Category Archives: article

Cloud computing and DC, OpenID, privacy, cybersecurity, 3121, CongressCamp, Gov20 and the US CIO

Fall came and with it a torrent of news and events. I’m still sifting through news, ideas and encounters from the Gov 2.0 Summit last week. I’m still smiling after meeting Clay Shirky, Craig Newmark and Vint Cerf. The “father of the Internet,” below was  a kind, gentlemanly presence at Google’s offices after the Gov 2.0 Expo.

Vint Cerf at Google

Vint Cerf at Google

Following up on Gov 2.0, I wrote about how D.C.’s CTO found both compliance cost savings benefits to cloud computing and reported on the OpenID federated identity framework set for .gov authentication pilot.

In a snarky moment, I caught the Twitter fail whale surfacing during a discussion on cloud computing.

fail-whale-cloud-computing-gov20
Ironic animal.

I recorded a half hour of video with Chris Messina and David Recordon discussing OpenID authentication and .gov websites.

I wrote a short piece that sized up U.S. CIO Vivek Kundra on Data.gov, OpenID and government transparency.

I blogged about how U.S. CTO Chopra focused on transparency and outcomes at Gov 2.0.

After I made it through that writing, I summarized new research from the IAPP that showed privacy policy success lies in collaboration with IT and synthesized the expectations of Center for Democracy and Technology analysts regarding federal technology policy here Washington.

And I managed to get a post up about how 3121 brings social networking and security challenges to Capitol Hill that included an interview with the CTO responsible for getting this new professional network for Congressional staffers working properly.

At the beginning of the week, I also wrote three posts on Congress Camp, including:

I visited the FCC for the first time, where I watched the panels on broadband and healthcare.

And on one pleasant fall night, I also visited the National Press Club, where the DC Social Media Club hosted a panel that discussed  how mainstream media is using social media tools.

I think I like living in the District.

I know this is a lot of “I” but hey, this is my blog. Thanks for visiting!

I can’t wait for the weekend! BBQs with friends and family, bike rides, plenty of time outdoors.

Reblog this post [with Zemanta]

Leave a comment

Filed under article, blogging, journalism, technology

Compliance Week thoughts, takeaways, memories [new articles]

U.S.
Image via Wikipedia

I’m still working though two intense days in Washington, D.C. last week.

I met John Kerry on the way home.

I took thousands of words of notes and tweeted up a storm at @ITCompliance.

I published three articles and have at least as many yet to come. And I ate some of the best crab bisque and fried chicken of my life, as Georgia Brown’s.

I’ll be posting more of my coverage as it comes.

For now, here are the first articles, on increasing regulation, enforcement and Harvey Pitt‘s views on SOX & risk management, respectively.

Reblog this post [with Zemanta]

Leave a comment

Filed under article, journalism, Twitter

“Massachusetts Senate seeks to amend, weaken data protection law” [new article]

We had to respond to a bit of a curveball this morning on the Mass. data protection law. A MA Senate Bill significantly alters certain provisions. I reported on it today and will be reviewing it further tomorrow.

Massachusetts Senate seeks to amend, weaken, data protection law
13 May 2009 | SearchCompliance.com

Reblog this post [with Zemanta]

Leave a comment

Filed under article, journalism

Compliance, security and transparency in the cloud [new article]

Torre Mare Nostrum / Torre Gas Natural
Image by jsprhrmsn via Flickr

I’m still working my way through RSA coverage. This article, focused on a panel of cloud providers at RSA,  emerged an editor’s scalpel stripped to its core. Many questions remain — but that’s for later pieces.

Cloud computing providers debate compliance, security and transparency
30 Apr 2009 | SearchCompliance.com

Reblog this post [with Zemanta]

Leave a comment

Filed under article, journalism

Biometrics, privacy and compliance [new article]

biometric birthday
Image by striatic via Flickr

It was deeply satisfying to see the piece on biometrics I’ve been working on go live today. It turned out well, especially with the usual polish that my brilliant copy editor put on the prose, formatting and pull quote.

Biometric security data adds layer of privacy compliance risk
30 Apr 2009 | SearchCompliance.com

Reblog this post [with Zemanta]

Leave a comment

Filed under article, journalism, technology

“The challenges of a state CIO” [New podcast]

I was happy to find the podcast  I recorded with Anne Marguiles at the top of SearchCIO.com tonight. The conversation I had with the Commonwealth’s CIO is captured in two portions at “The challenges of a state CIO.” Marguiles was an engaging interview and offered insight on a wide variety of technological challenges and opportunities that exist in 2009 for government agencies and their leaders.

Reblog this post [with Zemanta]

Leave a comment

Filed under article, journalism, podcast

First scoop: “ICE Act would restructure cybersecurity rule, create White House post”

cyberattack
Image by Boyce Duprey via Flickr

After I caught wind of a bill that was going to be introduced by Senator Karper this week during RSA, I followed up on the information I saw presented there by Erik Hopkins and Alan Paller. I reported on its introduction Monday night, posting “ICE Act would restructure cybersecurity rule, create White House post” before any other news organization had covered the story.

In short order, Jolie O’Dell blogged about it at ReadWriteWeb (Proposed Act Would Create National Cyber Security Office).

Half an hour after that, Brian Krebs picked it up at the Washington Post (Proposal Would Shore Up Govt. Cyber Defenses).

He wrote a great story — but I had it first, which in of itself is a first.

It’s good to get a scoop. Terrific day.

IT Business Edge picked up the story from RWW (Legislation Proposes National Cyber Security Office) and quoted me.

Dennis Fisher blogged about it at Threatpost: (New ICE bill would overhaul federal cybersecurity).

As he noted, there was a hearing today morning on the bill in the Senate Committee on Homeland Security and Government Affairs. You can watch the archived webcast here.

This draft of the Ice Bill (PDF) is now available for download and review from Govexec.com.

Reblog this post [with Zemanta]

Leave a comment

Filed under article, journalism, technology

10 Delicious links to remember on Twitter, Google and Newspapers

Google in 1998
Image via Wikipedia

When I scrolled down this blog this afternoon, I noticed that my list of Delicious social bookmarks was a succinct, useful snapshot of the resources or ideas I’d found worth saving over the past week. As the platform and tools that I can use to tag, share or store information online has expanded, Delicious has remained an important tool for leaving useful digital breadcrumbs I can use to retrace my travels later on. This list struck me as particularly meaningful, both because of how useful the links are and what they reflect in the moment of my life when I saved them.

For instance, I saved the Google AdWords: Keyword Tool link after I enjoyed quick workshop with my SEO guru. I use it whenever I blog or write. The link needed to be in my bookmarks.

I’ve been exploring new ways to syndicate and share digital content for years. The Top 20 Ways to Share a Great Blog Post at Mashable put most of them in the same place. Score.

I found Classroom 2.0 looking for information about how collaborative software is being use in education. Classroom 2.0 is a social network for “those interested in Web 2.0 and collaborative technologies in education.” Perfect.

I came across an anonymous blogging guide provided by Global Voices, “Global Voices Advocacy » Anonymous Blogging with WordPress & Tor,” through an email from the Berkman Center at Harvard Law School. It’s an important resource for any journalist or citizen in repressive regimes that need to get information out but can’t risk being identified. Given the enormous risks to life, liberty and family dissidents face for  in many parts of the globe, I wanted to make sure I saved it to review again later. Flash drive + Tor + WordPress = Anonyblogging. Smart.

I’d come across Tweet Congress before. It’s a visible element of an online movement to get Congress on Twitter. As the site notes, “Twitter enables real conversation between lawmakers and voters, in real time.” We’re all seeing it already, as Congressional staffs, Senators and Representatives adjust to the new dynamic. There’s no need for a TweetWhitehouse, as @BarackObama is already back in use again.

I’ve been reading and thinking a lot about the future of online news, newspapers and digital journalism. One of the thinkers I read the most and certainly use as a hub for information is Jay Rosen, a journalism professor at NYU. His list of 12 essays to read, a “Flying Seminar In The Future of News,” is a must-read on the topic.

I tagged Utimaco’s compliance and regulation portal after I attended on a seminar they hosted on the new MA data protection law. I wrote about what I learned there on SearchCompliance.com: Panels reveal risks of noncompliance with Mass. laws.

I saved Bostonist’s post @ Boston’s First Official Google Meetup because Tom Lewis recorded a short interview with me at the event. I embedded it below.

One of the starkest, clearest headlines I’ve read recently was on Washington Post.com: Daily Red Meat Raises Chances Of Dying Early. The link text really says it all.

Google Moderator rounds out this “top 10” because of its use by the WhiteHouse in soliciting questions before  the recent online town hall. I’d tweeted about the TipJar before,  where users can rate “money saving tips submitted and ranked by the Web community.” I learned at the Google Meetup in Boston that Google itself uses the moderation tool every Friday internally.

I don’t usually reblog Delicous links — this was just a helluva good week for ’em. If you use delicious, share similar interests and would like to extend your network, you can find me at delicious at http://delicious.com/alexanderbhoward.

Reblog this post [with Zemanta]

Leave a comment

Filed under article, blogging, journalism, microsharing, personal, social bookmarking, social media, Twitter

Improving cyberfenses through cyberwarfare simulation

SearchSecurity.com ran cyberattack mapping could alter security defense strategy today,  my new article on how cyberwarfare simulations may be key to the national strategic interest. I’m quite pleased at how the piece came together.

Reblog this post [with Zemanta]

Leave a comment

Filed under article, personal