Search Results for: research

The Myth of Nuvo Quo

The older I get, the better I was. A legend in his own mind. Five miles to school, uphill both ways. Memory is selective. From time to time, story to story, we remember the parts that support our chosen message. Nuvo quo is when we selectively improve what we remember of the old status quo.Read… Read more »

Community Blog

Filed under: Uncategorized

In Review: 2012 National Health Communications, Marketing & Media Conference (Part 1)

This post was originally featured on the Disruptive Women in Health Care blog with my overall thoughts from the recent conference. I recently got back from attending the 6th National Health Communications, Marketing and Media conference in Atlanta, GA and I must say this was the best one yet. Other than the usual heat inRead… Read more »

Community Blog

Filed under: Uncategorized

3 Steps To Improving Government Performance

As Jerry Mechling a research vice president at Gartner Inc. and a former faculty member of the Harvard Kennedy School points out in a recent article there are three key steps to improving the performance of government: 1) Goals: Set motivating and verifiable goals for groups and the units and individuals within.2) Gaps: Measure andRead… Read more »

Your Reference to The Greatest, Most Disruptive Enterprise IT Companies

CTOlabs.com is a research tool information on technologies, concepts and companies of interest to enterprise IT professionals. The CTOlabs Disruptive IT List is a curated list of firms we believe hold the greatest potential for positive disruption in the enterprise IT space. Our writers and analysts seek out information on these firms from multiple sources,Read… Read more »

Community Blog

Filed under: Uncategorized

Sales Tax Exemptions for Public Projects

Normally when we bid a construction project, we don’t address in the bid documents the payment of sales tax. We do, however, indicate that the contractor is required to follow all Federal, State, and Local laws. Because of this, I would assume that on most projects, a contractor would be paying any required sales taxRead… Read more »

DARPA’s UPSIDE Seeks to Rethink Computing

The Defense Advanced Research Projects Agency‘s (DARPA)’s Unconventional Processing of Signals for Intelligent Data Exploitation (UPSIDE) program is looking to develop a computing infrastructure that is three orders of magnitude faster and four orders of magnitude more energy efficient, or roughly 1,000 and 10,000 times respectively, than current digital processors. To do so, the BroadRead… Read more »

Back to basics: Understand the full cycle of business development to get more contracts

My 7-year-old daughter, when working on a puzzle, knows to glance at the whole picture first, before starting to assemble the pieces. So, her process is to study the picture, and then find a corner piece to which she then starts adding pieces. We, as adults, sometimes forget to take a step back and lookRead… Read more »

Are feds caught in the presidential election crosshairs? Plus your Weekend Reads!

Welcome to GovLoop Insights Issue of the Week with Chris Dorobek where each week, our goal is to find an issue — a person — an idea — then helped define the past 7-days… and we work to find an issue that will also will have an impact on the days, weeks and months ahead.Read… Read more »

Adapting to being adaptable

We’re starting to see government agencies come to terms with modern digital technologies, with more and more people in agency seeking to use them in their activities. Agencies are beginning to operationalise social media and, while still working through the process, open licenses and data as well. Some in digital related-roles in government are startingRead… Read more »

Android Encryption Crackable, New MPEG Standard and more

This little Android won’t be so happy if you steal his data Researchers Show How to Crack Android Encryption – Thomas Cannon and Seyton Bradford have successfully shown brute force attacks against Android encryption at DEFCON. Because Android encryption is based on the Linux dm-crypt, it is easily broken on either Android 3.x or 4.xRead… Read more »

Community Blog

Filed under: Uncategorized