Yearly Archives: 2013

Code Across: It’s a Wrap!

The weekend of Feb. 22-24, 2013 Code for America celebrated our second annual Code Across America in municipalities from coast to coast. Though we’ve shared some anecdotes and stories from the weekend, we’ve been busy collecting and compiling debriefs from participating municipalities to see what worked, what didn’t, and how we can improve for eventsRead… Read more »

Interesting elsewhere – 13 March 2013

Things which caught my eye elsewhere on the web The Android Paradox, Hackers and Casuals – acoustik – Quora Most Android developers, designers, and product people tend to be Hackers. That’s why we do the things we do. And when we build features, we tend to build them for ourselves. Normally there’s nothing wrong withRead… Read more »

How Hackers Will Blow Up The World: China, Cyber-Warfare and the Cuban Missile Crisis

I have a piece on TechPresident I really enjoyed writing about how certain technologies – as they become weaponized – can in turn become highly destabilizing to global stability. The current rash of Cyber-Warfare, or Cyber-Spying or Cyber-crime (depending on the seriousness and intent with which you rate it) could be one such destabilizing technology.Read… Read more »

HUD Say It Will Furlough All Workers For A Week – Plus the DorobekINSIDER’s 7 Stories

On GovLoop Insights’ DorobekINSIDER: The Government Accountability Office has looked at the growing number of cybersecurity threats facing our nation. And it’s no small number. The GAO says the increase in cyber attack reported to CERT in the last 6 years has grown by 782%. There were 5,500 incidents in 2006, last year there wereRead… Read more »

SEI Unveils their findings in the Cyber Intelligence Tradecraft Project

By Ryan Kamauff The Software Engineering Institute (SEI) at Carnegie Mellon University (CMU) has recently released their summary of key findings on their Cyber Intelligence Tradecraft Project (CITP). Last year, six government agencies partnered with twenty academic and industry organizations to determine best practices in cyber intelligence tradecraft. This study has found that organizations useRead… Read more »

Anatomy of a Trainer

What is that exactly? Where do trainers come from? Are they born or made, as I like to ask my students of speakers. Trainers are a little different. Trainers are made of parts, like the human body, and have many interacting functions or working parts. Without some parts they die. With others, they thrive. FollowingRead… Read more »

Google + and Facebook and Twitter–Oh My! How to Use Social Media in a Disaster

A Highlight from the upcoming NAGC Communications School. Do you know the best ways to integrate social media into your disaster recovery communications plan? In today’s world of growing reliance on social media, communicators can’t afford not to. Join Sandy Levine, president of Advice Unlimited, for a session that will teach you what you needRead… Read more »

Baseball

Julie of the Web Managers Roundtable and I were discussing Spring Training and the Grapefruit League at her Mobile Event yesterday. “Sales,” she said, “is like baseball… “You pitch an offer… “And catch a sale… “Don’t ever try to pitch a sale…it just doesn’t work. “That’s like throwing a bowling ball down the gutter.” TipsRead… Read more »