Pointers

Recommended Reading

Dispelling myths about data disposal

Source: CIO.com

Contrary to popular opinion, data storage is not cheap, according to two experts interviewed by CIO magazine.

Sure, the cost per gigabyte is attractive, making it seem like a no-brainer to upgrade to larger storage systems. But organizations also must factor in the costs of data management and the potential costs of e-discovery should a court require access to specific data. The more data on hand, the more an organization pays in indirect costs.

On a related note, the experts reject the idea that rules and regulations make it sensible to keep everything and that it’s not possible to tell the relevant data from the garbage.

A new tack on security: smarter users
Source: InfoWorld

InfoWorld blogger Robert X. Cringely proposes a new way to improve security at organizations everywhere: Require the tech equivalent of a driving test.

He notes that many of the most common security threats, such as malware and cyber scams, hinge on users who don’t know enough not to click on a suspicious link. A mandatory test could solve that problem.

According to Cringely’s readers, here are some topics to cover: e-mail 101, how to get to the command line, how to browse a hard drive via Explorer or the command line, how to handle error messages and when to call for help, and how to add and remove programs.

Must-haves for digital nomads
Source: Computerworld

Computerworld highlights a handful of gadgets tailor-made for people who work outside the traditional office environment.

Consider, for example, the LaCie Core4, a matchbox-sized device with three USB ports. At $10, it is an inexpensive way to supplement portable computers that are short on ports.

Meanwhile, the PlanOn PrintStik ps900 is a printer made for carrying. It is slightly smaller than a hoagie and weighs only a couple of pounds. It costs $200, or $300 for the Bluetooth-enabled version.

What would Emily Post do?
Source: Mercury News

Is a digital greeting card a satisfactory replacement for snail mail when it comes to acknowledging a friend’s birthday? Or is a wall-to-wall Facebook comment an acceptable or even preferable option?

Columnist Larry Magid ponders those and other etiquette puzzlers that arise in the social-networking world. It sounds quixotic, but Magid argues that such guidelines are needed to help us all avoid making social faux pas that could take a toll on our relationships or even our reputations.

“A lot has changed since 1922 when Emily Post wrote ‘Etiquette in Society, in Business, in Politics and at Home,’ but some things never change,” he wrote. “Politeness, kindness, respect and discretion will never become obsolete.”

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group