AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 91-100 of 1377

How Government Data Could Make College Cheaper

April 16, 2014 FROM NEXTGOV arrow The Education Department is looking for advice on how the private sector and nonprofits might use government-gathered data to make higher education cheaper, more accessible and a better value for the cost. The department wants feedback from developers on how they could use APIs, also known as application programming interfaces,...

Senate Passes Bill Demanding Uniform Coding for Agencies' Spending Data

April 10, 2014 FROM NEXTGOV arrow The Senate passed the Digital Accountability and Transparency Act on Thursday, raising the likelihood the spending transparency measure will become law. The DATA Act, sponsored by Sens. Mark Warner, D-Va., and Rob Portman, R-Ohio, would require agencies to use a uniform coding system for federal spending data so internal auditors...

Government-Run Competitions Should Be About Markets, Not Prizes

April 10, 2014 FROM NEXTGOV arrow Running a prize competition in government or industry is about “understanding where the market’s going in 10 years and trying to make it go there in three years,” Christopher Frangione, vice president for prize development at the X Prize Foundation, told members of Congress on Wednesday. That means government agencies...

GSA Announces Plan to Simplify Federal Contracting

April 10, 2014 FROM NEXTGOV arrow The General Services Administration’s contracting division is developing a new Web platform and business structure to bring more expertise to complicated acquisitions, the agency said on Wednesday. The new initiative, called Category Management, will involve assigning a Federal Acquisition Service manager in charge of each of several acquisition categories, such...

Here Comes GSA's Next Governmentwide Telecom Contract Vehicle

April 9, 2014 FROM NEXTGOV arrow The General Services Administration’s information technology contracting office is seeking industry feedback on plans for the next governmentwide contract vehicle for telecommunications and related services. GSA is in the process of developing Network Services 2020, or NS2020, a slate of approved vendors offering everything from basic telephone and data services...

New Data.gov Section Profiles the Companies That Use It

April 8, 2014 FROM NEXTGOV arrow The government’s digital information repository Data.gov launched a new section on Tuesday focused on companies and nonprofits that are using government data to fuel their businesses. The page titled Impact offers brief profiles of 22 companies that consume open government data, including the companies’ financing and number of employees as...

How Technology Failed to Fix Kenya’s Election

April 7, 2014 FROM NEXTGOV arrow It’s perhaps the most common story in all of government technology: A challenge arises; new technology seems to offer the perfect solution; but something happens between concept and execution that makes that technology seem more like a culprit than a savior and that leads people to complain the old analog...

Former NASA Web Manager Is Crowdfunding Her Discrimination Suit Against the Agency

April 7, 2014 FROM NEXTGOV arrow As a Web manager and open government lead at NASA’s Ames Research Center, Megan Eskey used social media and other innovative approaches to publicize NASA activities. Now she’s using those same tools to publicize a discrimination complaint against her former employer and to crowdsource funds to support her suit and...

Sometimes the Best Big Data Questions Raise the Biggest Privacy Concerns

April 4, 2014 FROM NEXTGOV arrow One useful definition for the unstructured data that underlies most existing and theoretical big data projects is that it was often collected for some purpose other than what the researchers are using it for. That definition was provided by Chris Barrett, executive director of the Virginia Bioinformatics Institute during a...

Remember the HealthCare.gov Woes? State Exchanges Had the Same Problems

April 3, 2014 FROM NEXTGOV arrow A parade of executives managing state online health care marketplaces shared stories with Congress on Thursday that echoed the turbulent tale of the federal site HealthCare.gov. Troubles included glitchy launches, conflict with vendors and patchwork personnel changes. The fixes and workarounds instituted by state exchanges often included hiring 100 or...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.