AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 961-970 of 1420

Recycle government gadgets with greater care, GAO says

March 19, 2012 FROM NEXTGOV arrow Federal agencies could do more to ensure their castoff computers and other electronics don't end up in landfills, according to a watchdog report released Monday. The U.S. government is the largest global purchaser of information technology and disposes of about 10,000 computers weekly, according to estimates from the Environmental Protection...

Government's Role in Innovation

March 16, 2012 FROM NEXTGOV arrow An event that seemed to promise a fight over government's proper role in innovation Thursday evening turned surprisingly conciliatory instead. Vijay Vaitheeswaran, an editor at The Economist and author of the new book Need, Speed, and Greed, about the postindustrial economy, threw the hardest blow. "The history of government involvement...

Wanted: A brand-agnostic strategy for mobile devices

March 15, 2012 FROM NEXTGOV arrow Government data should be open, written in a common computer language and available through any electronic device, federal Deputy Chief Information Officer Lisa Schlosser said Thursday. That's the advice Schlosser's office has heard from technologists in government, the private sector and academia, she said, as it prepares to launch a...

Tackling government innovation through a new funding model

March 14, 2012 FROM NEXTGOV arrow There's no shortage of ideas for ways to better leverage technology to improve health and education in the developing world and there's no shortage of people interested in putting those ideas into practice, the chief innovation officer for the United States Agency for International Development said Wednesday. The problem, Maura...

So Who Actually Used Megaupload? Feds and Senate Staff, Founder Says.

March 13, 2012 FROM NEXTGOV arrow Among the Megaupload users who lost access to their data when the Justice Department shut the file sharing site down in January were some Justice employees and U.S. Senate staffers, the site's founder Kim Dotcom told the blog Torrentfreak in a Monday post. Justice officials seized the file sharing site,...

Cloud will change intelligence community's business model

March 13, 2012 FROM NEXTGOV arrow Cloud computing has the power to not only change the way the federal intelligence community manages information technology, but also to fundamentally change agencies' business models, according to a report released Tuesday. That change will be effective, however, only if intelligence agencies are prepared to modify their own organizational cultures...

NASA's App Challenge Takes to the Stars

March 12, 2012 FROM NEXTGOV arrow NASA's new application-building challenge can boast one thing no other agency can top: participants aboard the International Space Station. The space station is included in a list of locations where volunteer developers will be participating in the challenge. A presumably tongue-in-cheek note explains "transportation will not be provided." The apps...

Interior to Buy New iPads 'or equal'

March 12, 2012 FROM NEXTGOV arrow The Interior Department's National Business Center is wasting no time prepping its order for the new, third-generation iPads, set to be released at the end of the week. The center posted a presolicitation notice Friday saying it intends to buy at least 20 of the new tablets "or equal." It...

Big data meets interested government

March 12, 2012 FROM NEXTGOV arrow Intelligence agencies increasingly are looking beyond the satellite photos and secret reports upon which they've traditionally relied for insight into U.S. adversaries' actions and are turning to data-crunching algorithms that can sift through massive piles of disparate information, such as GPS reports, social media posts and online images, said Amr...

What's the Power of a Meme?

March 9, 2012 FROM NEXTGOV arrow The viral success of a 30-minute video detailing the crimes of Lord's Resistance Army leader Joseph Kony has sparked two major debates online. The first, laid out in great detail by our colleagues at The Atlantic, is whether the organization that produced the video, Invisible Children, is really the best...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.