Tech

What does it take to be a leader in government IT?

Government IT is a fickle world that requires leaders to utilize multiple skillsets to achieve success. This world has many moving parts, and if not managed properly, could break down and create mayhem. What do leaders in government technology need to do to be successful? Here are two suggestions… First, leaders must build a solidRead… Read more »

Sunlight Foundation: 2Day in #OpenGov 2/13/2012

Policy Fellow Matt Rumsey wrote this post. Here is the week’s first look at transparency-related news items, congressional committee hearings, transparency-related bills introduced in Congress, and transparency-related events. News Roundup: Campaign Finance A major donor to the Rick Santorum supporting Red, White, and Blue Fund, Wyoming Millionaire Foster Friess, was at CPAC last week toRead… Read more »

New Member

Hello Everyone, I’d like to introduce myself, my organization, and interests to fellow members. Efficient construction product delivery methods (integrated project delivery/IPD), job order contracting/JOC), construction/renovation/repair/sustainability cost databases, BIM as an integrated process, cloud computing, and facility life-cycle management are my core interests. Our firm’s software and solutions support over 80% of United States AirRead… Read more »

GovBytes: Anonymous targets Alabama in latest attacks by the cyber-insurgency

Anonymous, whether viewed as an online force for good or hackers disguised as do-gooders, have undeniably far-reaching capabilities. They’ve demonstrated this again Friday (2/10/2012) by announcing that they had hacked local and state law enforcement in Alabama to gain access to the information of 46,000 residents. The information includes social security numbers, license plate numbers,Read… Read more »

Please visit the AIIM Conference (and see @BobGourley speak!)

The AIIM conference is a great learning opportunity for all IT professionals Every year, the AIIM Conference meets to provide excellent keynotes and other speakers. This year our editor, Bob Gourley will be speaking on Big Data. The conference is March 20-22 at the Grand Hyatt in San Francisco. The topic for this year isRead… Read more »

Passwords Suck

Passwords alone aren’t enough any more… Passwords suck. They are long, hard to remember (even if you have easier-to-remember phrases), moreso when new, and are largely a difficulty for users to user properly. Combined with the fact that many users choose easy-to-guess or easy-to-ascertain passwords based off of commonly-known facts about themselves and that theyRead… Read more »

Mobile Gov Wikithon #4 Recap

The “Bring a Friend” Mobile Gov Wikithon held last week was an overwhelming success! Attendees in Bethesda, MD, Washington, D.C. and those online discussed mHealth initiatives, consuensus mobile good practices and created content for the Mobile Gov Wiki. You can see everything that was done during the Wikithon at this link. Thanks for the attendeesRead… Read more »

Making Large-Scale Collaborations Effective: Lessons from “Reinventing Discovery: The New Era of Networked Science”

In 1999, the reigning world chess champion played against 50,000 people through the Internet. Entitled “Kasparov versus the World,” chess players (experts and amateurs) collaborated to play the black pieces while Kasparov alone played the white pieces. Anyone can suggest a move, discuss the moves, and vote on moves. Whichever move received the highest voteRead… Read more »

LinkWithin Creates Reads and Comments

Last week I got a valid comment on a two year old post. The same commenter also posted under a current post. LinkedWithin is a widget that shows a changing choice of three stories at the bottom of each blog post. I first saw it on A Suitable Wardrobe, and even though I feel tremendousRead… Read more »

National Science Foundation Emphasizes Cloud Computing Security and Efficiency

Mark Drapeau (Washington, DC) — As reported by Camille Tuutti at Federal Computer Week, the National Science Foundation (NSF) has plans to invest resources into understanding various aspects of cloud computing, in particular how to make it more energy efficient, and how to make it more secure from hackers and other kinds of digital intrusion.Read… Read more »