, founder and former CEO Charles Wang oversaw “accounting fraud lasting more than a decade at the software...

Outside the Box

April 15, 2007 With some hesitation, the Defense Department is starting to give open source products a whirl. One day a few years ago in the bowels of U.S. Central Command's central headquarters in Tampa, Fla., something new awaited the techies who support the Global Command and Control System. The military relies on...

How to Foil a Fingerprint Scanner

April 13, 2007 FROM NEXTGOV arrow Biometrics is becoming more popular in government as a security tool. Using digital fingerprints is a favored biometric because of its supposed infallibility â€" a belief that this video from the Discovery Channel show "MythBusters" proves to be misplaced. In it, two innovative hackers manage to foil a door lock...

Tip Thursday - Your IP Address

April 12, 2007 FROM NEXTGOV arrow Welcome to Tech Insider’s Tip Thursday, in which we bring you computing tips and computing information you can easily apply at your desktop. This week: View your IP address. As a follow up to last week’s post on anonymous surfing, we thought it would be useful to remind you that...

White House Loses RNC E-Mails

April 12, 2007 FROM NEXTGOV arrow An undetermined number of e-mails sent by White House aides from a Republican National Committee account have been lost, the Associated Press reported Wednesday. White House spokesman Scott Stanzel said some e-mails were lost because they had no clear policy for archiving the emails. "This sounds like the administration's version...

Comic Strip Takes On Hatch Act

April 11, 2007 FROM NEXTGOV arrow The two latest Candorville comic strips (one that ran April 10 and another that ran today, April 11) have an eerily familiar ring to them -- especially for anyone who has followed the congressional hearing investigating General Services Administrator Lurita Doan's role in the possible violation of a law that...

Vista Security Concerns Surface

April 11, 2007 FROM NEXTGOV arrow One of Microsoft’s main selling points of its new operating system Vista has been the platform's built-in security features. Beefing up security also was the primary reason why the Office of Management and Budget last month issued a mandate requiring all agencies to follow a standard Microsoft platform. But, writes...

More Data Losses Reported

April 11, 2007 FROM NEXTGOV arrow Continuing a long streak of government data losses, the Department of Community Health in Georgia disclosed yesterday that a contractor lost a CD containing the personal information of 2.9 million Georgians, according to CNET news. The department's claim processor contractor, Dallas-based Affiliated Computer Services, lost the disc sometime after March...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care


When you download a report, your information may be shared with the underwriters of that document.