Posts Tagged: Access

Questions for Journalists, Politicians and Police Departments about Public Information Access

When Bradley Tech, a troubled Milwaukee public high school, had to be locked down and receive massive police support to stop a fight involving gang members and kids from other schools, the most important issue is not about the school, the 18 arrests, the gangs, the fight, or the police response. It’s about having noRead… Read more »

Reading tea leaves at OMB when what’s needed are answers

By David Perera The White House recently warned agencies that they should be cooperating with Office of Management Budget efforts to review agency information technology programs. Federal Chief Information Officer Vivek Kundra began such reviews in January under the rubric of “TechStat,” but background sources have told FierceGovermentIT that agency willingness to participate in thoseRead… Read more »

Mobile Journalism: Information Flung Far & Wide

The third installment in my series on how mobility and the Internet are up-ending traditional commercial models focuses on journalism. (see earlier posts on Online Education and Mobile Banking) Here, we track affordable mobile telephony that informs citizenry in sparsely populated, under-educated, and under-developed communities worldwide, in lieu of print news; and video-enabled community volunteersRead… Read more »

SCOTUS Decisions 1937-1975 Now Available in Bulk from GPO

Full text of U.S. Supreme Court decisions issued from 1937-1975 — derived from the U.S. Air Force’s FLITE database — is available in bulk from the U.S. Government Printing Office (GPO)’s FDsys, as of 13 April 2010. According to GPO, this FLITE file is a text-only file, of approximately 50MB, containing U.S. Supreme Court decisionsRead… Read more »

HOW to unlock programs, financials, databases, etc without passcodes/ passwords/user names???

Historically, usernames and passwords are the most common form of authenticating computer users. They are also both the worst management headache for IT staff and the biggest network security hole in existence. Many help desks handle more password related calls than any other category. Users routinely share their passwords with one another. We have passwordsRead… Read more »

What can Government 2.0 do to improve the efficiency of outsider visits to Federal Agencies?

As a government contractor with good intentions,-) I routinely visit a number of military and civilian Federal agencies in DC, MD, and VA. My experience in getting into these agencies is uniformly the same – long, cumbersome, and confusing. Now we all agree that the Federal agencies should control access to their facilities for securityRead… Read more »

So GSA Negotiated Terms of Service…Now What?

In the past few weeks, the General Services Administration (GSA) has signed Terms of Service (TOS) agreements with a number of new media providers. The agreements signed by GSA were negotiated with the assistance of a number of federal agencies. The goal was to arrive at a TOS federal agencies would be comfortable enough withRead… Read more »