AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 751-760 of 1377

Consolidation alone won’t solve data centers’ energy problem

August 31, 2012 FROM NEXTGOV arrow Government data centers work like any other factory. They produce something: in this case, the computer systems that power websites, manage payrolls and store vital information. They also have to eat up raw materials to do it: the electricity that runs those banks of computer servers and the air conditioning...

Government Crowdsourcing Efforts Are Tricky, Just Ask Agencies

August 31, 2012 FROM NEXTGOV arrow It’s been a busy couple of weeks for government crowdsourcing practitioners -- weeks that have pointed out both the variety of opportunities for the public to pitch in on projects and some pitfalls as well. The Health and Human Services Department’s Office of the National Coordinator for Health Information Technology...

GSA issues cloud email blanket purchase agreements

August 30, 2012 FROM NEXTGOV arrow The government has entered into a blanket purchase agreement with 17 cloud email providers, a move that will likely spur a number of agencies to switch to the Internet-based email systems, the General Services Administration announced Thursday. The 17 vendors will offer five different cloud email systems, a GSA official...

Dismissed SSA advisory panel had a lasting effect, chairman says

August 30, 2012 FROM NEXTGOV arrow A defunct advisory panel tasked with guiding the Social Security Administration on bringing its technology architecture up to date contributed to improvements at the agency even though SSA failed to implement most of its recommendations, the panel’s chairman said Wednesday. Commissioner Michael Astrue terminated SSA’s Future Systems Technology Advisory Panel...

Obama vows to fight for Internet freedom on Reddit

August 29, 2012 FROM NEXTGOV arrow This story has been updated. President Obama took to the social networking site Reddit Wednesday afternoon to answer questions about Internet freedom, the influence of money in politics and his most difficult decision in office. He also pledged to release the White House’s micro brewed beer recipe, an issue that...

Will People Pay More for Better Government Service?

August 29, 2012 FROM NEXTGOV arrow This post has been updated to correct the percentage of NIC online services that are run on a fee basis. A majority of Americans would rather pay more for a government service than wait in a long line, according to a new survey commissioned by the largest provider of e-government...

Data Center Power

August 29, 2012 Government data centers work like any other factory. They produce something: in this case, the computer systems that power websites, manage payrolls and store vital information. They also have to eat up raw materials to do it: the electricity that runs those banks of computer servers and the air conditioning...

TSA seeks technology to make screening easier on travelers

August 28, 2012 FROM NEXTGOV arrow This story was updated to include a comment from TSA. The Transportation Security Administration is scanning the private sector for technology to improve the way it searches for and responds to threats at the nation’s airports, according to solicitation documents posted Monday. In addition to improving security, TSA is interested...

Interior seeks ability to wipe mobile devices of employees abroad

August 27, 2012 FROM NEXTGOV arrow The Interior Department is considering purchasing a mobile device management product that will allow it to remotely update, manage, monitor, and shut down or wipe employees’ smartphones and tablets even when they are traveling abroad, solicitation documents show. The product would have to work, at the very least, on Apple,...

A Busy Week in Federal IT: Here’s What You May Have Missed

August 24, 2012 FROM NEXTGOV arrow With the induction of 18 “badass innovators” into government service, the planning for a few dozen new government APIs and an unexpected flare up with the conservative blogosphere, this has been a busy week for the federal IT crowd. Here are a few things that would have been significant news...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.