AUTHOR ARCHIVES

Rebecca Greenfield

Results 171-178 of 178

In the war of the maps, Google's secret weapon is offline access

June 7, 2012 FROM NEXTGOV arrow While everyone was getting all excited about Google's 3D announcement today, Google revealed an even more useful, if less sexy, feature: an offline mode. Today's Next Dimension event, as the name indicates, was supposed to introduce Google's 3D technology ahead of Apple's event next week, where the Google-rival will put...

A complete guide to Flame, the malicious computer virus ravaging Iran

May 30, 2012 FROM NEXTGOV arrow Iran has acknowledged that Flame, what some have called the most sophisticated cyber espionage weapon yet, has infected computers across the country. "Having conducted multiple investigations during the last few months, the Maher center, the Iranian CERTCC, following the continuous research on the targeted attacks of Stuxnet and Duqu since...

The Google guy who snooped for wireless data was a 'god' among engineers

May 1, 2012 FROM NEXTGOV arrow That "rogue engineer" who collected personal information over wireless networks via Google's Street View cars has been identified in today's New York Times as Marius Milner, the creator of wireless detection software NetStumblr. Milner, who had previously only been identified as Engineer Doe in the controversy, collected masses of data,...

Humanoid robots DARPA hopes will save human lives

April 10, 2012 FROM NEXTGOV arrow Roberto Pfeil/AP The Pentagon today announced a robot competition, putting out a call for the type of full-service bot that could go into a dangerous emergency situation, perform multiple tasks and complete a mission. "The primary goal of the DARPA Robotics Challenge program is to develop ground robotic capabilities to...

The new iPad's Wi-Fi problem is real

April 5, 2012 FROM NEXTGOV arrow With Apple's acknowledgment that some iPads have a Wi-Fi problem, we have confirmation that the problem isn't one of those made-up-by whiner iPad issues. Looking for things to complain (and write) about, iPad users (and bloggers) created non-issues, like a battery charging "problem" and Warmthgate, in which the tablet warmed...

Microsoft's superhero cybercrime fighting unit

March 26, 2012 FROM NEXTGOV arrow Eugene Hoshiko/AP file photo When Microsoft's not making software or technological marvels in its labs, it's fighting crimes with its Digital Crimes Unit. This morning we learned about one of its missions, from The New York Times, which sounds more like a scene in a movie than something that goes...

Even Googlers are losing faith in Google

March 23, 2012 FROM NEXTGOV arrow Mark Lennihan/AP One of Google's own, Chief Internet Evangalist (and Internet inventor) Vint Cerf, has joined the growing chorus of voices warning of the possible end to Google's dominance. "There's nothing to stop someone from developing better technology than we have and to invent something even more powerful and efficient...

Can a robot make your workplace more humane? Amazon thinks so.

March 20, 2012 FROM NEXTGOV arrow For $775 million Amazon has acquired robot company Kiva Solutions, looking to "improve productivity" in those fulfillment centers we've heard such un-fun things about. Specifically, the little orange bots will bring products to workers, who as of now can walk up to 13 to 15 miles a day hand-picking and...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.