Scattered e-voting issues as Barack Obama wins re-election
Election observers report scattered problems with e-voting machines
IDG News Service - U.S. President Barack Obama won re-election Tuesday night, topping 270 electoral votes to defeat Republican challenger Mitt Romney just after 11 p.m. yesterday.
Romney held a small lead in the battleground state of Virginia, but most election observers said he had to win both Florida and Ohio, as well as Virginia, to beat Obama. Just after 11 p.m., Ohio was called for Obama and those electoral votes effectively sealed the election's outcome. Obama also held a slim lead in Florida.
The Republican Party was projected to retain control of the U.S. House of Representatives, according to CNN and other news reports, but it appeared that Democrats will remain a slim majority in the Senate.
Tuesday's election saw scattered reports of problems with electronic-voting machines, but there didn't seem to be widespread issues. In Pennsylvania, a Reddit user took video of an e-voting machine changing his vote from Obama to Romney. That voting machine was temporarily taken off line to be recalibrated.
There were news reports of the opposite effect on e-voting machines in North Carolina. Election Protection, a voting rights group, also reported voting machine problems in South Carolina and Virginia.
There several reports of problems with voting machines, said Pamela Smith, president at the Verified Voting Foundation, an e-voting watchdog group. Virginia had 100 to 200 reports of voting system problems, and Georgia had problems with outdated electronic voter records, she said in an email. There were also reports of voting equipment malfunctions in Wisconsin, a battleground state, she said.
"The most disturbing reports from Ohio were numerous reports from voters who had their ballots cast by poll workers before they were ready," she said. "In some cases, there was a pending error message on the [optical] scanner but the ballots were cast instead of being returned to the voter to correct."
In addition to some e-voting problems, voters in several states, including battleground states of Florida and New Hampshire, encountered long lines at polling places, with some reports of four-hour lines.
In the battleground state of Virginia, CNN reported voters still in line at 8:30 p.m., an hour and a half after the polls were supposed to close.
Expect Obama to push cybersecurity regulations to protect operators of critical infrastructure, including the networks of electric and water utilities. Obama, in 2012, backed legislation that would have created new cybersecurity standards for operators of critical infrastructure.
Obama may also push Congress and the U.S. Federal Communications Commission to open up new wireless spectrum for commercial and unlicensed uses. Obama and the FCC will continue to push for broadband deployment in areas that are under
Expect a second Obama administration to continue to shut down websites accused of trafficking in counterfeit or pirated products, although Obama ultimately did not support the controversial copyright enforcement bill, the Stop Online Piracy Act (SOPA). During the past two years, the Obama U.S. Department of Justice and U.S. Immigration and Customs Enforcement have seized more than 1,500 websites for alleged copyright infringement and counterfeiting.
The Obama administration also is likely to continue to push for privacy codes of conduct for Web and mobile companies.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- 5 Customers Deliver Virtual Desktops and Apps to Empower a Modern Workforce
- Learn how Citrix solutions helped 5 companies realize the full value of desktop virtualization through a project-by-project approach based on key business priorities.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization
- Regain control and reduce risk without sacrificing business productivity and growth
- IDC MarketScape: Worldwide Client Virtualization Software 2013 Vendor Assessment
- IDC has placed Citrix in the 2013 IDC MarketScape Leaders Category once again noting that, "Citrix's position reflects the company's market leadership and...
- Infographic: Top Use Cases for Desktop Virtualization
- A wide range of business issues is driving IT toward desktop virtualization. One solution-Citrix XenDesktop with FlexCast technology-helps IT teams empower their entire... All Government IT White Papers
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- All Government IT Webcasts