AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 121-130 of 1416

Why Driverless Cars Don't Require a Bunch of New Laws

April 25, 2014 FROM NEXTGOV arrow Anyone who’s encountered the debate about driverless cars has probably heard that it’s legal questions as much as technology that’s keeping the autonomous vehicles from broad production. Specifically, if my car hits your car but neither of us is driving, then who’s to blame? A new report from the Brookings...

GSA Wants Contractors to Sign on the Digital Line

April 25, 2014 FROM NEXTGOV arrow While most documents generated by the government have made the transition from paper to digital, there are still a few hiccups in the process, notably contracts and other documents that require signatures. The General Services Administration is looking for an agencywide service that can obviate the need for pen-and-ink signatures...

Lawsuit Says GSA Discriminates Against Blind Contractors

April 24, 2014 FROM NEXTGOV arrow A group of blind federal contractors filed a lawsuit against the General Services Administration this week over a contractor website they say shuts out the visually impaired. The System for Award Management website, SAM.gov, contains numerous buttons, checkboxes, drop-down menus and “mouseovers” that federal contractors must navigate each year in...

The RFP for the U-2 Spy Plane Was Just Two Pages Long

April 23, 2014 FROM NEXTGOV arrow Federal Communications Commission CIO David Bray dropped an interesting piece of government contracting arcana last week during a panel discussion on the past and future role of government chief information officers. The conversation had turned to the acquisition process and how its complexities can sometimes prevent agencies from buying the...

Buying Facebook Ads Could be a Bad Call for Agencies

April 22, 2014 FROM NEXTGOV arrow Buying Facebook advertising to reach a broader audience may be a bad bet for government agencies -- even if the money’s available and outreach is the mission, according to a new blog post from the General Services Administration’s digital government team. The blog post from GSA’s social media lead Justin...

BYOD Cost the Energy Department More Than Supplying Government Phones

April 22, 2014 FROM NEXTGOV arrow Some Energy Department divisions were too liberal with stipends they paid contract employees under contractor-operated bring-your-own-device plans, an auditor has found. As a result, the department sometimes compensated those contract employees more for supplying their own smartphones and tablets -- which were often loaded up with unlimited voice and data...

Want to Know How Developers Use Your Agency's Data? Ask Them.

April 21, 2014 FROM NEXTGOV arrow Among the mandates in President Obama’s Open Data Policy is a requirement that agencies query the people and companies that use their data to find out what information they’d like released and in what formats. A proposed upgrade to the HealthData.gov website would go one step further, asking users to...

Flagging Tweets Didn't Weigh Down Late Obamacare Enrollments

April 18, 2014 FROM NEXTGOV arrow Nearly 1 million additional Americans registered for Obamacare health insurance coverage between the original close of enrollment on March 31 and Thursday, when the Obama administration announced late registrants had brought its tally up past 8 million enrollees. That final surge took place without the massive social media push that...

Three Things Federal CIOs Say About CIO Authority

April 17, 2014 FROM NEXTGOV arrow Government chief information officers looking to exercise authority wisely can be easily undone -- by senior leaders who don’t understand the value of improved technology, by contracting rules that diminish that value or for a host of other reasons, officials said on Thursday. The Association for Federal Information Resources Management...

How Government Data Could Make College Cheaper

April 16, 2014 FROM NEXTGOV arrow The Education Department is looking for advice on how the private sector and nonprofits might use government-gathered data to make higher education cheaper, more accessible and a better value for the cost. The department wants feedback from developers on how they could use APIs, also known as application programming interfaces,...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.