Sunday, September 30, 2012

FBI — United States Attorney Announces Procedures to Handle Election Fraud and Voting Rights Abuses

 Asst. United States Attorneys Steve Jordan and Blanche Cook will be available while the polls are open on August 2, 2012, to receive and handle complaints of election fraud and voting rights abuses in consultation with Justice Department Headquarters in Washington. They can be reached at the following numbers: AUSA Jordan-615-736-2083; AUSA Cook-615-736-5431.

In addition, the FBI will have special agents available to receive allegations of election fraud and other election abuses on Election Day. The FBI can be reached by the public at 615-232-7500.

More:

http://m.fbi.gov/#http://www.fbi.gov/memphis/press-releases/2012/united-states-attorney-announces-procedures-to-handle-election-fraud-and-voting-rights-abuses

Thursday, September 27, 2012

mHealth Task Force issues recommendations


FCC ? Really?

The report, introduced at a Sept. 24 news conference by FCC Chairman Julius Genachowsky, comes with five recommendations, each of which breaks down into a number of even-more-specific directives, including the recommendation that the FCC fill the open position of FCC Healthcare Director. The recommendations are:

Wednesday, September 26, 2012

Enterprise Architecture Conference and Expo

 Dr. Brett Brunk has been Chief Enterprise Architect of the US General Service Administration (GSA) since September 2010. In this capacity, he is responsible for facilitating the development of the GSA enterprise architecture to assist with strategic planning and prioritization of information technology (IT) investments. Some of Dr. Brett Brunk's other professional experiences include IT architect and manager at the Federal Aviation Administration (FAA). He successfully applied IT know-how to improve efficiency and safety of several aviation information management (AIM) systems such as NOTAMs (Notice to Airmen) and Airspace Management. In addition, Dr. Brunk participated in FAA's enterprise activities including the development of enterprise service oriented architecture. Dr Brunk holds a PhD in Chemical Engineering from Cornell University.

More:
http://goveaconference.com/events/2011/Speakers/Speaker%20Window.aspx?SpeakerId=%7B15024044-50D3-46B4-B062-FD9A311531C1%7D&ID=%7BAB5EE76A-1A66-4169-899C-17036D20FD4B%7D&m=1

Thursday, September 20, 2012

ViewSonic Exits Mainstream Tablet Market, Focuses On Verticals

 "Today, the tablet form factor remains an important part of our connected vision and strategy for the future, building upon our 25 years of display expertise and innovation," said ViewSonic President Jeff Volpe, in an emailed statement to CRN. "With that said, ViewSonic has made the strategic decision to focus our future tablet initiatives in emerging markets and niche verticals, where we can best leverage our core competencies to fulfill technology needs in regions and markets presently underserved by the widely saturated supply of mainstream consumer tablets."

<Opinion>
It might also be driven by that fact that their tablets were a Hot Mess.
Seriously,
I never expected to see grub on a tablet boot screen and yet, there it is...
Right after the BIOS message, "Press F10 for Settings".
</Opinion>

More:
http://www.crn.com/news/mobility/240007592/viewsonic-exits-mainstream-tablet-market-focuses-on-verticals.htm

Monday, September 17, 2012

'Bucket List Bandit' caught in Okla. after crime spree



An FBI agent from Pennsylvania says a suspect dubbed the "Bucket List Bandit" who is believed to be responsible for bank robberies in nine states has been arrested inOklahoma City.

Jason Crouse, the acting supervisory special agent of the FBI office in Erie, tells The Associated Press that 54-year-old Michael Eugene Brewster was arrested Thursday night.


More:

Aw Crap... Halliburton's Misplaced Radioactive Cylinder



Somewhere in West Texas is a 7-inch radioactive cylinder that Halliburton would like to find. Anyone who comes across it is advised to keep their distance.

The oil field services company lost track of the device, which is used to assess potential sites forhydraulic fracturing, on Tuesday (Sept. 11) while trying to transport it from Pecos to a well site near Odessa 130 miles away. A special unit of the Texas National Guard has now stepped in to aid Halliburton in a search for the cylinder, according to Bloomberg.

"It's not something that produces radiation in an extremely dangerous form," said Chris Van Deusen, a spokesman for the Texas Department of State Health Services. "But it's best for people to stay back, 20 or 25 feet."


More:

Friday, September 14, 2012

Sweet! Judge strikes down Wis. law limiting union rights



A story from AP Mobile:

Judge strikes down Wis. law limiting union rights

thumbnailMADISON, Wis. (AP) - A Wisconsin judge on Friday struck down the state law championed by Gov. Scott Walker that effectively ended collective bargaining rights for most public workers. It was not clear if the ruling means the law is immediately suspended. The law took away nearly all collective bargaining rights from most workers and has been in effect for more than a year. Dane County Circuit Judg...

Read Full Story.

Monday, September 10, 2012

L-3 awarded contract to support major USAF cyber initiative | Government Security News



"We are proud to be part of this agile approach to delivering cyber technologies that help ensure national security," said Les Rose, president of L-3 National Security Solutions Group. "As L-3's Center of Excellence for cyber initiatives, we develop full-spectrum cyber solutions and services for mobile, cloud and more traditional enterprise environments."

AFRL is the Air Force's organization wholly dedicated to leading the discovery, development and integration of warfighting technologies for air, space and cyberspace forces. L-3 STRATIS will be executing this contract from its cyber program office in San Antonio, TX, which is also the home of 24th Air Force (AFCYBER) and the Air Force Intelligence, Surveillance and Reconnaissance Agency.


More:

Mobile Security, Critical Infrastructure Issues Drive Physical, Logical Security Together

 Here at the co-resident (ISC)2 World Congress and ASIS International meetings, nearly 20,000 physical and logical security pros will attend sessions and exhibits together. Their interests aren't always the same, but issues such as mobile security and protecting critical infrastructure are increasing the overlap, leaders say.

More:
http://www.darkreading.com//security/news/240006981/mobile-security-critical-infrastructure-issues-drive-physical-logical-security-together.html?nomobile=1

Executive order could institute controversial cybersecurity measures


The draft order is said to still be undergoing revisions, but likely will involve the institution of a voluntary program for private companies operating critical infrastructure to cooperate with government-instituted standards and best practices, The Hillreported. The program would be led by the Homeland Security Department and include the Commerce and Defense departments, as well as others still being determined. While DHS would manage the program, the National Institute of Standards and Technology would work with industry in crafting the framework. 

More:

Saturday, September 8, 2012

Geez.. Another great Nokia/Microsoft product launch. Nokia Expands Apology for Misleading Lumia 920 Video, Photos



Nokia expanded its apology over faked video and photos used to publicize the company's newest flagship phone.

Unveiled on Wednesday, the Lumia 920 features the "PureView" camera, which has a "floating lens" optical image stabilization (OIS) technology that Nokia claims lets users take sharp photos and video.

Earlier this week, Nokia admitted a video that purportedly demonstrates the benefits of the 920′s OIS capabilities was "a simulation" and not shot using its PureView camera. It later revealed on Saturday that promotional photos were also faked.

More:

Thursday, September 6, 2012

Survey of Federal CyberSecurity Managers Shows Mobile Disconnect



A new survey of more than over 100 federal IT security managers, including senior management, IT operations, and risk and audit managers, shows that while government expands its use of mobile devices in the workplace, only about a third of agencies – 38 percent -- have a strategy for monitoring those devices.

 

The so-called "bring your own device," or BYOD, policy has been a hot-button security issue for the past several years, particularly since the mobile computing world has exploded with a wide array of device options, from smart phones to tablets, all of which introduce new complexities and potential security vulnerabilities for agency networks and sensitive information.


More:

Tuesday, September 4, 2012

Republican Party Platforms: Republican Party Platform of 1956

 Interesting.
"The protection of the right of workers to organize into unions and to bargain collectively is the firm and permanent policy of the Eisenhower Administration."

http://www.presidency.ucsb.edu/ws/index.php?pid=25838