Posts Tagged: Network

Your Post-Military Job: What You Can’t (And Can) Take With You

Knowing what you can’t, and can, take with you to your next job is incredibly important, especially when it comes to the military. Whether you realize it or not (I know it’s hard to stay awake through all of those preseparation counseling sessions) there may be restrictions concerning where you can work post military andRead… Read more »

Muslim reaction to Bin Laden

The Islamic world’s reaction to Bin Laden’s death has been mixed accurately reflecting a Kew Poll several years ago (2009) that measured the attitudes of Muslims to the Al Qaeda leader. In keeping with his own claims that his view was the only view possible for a Muslim, Bin Laden had a great number ofRead… Read more »

Case Study: FSB Poisons High-Value Target?

Glenn McGovern On November 1, 2006, Former FSB (Russian Federal Security Service) Colonel Alexander Litvinenko left his residence around 11:00 A.M. He caught the bus to the East Finchley tube station where he then took the train for a twenty-minute ride into London. On his agenda was a meeting with former KGB colleague Andrei Lugovoi,Read… Read more »

WikiLeak Proof

Originally published on 10 Dec 2010 at ECM Gov Blog. The latest WikiLeaks release and subsequent media storm has caused me to think about the role that ECM plays in content security. When all of our records were on paper, they were easily lost, compromised, copied, and destroyed. However, in the digital age, when weRead… Read more »

The Meaning of Wikileaks

Wikileaks does it again, publishing material that was meant to be classified and protected. People have called it treasonous and recommended legal action. Others have suggested a cloak-and-dagger approach to punish the guilty. President Obama has called for agencies to review their procedures for handling sensitive material. The general consensus among those in Government andRead… Read more »

New Open Platform API for Government Transparency & Innovation

As web-based technology platforms become more and more prevalent in the government, it’s important that agencies choose the one that’s going to give them the utmost flexibility. That’s why selecting one that has an open architecture and API is so important. This it allows agencies integrate systems and work between multiple workflows without redundancy. Also,Read… Read more »

A friend, of a friend, of a friend

This is a post originally appeared at http://nusum.wordpress.com/2010/09/15/a-friend-of-a-friend-of-a-friend/ I was part of an interesting information chain the other day and wanted to share it. No surprise to those of you that know me, I was walking the dogs and received an email on my phone from a colleague who was looking for a freelance contractorRead… Read more »

Does Gov 2.0 Lead to Improved Government? Proving the Case

Gov 2.0 advocates claim that their various projects in social networking and open government will, of course, lead to improved performance from government agencies and more satisfactory citizen engagement. But where is the proof? As Poister, Pitts, and Edwards (2010) conclude from their analysis of the last twenty years of strategic management in the publicRead… Read more »

You Can’t Separate the ‘Social’ from Social Media

This post originally appeared in Federal Computer Week on Feb. 17, 2010. With all the media coverage of internal, behind-the-firewall social — excuse me, professional — networking platforms, such as NASA’s Spacebook, the Defense Department’s milBook and even my company’s internal tool, one might think we’re in the midst of fundamentally changing the way weRead… Read more »

HOW to unlock programs, financials, databases, etc without passcodes/ passwords/user names???

Historically, usernames and passwords are the most common form of authenticating computer users. They are also both the worst management headache for IT staff and the biggest network security hole in existence. Many help desks handle more password related calls than any other category. Users routinely share their passwords with one another. We have passwordsRead… Read more »