AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 761-770 of 1377

White House overhauls electronic records requirements

August 24, 2012 FROM NEXTGOV arrow Federal agencies have until the end of 2019 to adopt systems that store and manage all electronic records in formats that will keep them safe and searchable for future generations, according to a White House directive released Friday. Currently, many agencies print paper copies of the documents and other records...

‘Badass innovators’ get down to work

August 23, 2012 FROM NEXTGOV arrow Eighteen Presidential Innovation Fellows, sworn into government service by Office of Personnel Management Director John Berry on Thursday, have six months to get five major government initiatives up and running. A few of the fellows, whom federal Chief Technology Officer Todd Park sometimes calls “badass innovators,” have been at work...

Federal agencies are gearing up for a massive data dump

August 22, 2012 FROM NEXTGOV arrow Databases of U.S. foreign assistance payments, nuclear reactors’ daily event reports and a national sex offender registry are in the running to be released through application programming interfaces in the next few months, according to agency updates on the federal digital strategy. Application programming interfaces -- the tools used to...

Managing Innovation

August 22, 2012 In mid-2010, the already frenetic Todd Park was in overdrive. President Obama had just signed the Affordable Care Act into law, the most significant reform of the American health care system since Medicare. It was Park’s job to figure out how government could use technology to make the law’s implementation...

FBI Seeks to Digitize Data on Possible Terrorist Targets

August 21, 2012 FROM NEXTGOV arrow The FBI Laboratory in Quantico, Va., is in the market for a digital system to store and organize all of the information it gathers on potential terrorism targets, solicitation documents show. That includes maps, Geographic Information Systems data, aerial and satellite photos, video and even interactive games, according to the...

Commerce prepares for move to cloud email

August 20, 2012 FROM NEXTGOV arrow The Commerce Department is preparing to move part of its email and collaboration infrastructure to the cloud, according to solicitation documents posted Friday. The National Institute for Standards and Technology is leading the cloud email transition for the department and will be the first division to make the move, according...

USDA expects employees’ use of mobile devices to skyrocket

August 20, 2012 FROM NEXTGOV arrow While about 3,000 Agriculture Department employees are authorized to use smartphones and tablets on the job today, officials anticipate more than 100,000 will within five years, contract documents show. To better serve them, officials are in the market for technology to support a departmentwide store for mobile software applications, according...

Federal IT faces painful budget pressure

August 17, 2012 FROM NEXTGOV arrow Federal agencies will face near-sequestration-level pressure to cut information technology spending in the next five years even if Congress manages to wriggle out of the across-the-board cuts required by a 2011 deal to avoid a government shutdown, a technology vendor and consultancy has predicted. Cuts will be driven by budget...

How I Learned to Stop Worrying and Let Robots Take my Job

August 17, 2012 FROM NEXTGOV arrow The Government Accountability Office is looking for a tool to help track the volume of patent infringement litigation and to sort out who’s bringing the cases, according to solicitation documents. The solicitation arose from a provision in the 2011 Leahy-Smith America Invents Act, which tasked GAO with conducting a study...

Government has shuttered 50 data centers since May

August 17, 2012 FROM NEXTGOV arrow The government has shuttered 318 data centers since 2010, 50 of them in the past three months, according to updated figures from the Office of Management and Budget released Friday. Agencies plan to close 56 more centers by the end of September and 363 by the close of September 2013,...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.