Register for the 2013 FOSE Conference

By Ryan Kamauff FOSE’s all-encompassing government technology conference will equip you with real-world tools, tactics and strategies via technology trailblazers who’ve been there, done that. From lessons learned to kudos earned, expect to gain rhetoric-free technology insights, policy updates and expert guidance you can use to optimize your IT program’s efficiency and effectiveness. If youRead… Read more »

Code Across: It’s a Wrap!

The weekend of Feb. 22-24, 2013 Code for America celebrated our second annual Code Across America in municipalities from coast to coast. Though we’ve shared some anecdotes and stories from the weekend, we’ve been busy collecting and compiling debriefs from participating municipalities to see what worked, what didn’t, and how we can improve for eventsRead… Read more »

How Hackers Will Blow Up The World: China, Cyber-Warfare and the Cuban Missile Crisis

I have a piece on TechPresident I really enjoyed writing about how certain technologies – as they become weaponized – can in turn become highly destabilizing to global stability. The current rash of Cyber-Warfare, or Cyber-Spying or Cyber-crime (depending on the seriousness and intent with which you rate it) could be one such destabilizing technology.Read… Read more »

Interesting elsewhere – 13 March 2013

Things which caught my eye elsewhere on the web The Android Paradox, Hackers and Casuals – acoustik – Quora Most Android developers, designers, and product people tend to be Hackers. That’s why we do the things we do. And when we build features, we tend to build them for ourselves. Normally there’s nothing wrong withRead… Read more »

SEI Unveils their findings in the Cyber Intelligence Tradecraft Project

By Ryan Kamauff The Software Engineering Institute (SEI) at Carnegie Mellon University (CMU) has recently released their summary of key findings on their Cyber Intelligence Tradecraft Project (CITP). Last year, six government agencies partnered with twenty academic and industry organizations to determine best practices in cyber intelligence tradecraft. This study has found that organizations useRead… Read more »

Anatomy of a Trainer

What is that exactly? Where do trainers come from? Are they born or made, as I like to ask my students of speakers. Trainers are a little different. Trainers are made of parts, like the human body, and have many interacting functions or working parts. Without some parts they die. With others, they thrive. FollowingRead… Read more »

Google + and Facebook and Twitter–Oh My! How to Use Social Media in a Disaster

A Highlight from the upcoming NAGC Communications School. Do you know the best ways to integrate social media into your disaster recovery communications plan? In today’s world of growing reliance on social media, communicators can’t afford not to. Join Sandy Levine, president of Advice Unlimited, for a session that will teach you what you needRead… Read more »