Tech

How does the Muslim World view us? Here is the best answer you will find anywhere!

The National Homeland Defense Foundation, founded by Gen Ed Eberhart in 2002 (he was the NORAD commander in Cheyenne Mountain on duty during 9/11 and my boss) has posted full Symposium VII content on their web site. In this video, Ms Zainab Al-Suwaij, Executive Director, American Islamic Congress provides a frank answer. The last questionRead… Read more »

City of Manor, Texas Reaches The White House

I’m honored to report that the City of Manor’s open innovation platform, Manor Labs, is being featured on the White House blog at http://www.whitehouse.gov/blog/2009/11/19/open-government-laboratories-democracy. Innovation is possible even in small cities with very small budgets. I hope that we can work with more cities to innovate new solutions for the public-sector. You can keep upRead… Read more »

10 Examples how Local Governments can use Twitter

This is a cross-post of: http://dotgov.com I attended an eGov seminar some years ago. One of the speakers was a city webmaster and he kept raving about Twitter. At that time, Twitter was still pretty new and mainly used to tell your friends that you had a bad hair day. His presentation set the toneRead… Read more »

FAA identifies computer error that caused flight delays

A software problem that caused flight delays across the country today was not the first serious hiccup Federal Aviation Administration computer systems have suffered in recent years. FAA officials said the problem had been resolved by mid-morning, after causing disruptions for about five hours. The glitch made it impossible for airlines to enter flight planRead… Read more »

The Virtual World is Flat- How social media is helping good ideas get heard

The Army is probably about as stratified and hierarchical an organization as you will find where everyone has a place in the system from Private to General. That system has existed for literally thousands of years but I believe the social media revolution is creating a virtual flattening like never seen before where anyone withRead… Read more »

Building a Wiki Community: Gotta Love the Social Media

A significant difference between wikis created now and those created two-to-three years ago is the advent — and proliferation of — social media. Facebook is no longer used only by college kids, and Twitter results now show up on Google searches. What a change! In order to build a community, you must be able toRead… Read more »

Open Government Data and The Great Expectation Gap

Originally posted on “osrin.net”, 20th October 2009 The level of activity around the world in opening up government data is nothing short of astounding. Governments at every level have engaged citizens, businesses and developers in combinations of public discussions and hackfests to look at how the data that they hold can be used in newRead… Read more »

“People of Earth, remember.” RHIOs Part II

The last couple of days have been just spectacularly beautiful in Denver with that Colorado blue sky that makes you just want to go out and play. But, instead of playing outside I have spent quite a bit of time reconnecting with old colleagues from the social and healthcare services projects I used to volunteerRead… Read more »

Social Media Policy – Part 8 – Confidential Information, Terms of Service, and Legal Issues

Although it may be a matter of common sense that employees should follow terms of service and the law and also not to disclose confidential information, most social media policies include clauses stating that employees are responsible for their actions with regard to confidential information, terms of service, and obeying the law. What else shouldRead… Read more »

4 Best Practices for Fighting Phishing Attacks

by Sophicity Phishing is a form of fraud that masquerades as an official email or website which attempts to steal a victim’s username, password, and other information. Typically, a scammer will send an email that appears to be from a well-known bank, asking the user to log in to their account. When the victim clicksRead… Read more »