Monthly Archives: February 2010

Is social the new dirty word?

I woke up in a cold sweat the other morning, memories of the early 2000s floating in my head. Remember the insanity when everyone wanted to throw the “e-” prefix in front of everything? Good thing we all learned from that lesson. Social strategies and tools are adding, and will continue to add, real valueRead… Read more »

Spam Hyperlinks and Personal Information on Government Blogs

Here in Massachusetts, we moderate comments on all of our Commonwealth Conversations blogs. While our comment policies obviously lean heavily on the side of First Amendment rights, they’re in place to protect our employees, bloggers, readers, and commenters. When moderating comments, I think it’s natural to want to scan the comments for obvious violations (i.e.,Read… Read more »

Best practices gained from NextGen deployment

By Dorothy Ramienski Internet Editor Federal News Radio Federal News Radio has been telling you about the Next Generation Air Transportation System (NextGen), which promises to transform the nation’s air transportation system in the 21st century. Currently, five federal agencies are involved in the planning and execution of the system: the Department of Commerce, DoD,Read… Read more »

The Open Government Directive & Accessibility Shortcomings

After reading GCN’s article ‘GSA takes a fast, free approach to Web dialogue tool‘ I decided to take a look at the tool in question, IdeaScale, to see what the buzz was all about. The article explains that GSA joins several Federal departments/agencies already using IdeaScale including the White House, Federal Communications Commission (FCC), andRead… Read more »

HOW to unlock programs, financials, databases, etc without passcodes/ passwords/user names???

Historically, usernames and passwords are the most common form of authenticating computer users. They are also both the worst management headache for IT staff and the biggest network security hole in existence. Many help desks handle more password related calls than any other category. Users routinely share their passwords with one another. We have passwordsRead… Read more »