AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 921-930 of 1377

Tackling government innovation through a new funding model

March 14, 2012 FROM NEXTGOV arrow There's no shortage of ideas for ways to better leverage technology to improve health and education in the developing world and there's no shortage of people interested in putting those ideas into practice, the chief innovation officer for the United States Agency for International Development said Wednesday. The problem, Maura...

So Who Actually Used Megaupload? Feds and Senate Staff, Founder Says.

March 13, 2012 FROM NEXTGOV arrow Among the Megaupload users who lost access to their data when the Justice Department shut the file sharing site down in January were some Justice employees and U.S. Senate staffers, the site's founder Kim Dotcom told the blog Torrentfreak in a Monday post. Justice officials seized the file sharing site,...

Cloud will change intelligence community's business model

March 13, 2012 FROM NEXTGOV arrow Cloud computing has the power to not only change the way the federal intelligence community manages information technology, but also to fundamentally change agencies' business models, according to a report released Tuesday. That change will be effective, however, only if intelligence agencies are prepared to modify their own organizational cultures...

NASA's App Challenge Takes to the Stars

March 12, 2012 FROM NEXTGOV arrow NASA's new application-building challenge can boast one thing no other agency can top: participants aboard the International Space Station. The space station is included in a list of locations where volunteer developers will be participating in the challenge. A presumably tongue-in-cheek note explains "transportation will not be provided." The apps...

Interior to Buy New iPads 'or equal'

March 12, 2012 FROM NEXTGOV arrow The Interior Department's National Business Center is wasting no time prepping its order for the new, third-generation iPads, set to be released at the end of the week. The center posted a presolicitation notice Friday saying it intends to buy at least 20 of the new tablets "or equal." It...

Big data meets interested government

March 12, 2012 FROM NEXTGOV arrow Intelligence agencies increasingly are looking beyond the satellite photos and secret reports upon which they've traditionally relied for insight into U.S. adversaries' actions and are turning to data-crunching algorithms that can sift through massive piles of disparate information, such as GPS reports, social media posts and online images, said Amr...

What's the Power of a Meme?

March 9, 2012 FROM NEXTGOV arrow The viral success of a 30-minute video detailing the crimes of Lord's Resistance Army leader Joseph Kony has sparked two major debates online. The first, laid out in great detail by our colleagues at The Atlantic, is whether the organization that produced the video, Invisible Children, is really the best...

Obama taps former health care executive to become new CTO

March 9, 2012 FROM NEXTGOV arrow Health and Human Services Department Chief Technology Officer Todd Park will be the next federal CTO, replacing Aneesh Chopra, the White House announced Friday. Park made millions in healthcare technology before joining HHS in 2009. He initially was hired as the department's "entrepreneur in residence." According to a June 2011...

Former federal CIO presses for social government

March 8, 2012 FROM NEXTGOV arrow This story has been updated. Former federal Chief Information Officer Vivek Kundra, once the greatest proponent of cloud technology in government, has declared victory and moved on. As the information technology vendor Salesforce.com's new executive vice president for emerging markets, Kundra said he's now focused instead on the way social...

When Big Data Meets Big Politics

March 7, 2012 FROM NEXTGOV arrow Companies are increasingly crunching "big data" culled from your Web search history, email traffic and social networking sites to micro-target you with advertisements that fit your age, gender and even shopping preferences. But companies aren't the only ones getting personal online. Political campaigns also are learning as much as they...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.