AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 1061-1070 of 1376

Whipcast App: Promotion, not Transparency

November 15, 2011 FROM NEXTGOV arrow Lest the meaning of the word collapse entirely, it's worth reminding some politicians that it's not really transparency if it doesn't hurt...even just a little bit. The new Whipcast app launched by House Majority Whip Kevin McCarthy, R-Calif., Friday purports to be "part of the House Republicans' commitment to transparency."...

Reforming government websites with app developers in mind

November 14, 2011 FROM NEXTGOV arrow Among the most important developments in the relaunched FCC.gov website is its use of open source application programming interfaces, the Federal Communications Commission's new media specialist Gray Brooks said recently. APIs are essentially buckets of information that can be easily accessed and read by other computers. A large portion of...

Reforming government websites with app developers in mind

November 14, 2011 Among the most important developments in the relaunched FCC.gov website is its use of open source application programming interfaces, the Federal Communications Commission's new media specialist Gray Brooks said recently. Read the whole story at Nextgov.com.

Interior Launches New Crowdsourcing Map Portal

November 10, 2011 FROM NEXTGOV arrow The Interior Department launched a new Web tool Thursday that pulls together a slew of interactive, government-produced maps that users can mash together and lay their own data on top of. The "geospatial platform," which Interior said is a prototype, also includes some maps from state, local and tribal governments....

Social media for emergency managers can't start when the emergency does

November 10, 2011 FROM NEXTGOV arrow Developing emergency managers' capacity to benefit from social media requires more than simply training them to monitor Facebook pages and to adopt new technology to separate sound from noise in the cacophonous Twitter feed following a disaster, experts said Thursday. To use social media effectively during emergencies, officials also must...

IT Spending: Elections and Electronics

November 9, 2011 FROM NEXTGOV arrow Information technology isn't entirely non-partisan, Shawn McCarthy, research director for IDC Government Insights, said during a web presentation Wednesday. Administration-to-administration changes are only at the margins though and, because most IT budgeting is done in multi-year cycles, it can take a year or more for those minor shifts to show...

White House limits feds' mobile devices to cut costs

November 9, 2011 FROM NEXTGOV arrow An Obama administration executive order aimed at cutting government waste includes a plan to trim "duplicative and unnecessary" employee information technology devices such as smartphones, laptops and tablets. Most of the duplication in federal employees' personal IT devices involves computers, not phones, said Cindy Auten, general manager of the Telework...

EPA showcases new environmental apps

November 8, 2011 FROM NEXTGOV arrow The Light Bulb Finder, a mobile phone application that helps users pick more energy-efficient bulbs for their homes, was the overall winner of the Environmental Protection Agency's Apps for the Environment challenge. The second-place finisher, showcased during an EPA event in Arlington, Va., on Tuesday, was Hootroot, an app that...

Close Encounters of the Civic Kind

November 7, 2011 FROM NEXTGOV arrow "The U.S. government has no evidence that any life exists outside our planet, or that an extraterrestrial presence has contacted or engaged any member of the human race," the Obama Administration boldly stated Monday. There is also "no credible information to suggest that any evidence [about extraterrestrials] is being hidden...

DOD Misses Data Center Plan Deadline Again

November 7, 2011 FROM NEXTGOV arrow More than a month after its official due date, the Defense Department still hasn't released a detailed plan and progress report on its massive data center consolidation program. The Defense Department owns about one-third of the government's roughly 2,800 official data centers. The government plans to close 1,000 or more...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.