AUTHOR ARCHIVES

Rebecca Greenfield

Results 161-170 of 178

The wrong lesson for bosses to learn from Steve Jobs

July 24, 2012 FROM NEXTGOV arrow One reading of Walter Isaacson's Steve Jobs biography suggests the key to success is being a jerk, a piece of advice that some bosses have taken too literally. But science is on the side of nice bosses. It has found mean bosses lead to lower worker satisfaction, which in turn...

The decline of Google (and the Internet's) ad business

July 20, 2012 FROM NEXTGOV arrow As three makes a trend, a third quarter in a row of cost-per-click decline for Google advertising makes this an unsettling norm not only for the search company, but also for Internet advertising efforts elsewhere. During yesterday's earning call, Google reported a 16 percent decline in CPC, meaning the value...

Sometimes its smart to use dumb passwords

July 12, 2012 FROM NEXTGOV arrow If we've learned one thing from this Yahoo hack, it's that even after countless blogger and security expert pleas for smarter choices, people continue to create amazingly obvious passwords, leading us to wonder if they might be doing it on purpose. And if so, bravo! In today's Yahoo Voices breach,...

Huge fines are still puny for Google and Goldman

July 11, 2012 FROM NEXTGOV arrow Following an iPhone tracking privacy scandal earlier this year, Google will have to pay the biggest Federal Trade Commissions fine ever given to a single company, which for a huge corporation like Google doesn't add up to all that much, showing how little impact even the largest fines have. The...

RIM is doing everything backwards

July 11, 2012 FROM NEXTGOV arrow Following a very horrible no good quarterly earnings report, Research in Motion had its annual shareholders meeting, and announcing some strange steps to fix its bedraggled BlackBerry business. At the meeting, CEO Thorsten Heins gave a ra-ra speech where he said he would turn the company into a "lean, mean,...

How to check if you'll lose the Internet Monday

July 6, 2012 FROM NEXTGOV arrow Come Monday somewhere between 200,000 and 500,000 computers won't be able to get onto the Interwebs because of some complicated expiration of FBI protection of DNS malware. Don't let that be you. We know, a world without Internet -- especially for we Internet creatures -- would not only render us...

Inside the bureaucracy that crippled Microsoft

July 3, 2012 FROM NEXTGOV arrow The once dominant tech company is just now playing catch-up to the hip forward-thinking Apple and now we know what took it so long: bureaucracy. In company emails obtained by Vanity Fair's Kurt Eichenwald, he details the top-down culture called "stack ranking" that not only stifled overall innovation, but killed...

This declaration of Internet freedom is vague

July 2, 2012 FROM NEXTGOV arrow As a reaction to SOPA and other complex legislative efforts to regulate the Internet, online activists have created a Declaration of Internet Freedom, which consists of five very broad principles to keep the Internet free and open. At fewer than 100 words, compared to the convoluted anti-piracy bills it's a...

RIM is dying because it got the future of phones completely wrong

June 29, 2012 FROM NEXTGOV arrow Following yesterday's sad quarterly earnings report that confirmed the deterioration at Research in Motion we've heard about for the last year, The Wall Street Journal's Will Connor tells us why exactly the BlackBerry maker failed so hard, and it has a lot to do with getting everything wrong about the...

BlackBerry maker continues to struggle with lagging sales

June 20, 2012 FROM NEXTGOV arrow The bad news keeps coming for BlackBerry maker Research in Motion, which is laying off up to 6,000 people as an attempt to save its dying company, according to Canadian paper, The Record. The company has been firing employees in batches of 10 over the last several weeks, The Wall...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.