AUTHOR ARCHIVES

Rebecca Greenfield

Results 71-80 of 178

The Google Maps of the future sounds useful but creepy

January 3, 2013 FROM NEXTGOV arrow The Google Maps of the future will be a very smart computer program that knows you very well, which sounds part useful, part annoying, and part creepy. "The dialogue with the map is becoming much more personal," Google's Michael Jones told The Atlantic's James Fallows in a Q&A in this...

What the future of China's new Internet crackdown looks like

December 31, 2012 FROM NEXTGOV arrow The Chinese government on Friday approved regulations that will require all of the country's Internet users to register their names, but it remains unclear when and how the ominous "real name" policy will go into effect — and what, exactly, will happen once it does. So far, the legislature has...

John McAfee's run from the law made John McAfee's company look really bad

December 20, 2012 FROM NEXTGOV arrow Since John McAfee first ran away from the Belizean police following the murder of his neighbor on on November 12, the public perception of his anti-virus software giant has lost credibility with consumers. At least according to the latest research trend from BrandIndex, which calls itself the "authoritative measure of...

You can download your entire Twitter history now

December 19, 2012 FROM NEXTGOV arrow Users spotted this last weekend, but Twitter has made it official in a blog post today: you can download all your tweets, from forever. The archiving feature still isn't available to all users, but it's on its way, says Twitter, which will roll out the option "over the coming weeks...

The cellphone virus from Hell will eat your money

December 14, 2012 FROM NEXTGOV arrow The latest in smartphone malware is a sneaky digital beast, one that surreptitiously makes charges to your phone bill. Toll fraud, as the security experts have dubbed it, disguises itself as a run-of-the-mill app. Once it gets itself on an Android phone—those caged Apple devices don't have this problem—the virus...

The North Korean satellite is tumbling out of control: How dangerous is that?

December 13, 2012 FROM NEXTGOV arrow After so many failed attempts, North Korea finally rocketed its satellite into space early Wednesday — only to watch it go "tumbling out of control," as U.S. officials tell NBC News Wednesday night. That's not only another embarrassment for a country that's looking to launch a nuclear missile — it's...

What Your Email Inbox Count Says About You

December 13, 2012 What's the number of unread emails—right now, at this moment, without changing anything—in your inbox? That would be 3,487 in the case of Jen here; 1 in the case of Rebecca. More about what that means in a second, but first, a bit of backstory: The New Yorker's Silvia Killingsworth...

Video: Yes, you can major in social media now

December 11, 2012 FROM NEXTGOV arrow Hey, kids, how'd you like some Internet with that diploma? South Carolina's Newberry College has added a social media major, because of the apparent skyrocketing number of jobs in that field — a bubble that surely won't pop by the time any of said kids graduate. Students who want to...

Larry Page just wants Apple and Google to get along

December 11, 2012 FROM NEXTGOV arrow When asked about his competition — and Apple specifically — Google CEO Larry Page now insists he wants to see more cooperation, less animosity, and happier users. That's a shocking admission considering the overt resentment between big tech companies these days, especially Google and Apple. Steve Jobsfamously maligned Android, calling...

Who's winning the mobile browser war?

December 10, 2012 FROM NEXTGOV arrow Internet browsers are battling like its 1999, only this time on a smaller computer screen: the smartphone. Or so says The New York Times's Claire Cain Miller, in laying out the "wars" between Microsoft's Internet Explorer, Apple's Safari, Mozilla Firefox, Google's Chrome, and Amazon's Silk. Miller claims this conflict has...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.