Yearly Archives: 2012

Customer Service For All

Organizations get feedback from a number of sources – email, social media, word of mouth, even from other employees. There is a strong tenancy to jump into action when a complaint is registered – all in the name of customer service. The urgency and energy spent to respond is almost obsessive in nature – weRead… Read more »

Over 230 Startups Apply to Code for America

Just a little over six weeks ago, we opened up applications for the CfA Startup Accelerator. Honestly, when we did, we thought we would receive maybe a dozen or two applications. We weren’t sure if folks would know what we meant by “civic,” or be able to hear about it soon enough to apply; orRead… Read more »

Free June 12 webinar: Advancing Health Reform by Inclusion: Engaging Communities of Color in Creating Policy Change

From Community Catalyst: “Advancing Health Reform by Inclusion: Engaging Communities of Color in Creating Policy Change Tuesday, June 19, 2012 from 2 p.m. to 3 p.m. Eastern Time Register at http://bit.ly/KMvqDm by Friday, June 15, 2012 The best change occurs when the communities most affected are involved. Moving toward health equity requires full participation byRead… Read more »

Developing the National Cybersecurity Workforce, The National Level Exercise 2012, and More

Here is today’s federal cybersecurity and information technology news: The Department of Homeland Security has launched a new initiative to develop and recruit the national cybersecurity workforce. More here. A Washington Post poll finds that Americans are divided about what role, if any, the federal government should play in setting and enforcing cybersecurity standards forRead… Read more »

The Four Rules of Media and Layers

These four rules help government agencies plan for social campaigns, because they force us to answer key questions about our audience, our message, the tools at our disposal, and the resources available to us–the four constant variables in every activity that includes a social layer. The Goal of a more Participatory Government I’ve been thinkingRead… Read more »

Estonia as a Cyber Trafalgar

On Wednesday, May 23, Jason Healey, moderator for the Atlantic Council’s “Building a Secure Cyber Future: Attacks on Estonia, Five Years On,” reminded us that for all the talk of emergent threats and new technology, cybersecurity has a history that’s worth remembering and learning from. While the Navy still studies the Battle of Trafalgar fromRead… Read more »

How Do You Retain Security With BYOD?

Mobile devices and applications have become an essential component of the modern workplace. On a daily basis, mobile devices are being integrated into the work environment. Across government, agencies are now exploring ways to implement bring-your-own-device policies, with the hopes that by allowing people to work on the platform they choose, agencies will be ableRead… Read more »