Yearly Archives: 2010

Speaking With One Voice – A Basic of Good Customer Service

A recent Federal Computer Week article began by saying that, for fun, I sometimes ask a question through various channels at a government agency to see if I get the same answer. Well, I’m not sure I’d call it “fun.” But I have done just that when preparing to teach a class – mostly toRead… Read more »

I Hate “Lurkers”

I just finished reading an article called “Active lurkers – the hidden asset in online communities.” Here’s an excerpt: “Most communities have 90% of users who are lurkers – people who may consume things from the community, but who don’t contribute…While it is inevitable that larger communities will end up with 1% of their membersRead… Read more »

Free Gov 2.0 Online Conference from O’Reilly – March 11

Just wanted to let everyone know about an upcoming Gov 2.0 Online Conference from O’Reilly happening March 11. This FREE two hour, interactive online conference will showcase international Gov 2.0 innovations being pioneered in Canada, the United Kingdom, Israel, and more. The Gov 2.0 Online Conference is co-chaired by Gov 2.0 Expo chairs Mark DrapeauRead… Read more »

Why telework will never work on snow days

Oh the stories that have emerged about Federal employee’s week off during snowpocalyse. The comments on Mike Causey’s recent story about the snow and telework sum up the issue. While OPM provides guidance on telework during Government closure, OPM also clearly states “…non-emergency employees (including employees on pre-approved paid leave) will be granted excused absenceRead… Read more »

Early Registration is Open for Gov 2.0 Expo

Just a quick note to let everyone know that early registration is now open for Gov 2.0 Expo, happening May 25-27, 2010 at the Washington Convention Center in DC. Gov 2.0 Expo will be the technology event for 21st Century government, giving government employees and contractors access to the practical tools, in-depth training, and industryRead… Read more »

Security of Multi-Factor Authentication by Larry Hamid

Since user authentication is the front line of security, the stronger it is the better. In this article I want to discuss multi-factor authentication and why it is stronger than just a single factor. Proving your identity involves using one or more of three possible factors: • Knowledge (passwords, PINs, etc.)• Possession (driver’s license, token,Read… Read more »

FOIA Meets Electronic Mail

Freedom of Information Act requests are swamping government. Governments have growing incentive to open-up, be transparent and publish their records (such as lots of email) directly on the web. If records are published, government doesn’t have to waste so much effort replying to FOIA demands. A case study is the municipality of Ann Arbor, Michigan.

Business IT Decision Making

Launching a new technological capability is a very complex endeavor. Decision makers have a huge challenge to become familiar with every aspect concerning the preparation, creation, deployment, integration and use of their technological capabilities. This is no small undertaking and isn’t something that can be accomplished without some help. If you’re a pilot and flyRead… Read more »