AUTHOR ARCHIVES

Rebecca Greenfield

Results 171-178 of 178

In the war of the maps, Google's secret weapon is offline access

June 7, 2012 FROM NEXTGOV arrow While everyone was getting all excited about Google's 3D announcement today, Google revealed an even more useful, if less sexy, feature: an offline mode. Today's Next Dimension event, as the name indicates, was supposed to introduce Google's 3D technology ahead of Apple's event next week, where the Google-rival will put...

A complete guide to Flame, the malicious computer virus ravaging Iran

May 30, 2012 FROM NEXTGOV arrow Iran has acknowledged that Flame, what some have called the most sophisticated cyber espionage weapon yet, has infected computers across the country. "Having conducted multiple investigations during the last few months, the Maher center, the Iranian CERTCC, following the continuous research on the targeted attacks of Stuxnet and Duqu since...

The Google guy who snooped for wireless data was a 'god' among engineers

May 1, 2012 FROM NEXTGOV arrow That "rogue engineer" who collected personal information over wireless networks via Google's Street View cars has been identified in today's New York Times as Marius Milner, the creator of wireless detection software NetStumblr. Milner, who had previously only been identified as Engineer Doe in the controversy, collected masses of data,...

Humanoid robots DARPA hopes will save human lives

April 10, 2012 FROM NEXTGOV arrow Roberto Pfeil/AP The Pentagon today announced a robot competition, putting out a call for the type of full-service bot that could go into a dangerous emergency situation, perform multiple tasks and complete a mission. "The primary goal of the DARPA Robotics Challenge program is to develop ground robotic capabilities to...

The new iPad's Wi-Fi problem is real

April 5, 2012 FROM NEXTGOV arrow With Apple's acknowledgment that some iPads have a Wi-Fi problem, we have confirmation that the problem isn't one of those made-up-by whiner iPad issues. Looking for things to complain (and write) about, iPad users (and bloggers) created non-issues, like a battery charging "problem" and Warmthgate, in which the tablet warmed...

Microsoft's superhero cybercrime fighting unit

March 26, 2012 FROM NEXTGOV arrow Eugene Hoshiko/AP file photo When Microsoft's not making software or technological marvels in its labs, it's fighting crimes with its Digital Crimes Unit. This morning we learned about one of its missions, from The New York Times, which sounds more like a scene in a movie than something that goes...

Even Googlers are losing faith in Google

March 23, 2012 FROM NEXTGOV arrow Mark Lennihan/AP One of Google's own, Chief Internet Evangalist (and Internet inventor) Vint Cerf, has joined the growing chorus of voices warning of the possible end to Google's dominance. "There's nothing to stop someone from developing better technology than we have and to invent something even more powerful and efficient...

Can a robot make your workplace more humane? Amazon thinks so.

March 20, 2012 FROM NEXTGOV arrow For $775 million Amazon has acquired robot company Kiva Solutions, looking to "improve productivity" in those fulfillment centers we've heard such un-fun things about. Specifically, the little orange bots will bring products to workers, who as of now can walk up to 13 to 15 miles a day hand-picking and...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.