AUTHOR ARCHIVES

Leo Mirani

Leo Mirani is a reporter for Quartz in London. He has previously worked at The Economist, Time Out Mumbai and Tehelka.
Results 1-10 of 109

Can Europe Be a Leading Tech Power?

August 3, 2015 FROM NEXTGOV arrow BRUSSELS—It is easy to get lost in European bureaucratese, with its byzantine designations and overlapping commissioners, vice presidents, and directorates-general. But when it comes to digital policy, the important thing to know is just this: Andrus Ansip is the most powerful person in Europe today. As the commissioner in charge...

Life-Saving 'Undo Send' Feature Now Official Part of Gmail

June 23, 2015 FROM NEXTGOV arrow It’s the sort of small software tweak that we at Quartz would normally ignore—if it wasn’t one of the most life-saving software tweaks ever invented. For well over half a decade, Gmail’s “undo send” feature, which works pretty much as advertised, has lived in obscurity in the “labs” section of...

A Brief Guide to the Fantastic, Wondrous Creatures of Tech Industry Jargon

June 22, 2015 FROM NEXTGOV arrow First came the unicorns. Then came the decacorns. Now people are talking about dragons, centaurs, and even ponies. The world’s tech startups, the people who finance them, and the journalists who write about them, appear in thrall to some sort of collective mass delusion in which startups must be classified...

Why Apple Is Suddenly So Obsessed With Your Privacy

June 9, 2015 FROM NEXTGOV arrow Last week, Apple CEO Tim Cook made a speech that—since it’s Apple—was widely picked up everywhere. While the full text of the speech was not made available, the bits TechCrunch and everyone else cited focused on user privacy: I’m speaking to you from Silicon Valley, where some of the most...

You Can Now Protect Your Facebook Messages From Snooping Eyes

June 1, 2015 FROM NEXTGOV arrow In July 2013, soon after the Edward Snowden revelations revealed to the world the widespread nature of US government snooping, Facebook turned on HTTPS by default, making communication between users’ computers and Facebook’s servers safe from peering eyes. In October last year, Facebook made its site available over Tor, a...

How to Use Mobile Phone Data for Good Without Invading Anyone’s Privacy

May 6, 2015 FROM NEXTGOV arrow In 2014, when the West African Ebola outbreak was at its peak, some academics argued that the epidemic could have been slowed by using mobile phone data. Their premise was simple: call-data records show the true nature of social networks and human movement. Understanding social networks and how people really...

There’s One Part of the Tech Industry that Mobile Is Not Disrupting

April 14, 2015 FROM NEXTGOV arrow Mobile has turned the tech industry upside down, destroying old businesses and creating new ones. But there is one corner of the tech industry that is strangely unaffected by the rise of the smartphone: hacking. According to Verizon’s latest Data Breach Investigations Report (DBIR), an authoritative annual report (pdf) that...

The Many Americans Who Only Use Smartphones to Go Online

April 2, 2015 FROM NEXTGOV arrow The idea that new Internet users will come online on smartphones rather than computers is now well established. But it is often assumed that this population is composed entirely of people from the world’s poor countries. A new report from Pew punctures that assumption: It turns out that one in...

Why the Mobile Industry Wants to Kill the Password

March 6, 2015 FROM NEXTGOV arrow Nobody likes passwords. They’re hard to remember, we’re terrible at coming up with good ones, and they’re not much use anyway. Yet they refuse to go away. The closest we’ve come to getting rid of them is by using the likes of Google and Facebook to log in to other...

How American and British Spies Hacked the World’s Largest SIM-Card-Maker

February 20, 2015 FROM NEXTGOV arrow Mass surveillance by America’s National Security Agency (NSA) and Britain’s Government Communications Headquarters (GCHQ) cast its net even wider than previously thought. The Intercept, a website that publishes stories based on documents provided by NSA whistleblower Edward Snowden, reports today that the two agencies hacked the networks of Gemalto, a...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

    Download
  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download
  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

    Download
  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.

    Download

When you download a report, your information may be shared with the underwriters of that document.