AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 881-890 of 1377

The Cloud is Vital for Sharing Census Data

April 30, 2012 FROM NEXTGOV arrow National Archives and Records Administration Chief Information Officer Michael Wash has run some numbers since NARA put the 1940 census online April 2. NARA outsourced hosting for the site to a cloud-based system managed by Archives.com. The genealogy site won a solicitation to host the platform on a no-cost contract,...

Communities crop up around Data.gov

April 30, 2012 FROM NEXTGOV arrow Officials at the government repository Data.gov launched a new community on Saturday that provides forums for developers to share experiences, ask questions and request data sets that aren’t yet available. Officials wanted Developers.Data.gov to be available in time for the Sunlight Foundation’s Transparency Camp Saturday and Sunday, an annual meeting...

The Introvert’s Dilemma in a Tech-Enabled World

April 27, 2012 FROM NEXTGOV arrow The Chronicle of Higher Education has an interesting take on the shifting divide between introverts and extroverts in modern society. Author William Pannapacker, who’s an English professor at Michigan’s Hope College, contends introversion is nearly pathologized by a contemporary culture that celebrates powerful, charismatic personalities to the exclusion of quiet...

Republicans boycott technology field hearing

April 27, 2012 FROM NEXTGOV arrow Republican members of the House Oversight and Government Reform Committee won’t participate in a proposed field hearing May 11 to get feedback from Northern Virginia technology firms that are major government contractors, the committee’s chairman said Thursday. Rep. Darrell Issa, R-Calif., sent a letter to the event’s Democratic hosts Thursday...

Salesforce.com launches suite of government cloud tools

April 25, 2012 FROM NEXTGOV arrow The cloud provider Salesforce.com is launching a federal version of its tools, which take a social networking approach to corporate functions such as sales, human resources management and training, according to Vivek Kundra, a company vice president and former federal chief information officer, who spoke Wednesday at a Salesforce event...

Sea of Japan Dispute Tops White House Petition Site

April 24, 2012 FROM NEXTGOV arrow Score one for the White House's petition site We the People when it comes to fostering public debate. A March 22 petition aimed at removing the name "Sea of Japan" from U.S. textbooks has shot to the number one spot on the petition site, gaining nearly 100,000 online signatures in...

GSA Tool Will Verify Fed Social Media Accounts

April 24, 2012 FROM NEXTGOV arrow The General Services Administration is reportedly working on a validation tool to help people verify whether a Tumblr account, Facebook page or Twitter handle that purports to be from a federal official or agency is legitimate. Sara Cope over at SocialFeds watched a preview of the tool called the Social...

Executive order targets Internet monitoring in Syria and Iran

April 23, 2012 FROM NEXTGOV arrow AP photo President Obama issued an executive order Monday authorizing sanctions against Syrian intelligence chief Ali Mamluk and other Syrian and Iranian officials and agencies for using the Internet, cellphones and other new technology to commit human rights abuses. The directive described Syrian and Iranian efforts to monitor, track, disrupt...

Big data can Moneyball government services

April 19, 2012 FROM NEXTGOV arrow The initial version of this story misidentified the vendor of a 2011 Centers for Medicare and Medicaid Services system to track improper payments. It has been corrected. The federal government could learn from the state of Michigan and the Oakland Athletics, Teradata Corp. executive Darryl McDonald told a House panel...

Are Military KIA Notifications too Slow for the Facebook Age?

April 18, 2012 FROM NEXTGOV arrow The speed of social information has forced many groups to compromise on old standards of formality and dignity when sharing important information. One of the most profound examples is a debate taking place now on SpouseBUZZ, a website for military family members, about whether the traditional notification process for when...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.