AUTHOR ARCHIVES

Rebecca Greenfield

Results 81-90 of 178

Bitcoin is as legit as Paypal now, in at least one country

December 7, 2012 FROM NEXTGOV arrow Bitcoin, the occasionally frightening virtual currency that doesn't believe in government regulation, just got itself some. One of its exchanges, Bitcoin-Central, has received approval from France's government to operate as a payment service provider there, PayPal-style. With that relationship comes some insurance protection that should help get people trusting Bitcoin...

NASA: Apocalypse, no!

December 7, 2012 FROM NEXTGOV arrow With the Mayan apocalypse fast approaching (two weeks!), a NASA senior scientist has reassured the world that the space agency isn't hiding any intel on the order of the universe and its impending implosion December 21. "There’s no cosmic catastrophe coming," David Morrison said definitively to Current TV's Cenk Uygur....

What Apple's all-American factory of the future might look like

December 7, 2012 FROM NEXTGOV arrow When Apple CEO Tim Cook revealed in an interview with Brian Williams airing Thursday night that Apple will begin building Macs in the United States next year, that's about all he said: We're coming to America — no how, no where, not even really a when. But strange as a...

John McAfee rushed to hospital after apparent heart attacks in prison

December 7, 2012 FROM NEXTGOV arrow Just hours after Guatemala's government denied John McAfee asylum, the rogue anti-virus pioneer was sent to a hospital there Thursday afternoon for a possible heart attack, reports ABC News's Matt Guttman, who also took that photo of him in the ambulance. (His new lawyer claims he suffered two heart attacks.)...

Does anyone really use Google+ still?

December 6, 2012 FROM NEXTGOV arrow In an attempt to show us how much Google+ has grown, Google released numbers Thursday that prove little more than how few users it's gotten users to engage with the service's front end. At 500 million "upgraded" users, "Google+ is the fastest-growing network thingy ever," writes Vic Gundotra, the social...

iPhone coming to T-Mobile next year

December 6, 2012 FROM NEXTGOV arrow Sometime in 2013, T-Mobile customers can get themselves an iPhone, according to a for-real official announcement from Deutsche Telekom, T-Mobile's parent company. Or at least it sure sounds like T-Mobile will get the iPhone, as part of its new deal to sell "Apple products." Why would that not include the...

Apple will be made in America, finally

December 6, 2012 FROM NEXTGOV arrow Hoping to achieve what even Steve Jobs once considered the impossible, the largest company in American history will attempt to actually make a major product in America, says Apple CEO Tim Cook in a new interview. Apple plans to build a line of Macs at an as-yes-undisclosed site next year,...

The verdict on Gmail's new iPhone app

December 4, 2012 FROM NEXTGOV arrow Perhaps the cliché will work in Google's favor and the third time will be the charm for Gmail on the iPhone. After the first two versions didn't go so well, Google released a third edition of its email app today — and it seems to be a serious upgrade. (We...

Is John McAfee about to come clean?

December 4, 2012 FROM NEXTGOV arrow Ever since tech entrepreneur turned potential murder suspect John McAfee hooked up with Vice magazine on the lam, his saga has taken such a turn for the unbelievable that, today, it's made its way almost back toward sanity. To recap, yesterday, after announcing his escape from Belize, Vice posted a...

Should we be able to patent human genes?

December 3, 2012 FROM NEXTGOV arrow Depending on how the Supreme Court decides on the case it decided to take up Friday afternoon, biotech companies might soon be able to patent ownership of essential parts of our bodies. Actually, one company, Myriad, already has patents for two genes, BRCA 1 and 2, that when found in...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.