Webcast interview from the Government 2.0 Summit

I’ve been attending the Government 2.0 Summit in Washington this week, along with a lot of friends and colleagues from various spots in Silicon Valley, the international tech world, and federal, state, or local government agencies. If you want to follow along on Twitter, there’s a great number of attendees posting real-time notes and comments throughout the sessions.

Over the past couple of months I’ve participated with many colleagues planning the kick-off Gov 2.0 Expo Showcase, which highlighted fantastic new-technology projects from government agencies across the country. One of the great projects showcased is www.NeighborsforNeighbors.org, a collaborative website of rich services run by Joseph Porcelli (on Twitter he’s @josephporcelli). Among the other services on the site is a webcast series of great interviewst all levels, from across the country. , and this afternoon I sat down for a chat.

You can watch it below, on their site, or over on the archived kyte.tv site  – lots of laughs as we talk about my varied experiences in government, and why Microsoft is focusing intently on enabling enterprise Government 2.0 capabilities.  Fun stuff!

[kyte.tv appKey=MarbachViewerEmbedded&uri=channels/202174/553690&tbid=k_168&p=p/s&height=436&width=416]

Email this post to a friend

AddThis Social Bookmark Button

San Francisco’s Wild and Wacky World of Technology

Fact: San Francisco’s municipal IT continues to self-destruct, according to new reports this weekend.  According to an IDG story (San Francisco hunts for mystery device on city network), “With costs related to a rogue network administrator’s hijacking of the city’s network now estimated at $1 million, city officials say they are searching for a mysterious networking device hidden somewhere on the network. The device, referred to as a terminal server in court documents, appears to be a router that was installed to provide remote access to the city’s Fiber WAN network, which connects municipal computer and telecommunication systems throughout the city. City officials haven’t been able to log in to the device, however, because they do not have the username and password. In fact, the city’s Department of Telecommunications and Information Services (DTIS) isn’t even certain where the device is located, court filings state.”

Continue reading

Sales Guy vs Web Dude

The website where I first saw this video wrote, “This would be funny if it weren’t so true.”  No – it’s funny because it’s so true!  Yes, even in government IT settings.

The video’s here; adolescent language warning, a la South Park. If you don’t get the jokes, just reboot your system. 3 times.

Email this post to a friend

AddThis Social Bookmark Button

Web Security and New Media in Politics

FACT: The Obama presidential campaign has been lauded for innovative uses of the Web and social media, particularly for fundraising and volunteer recruitment.  But as PC World has just reported, “Two months after their Web site was hacked, the organizers of Barack Obama’s presidential campaign are looking for a network security expert to help lock down their Web site…. Security experts said this is the first time they can remember seeing a Web security job advertised for a political campaign.”

ANALYSIS:  I wrote before about my experience in 1994-95 helping build one of the Internet’s first political campaign websites – I designed the content and wrote much of it, for Mayor Frank Jordan of San Francisco.  (The pages were literally built and posted by mayoral son Thomas Jordan, by the way, who was then a college student at UC-Berkeley; he went on to great things at Pixar.)   At the time, with such a simple site, we didn’t have to worry much about security – or so we thought, and luckily the worst scandal in those early years involved domain-squatting by certain rival campaigns.

As PC World points out, though, “Obama’s Web site, built by Facebook cofounder Chris Hughes, has been the model of Web 2.0 campaigning, using social-networking techniques to raise funds and build a broad base of active, Internet-savvy supporters. But security experts have long warned that powerful Web site features also open new avenues for attack.”

Continue reading

%d bloggers like this: