AUTHOR ARCHIVES

Rebecca Greenfield

Results 101-110 of 178

It's official: Windows 8 is a disappointment, for now

November 19, 2012 FROM NEXTGOV arrow The new Microsoft operating system that all the reviewers called confusing isn't exactly winning over consumers either. Since its launch less than a month ago, Windows 8 has seen weaker sales than its predecessor Windows 7, an NDP Group report via AllThingD's John Packzkowski found. Sources inside Microsoft also say...

The Google Maps iPhone app is real

November 16, 2012 FROM NEXTGOV arrow The mythical Google Maps iPhone app possibly coming to an iOS device near you by 2013 exists, a source tells The Wall Street Journal's Amir Efrati and Jessica Lessin. At least a test version of it does and some "individuals outside of the company" are getting to play with it,...

The future without passwords will be complicated

November 16, 2012 FROM NEXTGOV arrow The password no longer suffices as a mean of protection for computer using humanity, so Wired's Mat Honan suggests we kill it. But what exactly will we replace it with? Honan has a personal stake in this movement, as he lost a lot of his life after a major hacking...

How to be a Google 1 percenter

November 15, 2012 FROM NEXTGOV arrow One of the first things you learn in Google's Power Searching class is that if you know about the magic of CTRL+F then you are in the top 10 percent of all searchers. That made someone like me, who uses the word find function on the regular a little cocky...

Nokia Maps for iPhone has (almost) everything Apple Maps doesn't

November 14, 2012 FROM NEXTGOV arrow Nokia announced it will bring its maps to both iOS and Android phones, releasing a mobile app called Here, which should have iPhone iOS 6 users elated because it will bring everything the loathed Apple Maps took away from Google Maps users. Apple Maps doesn't deliver for a few key...

On the lam, John McAfee claims he is innocent

November 13, 2012 FROM NEXTGOV arrow Anti-virus maker John McAfee will not turn himself in for questioning about the murder of his neighbor Gregory Faull for which he is "a person of interest," but it's not because he did it, he says. McAfee claims he is innocent in an interview with Wired's Joshua Davis, who managed...

John McAfee, anti-virus software inventor, reportedly wanted for murder in Belize

November 12, 2012 FROM NEXTGOV arrow Update: On Monday afternoon, McAfee officials said in a statement, “John McAfee has no current affiliation with the company and hasn’t for a long time, and we don’t comment on former employees.” John McAfee of McAfee anti-virus software fame is reportedly wanted for the murder of American expatriate Gregory Paul,...

The iPhone cedes world dominance to the Samsung Galaxy S3 for now

November 8, 2012 FROM NEXTGOV arrow Apple has lost its number one position with the world's most popular phone, ceding the title to rival Samsung and its Galaxy S3, but we don't imagine it will stay that way for too long. Last quarter, Samsung sold 18 million S3s, compared to the 16.2 million iPhone 4S phones...

Actually, the election didn't break Twitter

November 7, 2012 FROM NEXTGOV arrow Defying predictions that the velocity of tweets would render Twitter useless either technically or practically during last night's election, the site didn't break and was actually a pretty great place to keep up on news. This tweet from Twitter's creative lead Dave Bowman pretty much sums up how things went...

The iPhone is having a rough Election Day

November 6, 2012 FROM NEXTGOV arrow The iPhone had its week last week, when Instagram brought unbelievable but real images of Sandy's destruction to our attention and Twitter acted as a (mostly) reliable news and information source for many people. With power out for many, cell phones helped manycommunicate until their batteries died, or lost connection...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.