AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 981-990 of 1487

The many mothers of invention

May 8, 2012 FROM NEXTGOV arrow Innovations such as a 2006 Transportation Department pilot program to reduce traffic jams and exhaust pollution can be spawned by a sudden influx of funding, panelists at Government Executive Media Group’s Excellence in Government conference said Monday. Or they can be prompted by the dearth of funding agencies face today....

Gathering data is just the first step

May 7, 2012 FROM NEXTGOV arrow The explosion of big data across government and industry is just the first step in developing more efficient, data-driven services, Corporate Executive Board managing director Sampriti Ganguli said Monday. The next steps are figuring out what the data means, separating the wheat from the chaff and, finally, turning that knowledge...

Democrats defend IT field hearing that Republicans plan to boycott

May 4, 2012 FROM NEXTGOV arrow There’s nothing unethical about an information technology-focused event that Democratic members of the House Oversight and Government Reform Committee plan to hold in Northern Virginia on May 11, the committee’s ranking member and the leading Democrat on its IT subcommittee said Thursday. Chairman Darrell Issa, R-Calif., on April 26 declined...

How House Oversight Conquered YouTube and What It Means

May 3, 2012 FROM NEXTGOV arrow So what does it take to rise to the top in federal social media? Well, dedication and tech savvy help, but content is still king. This lesson is borne out by the House Oversight and Government Reform Committee, which recently crossed a milestone: 2 million video views on its YouTube...

Federal CIO releases shared services strategy

May 3, 2012 FROM NEXTGOV arrow Agency technology chiefs in charge of implementing a new Shared Services Strategy should look first to information technology spending within their agencies for commodities such as email and storage, federal Chief Information Officer Steven VanRoekel said Thursday. After that, agencies should aim to consolidate services within lines of business, such...

Big data could remake science -- and government

May 2, 2012 FROM NEXTGOV arrow Big data has the power to change scientific research from a hypothesis-driven field to one that’s data-driven, Farnam Jahanian, chief of the National Science Foundation’s Computer and Information Science and Engineering Directorate, said Wednesday. Reaching that point, however, will require upfront investment from government and the private sector to build...

Interior awards $35M cloud email contract to Google vendor

May 1, 2012 FROM NEXTGOV arrow This story has been updated to include comments from the Interior Department. The Interior Department late Monday awarded a $35 million contract to Onix Networking Corps. to move Interior's 90,000 employees to the cloud-based Google Apps for Government email system. This could mark the end of a multiyear legal squabble...

A Tech Evolutionary

May 1, 2012 FROM NEXTGOV arrow One of the formative moments of federal Chief Information Officer Steven VanRoekel’s life was watching Star Wars in the movie theater as a child. That might not be surprising for a man who describes himself as “the tech geek” and who spent 15 years working his way up the Microsoft...

A Tech Evolutionary

May 1, 2012 One of the formative moments of federal Chief Information Officer Steven VanRoekel’s life was watching Star Wars in the movie theater as a child. That might not be surprising for a man who describes himself as “the tech geek” and who spent 15 years working his way up the Microsoft...

Tech Roundup

May 1, 2012 Chain Reaction Counterfeit materials increasingly endanger the military supply chain. Because technology often touches many hands in foreign countries before reaching a contractor, malicious actors have multiple opportunities to taint materials. In March, the Government Accountability Office announced its undercover investigators had ordered military-grade parts from online portals and received...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.