Government Blog
| | | | |
gsa


About This Siteblog

This blog is intended to share, cooperate with and learn from IT professionals serving the public sector. It is my intent that this blog may evolve to become a public sector industry forum for the exchange of technology advice, reviews, experiences, recommendations and best practices.

public sector

Share

Bookmark and Share

Search

Search Government Blog

public sector

Categories

CRM SYSTEMS
ERP SYSTEMS
INFORMATION SYSTEMS
INFORMATION SECURITY
IT MANDATES
IT SOLUTIONS
IT STRATEGY
LEADERSHIP
PROCUREMENT
SOFTWARE
WEB 2.0

public sector

Archives

August 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007

public sector

Most Read Posts

Lean Six Sigma
Advancing Government to e-Gov

public sector

Recent Posts

Lean Six Sigma in Government
IPv6 Government Progress
SAML and Information Security
Sun Drops GSA
Government Web 2.0 Wiki
Advancing Government to e-Gov

public sector

Recent Comments

Lean Six Sigma
IPv6 Government Progress
SAML and Information Security

public sector

Tag Cloud

CRM Software, ERP Software, NIST C&A, SaaS, Security, Web 2.0, oracle, hosted software, sap, software as a service, accounting software, fund accounting system, c&a, fips 199, section 508, DOD

public sector

Blogroll

Government Hosted Software
MySaaSblog.com
ERP Software Guide

public sector

saas
public sector blog
16 CITATIONS

Federal IT Information Systems Agenda

IT Presidential Directive

sfa

saas

 

IT Innovation

 

Veterans History Project

 

IT strategy

 

eGovernment


 Government IT Strategy

Government IT Reaches The Cloud
gov

With the unexpected delivery of Apps.gov, federal CIO Vivek Kundra and the GSA have demonstrated their firm intent to promote increased adoption and accelerated procurement for cloud computing applications. Apps.gov, introduced September 15 among government fan fare, looks like a consumer storefront for the procurement of turnkey cloud computing solutions. The e-commerce portal delivers shopping cart functionality and a streamlined click-to-order process for business applications, payroll and human resource software systems, productivity systems, social media tools and cloud-based IT (information technology) services.

In a wise effort to clearly set expectations, cloud computing chief evangelist Vivek Kundra reminded that apps.gov was built on top of GSA Schedule 70 in order to accelerate the go-live event and comply with federal procurement policy. Apps.gov was developed by GSA CIO Casey Coleman. According to Coleman, apps.gov “is not the final solution .. It is the beginning of the final solution.” To date, no IT services contracts have been fulfilled on apps.gov, however, software technology and cloud computing vendors were largely caught off guard with the sudden web site introduction and are now scrambling to get their software as a service (SaaS) solutions listed on what is likely to become the most touted cloud computing storefront.

Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

The first version release of apps.gov simply puts a new user interface on the decade old GSA Advantage government procurement vehicle. While a good first step, additional steps are needed for this federal procurement website to evolve into a one stop government procurement website for commercial applications and services. For instance, including a cloud-based sandbox to permit user trials as well as social media integration to support ratings, commenting and other user generated content would significantly improve the user experience and purchase process.

More than just an e-commerce platform, apps.gov is a continuation of the administration’s vision in promoting efficiency, effectiveness and transparency. At the September 15 apps.gov announcement, Kundra commented that, “The President has challenged us to make sure that we are utilizing technology to ensure that we have a transparent and open government” and the newly unveiled website is part of a continuation to that agenda. Nonetheless, while an admirable vision, unless Kundra and his colleagues can address a over weighted procurement process and the glacial pace of government IT procurement, apps.gov will achieve little more than web site window dressing and ultimately lose its fan fare. The delivery of an impressive innovation must now be followed with procurement reform which aligns procurement policy with the opportunities available from cloud computing in a way that promotes the administration’s agenda and the peoples' business.

Posted in IT Solutions
Technorati:  Add to Technorati Favorites Add to Technorati Favorites
Del.icio.us:  del.icio.us Save this page to del.icio.us
View CC license
Permalink | Comments (3) | Trackback (1)

egov

FISMA - The Difference Between Compliance and Effective Security
gov

Karen Evans, the person who oversees all federal information technology spending for the White House, recently raised the difference between FISMA compliance and FISMA effectiveness in a Senate hearing. FISMA (Federal Information Security Management Act) is an OMB requirement that kicked off in 2003 and has since resulted in both large amounts of IT spending and those infamous report cards that have embarrassed many federal agencies. Evans was clear that FISMA compliance is not the same as effective cyber security and was instrumental is applying lessons learned from the prior five years in order to create an upgraded standard.

The Senate has now drafted new FISMA 2008 legislation aimed at more effectively linking agency responsibilities under the law with the tasks needed to achieve secure federal information systems. The most cited improvements in the new law are not necessarily the most instrumental. New clauses which add strength to the chief information security officer authority and a step up in red team exercises are clearly helpful, but other less cited factors offer the opportunity to offer significant positive impact if the legislation becomes law.

For one, FISMA 2008 would require federal agencies to buy security built into products and software solutions rather than trying to add it after the fact. The Air Force proved the power of the principle with the now more than 500,000 computers the service has purchased with built-in secure configurations. The result has been savings of more than $100 million, patch upgrade delays reduced from 57 days to 72 hours, and much happier users incurring fewer problems.

Additionally, the new legislation would demand attack-based metrics, suggesting that agencies must demonstrate their information systems are effectively protected against attacks, known vulnerabilities and exploitations. Attack-based metrics requires learning the offense and then using that knowledge to develop the defense.

Lastly, and possibly most striking, the legislation would require agencies to reach governmentwide agreement on what those attack-based metrics must be by establishing a baseline of information security measures and controls that can be “continuously monitored through automated mechanisms.” That phrase marks another significant change from the annual to triannual reviews that were common under the old law.

This is an impressive step up and these changes collectively create a new foundation for dramatic transformation of federal cyber security. As an added by-product, the effort can coordinate the efforts of chief information officers and inspectors general because both will be measured against a common set of attack-based metrics.

Posted October 1, 2008 in IT Mandates
Technorati:  Add to Technorati Favorites Add to Technorati Favorites
Del.icio.us:  del.icio.us Save this page to del.icio.us
View CC license
Permalink | Comments (0) | Trackback (0)

egov

FBI Implements Wiki
gov

The FBI is reviewing the implementation of a new internal wiki, called Bureaupedia, that IT officials hope will enable users to create an encyclopedia of best practices, lessons learned and subject-matter expertise. Officials see Bureaupedia as a knowledge management solution, deployed within the new mainstream of social media tools, and with the hopes of letting agents and analysts share their experiences and accumulate tacit knowledge that retains with the bureau long after the agents retire. The project is a collaborative effort between FBI’s chief knowledge officer and chief technology officer.

“An agent that retires after 30 years leaves with all of that — what we call a tacit knowledge — everything leaves with him,” said Zalmai Azmi, FBI’s chief information officer, who will be retiring in October. That includes “best practices, things that he did differently, things that he wishes he had done differently.” The FBI’s new Web 2.0 wiki uses the same open-source software as Wikipedia, and after the pilot period is complete, the agency will launch it on the FBI’s secure intranet, FBINet.

Azmi said Bureaupedia gives the FBI a platform for capturing knowledge and information that may otherwise not be available. The content will be useful for the next administration and available through Bureaupedia, he said.

An FBI spokesman said Bureaupedia will also let users link to articles in Intellipedia, the Office of the Director of National Intelligence’s wiki for the intelligence community. “The bureau has a lot of information,” Azmi said. “We have petabytes of data. Bringing all of that [onto] what we call an information grid so we can easily search is our goal for the future.”

Posted September 15, 2008 in Web 2.0
Technorati:  Add to Technorati Favorites Add to Technorati Favorites
Del.icio.us:  del.icio.us Save this page to del.icio.us
View CC license
Permalink | Comments (0) | Trackback (0)

egov

A Plan For The Next Phase of Government Privatization
gov

While not a top campaign issue, the privatization of government services has resurfaced and stands as one of the issues where the presidential candidates show slightly differing opinions. Unfortunately, while each presents an opinion, neither seems to present a clear and coherent strategy. While the scope and volume of outsourcing government services to commercial businesses may vary somewhat, it is clear that no matter who the next President is, government outsourcing will continue - as it should.

My hope is that we can learn from both our own prior experiences as well as the experiences of others in order to provide superior services with transparent accountability at a lower taxpayer cost. I believe the best external source of lessons learned and proven practices comes from the United Kingdom. In 1995 the U.K. outsourced $60 billion of federal and local public services. This year the U.K. outsources $150 billion of services which range from refuse collection to environmental response to healthcare.

Perhaps the strongest indication of success is that both political parties support and promote the privatization programs (as in the U.S., when a program is successful, everybody wants to put their name on it). The U.K.'s initial sponsorship of government outsourcing began with the Conservative Party during the Prime Minister Margaret Thatcher era, however, has seen its most dramatic growth under the leadership of the Labour Party.

As successful programs begin with successful planning, it's important to note that the U.K.'s outsourcing program began with a comprehensive study regarding the effectiveness and challenges of public services delivery. Headed by John Hutton, secretary of state for business, enterprise and regulatory reform, the study was conducted outside the realm of politics and special interests (wow!). The study ultimately determined that when implemented properly, outsourcing and privatization result in long-term cost savings while at the same time contributing significantly to the domestic economy. The study also showed convincing analysis and concrete evidence that the outsourcing of government services achieves quality levels that are at least equal to and often higher quality than that provided by the government. The evidence included, but was not limited to, a 2006 survey in which 95 percent of former public sector managers agreed that customer service had improved with government outsourcing.

To the research report's credit, it did not dodge the difficult issues of maintaining competition, sustaining government workforce levels, retaining services which are inherently government suited and mitigating the consequences that outsourcing may impose on existing government employees.

The British offer America an advance lesson on this topic in several areas. From my perspective, I remain hopeful that the next administration may look not just to our own prior experiences, but also to the UK research, baseline performance levels and lessons learned. I am most hopeful, but also most skeptical, that the next phase of government outsourcing may lead with political and special interest free comprehensive and quantifiable research and planning - the same type of strategic planning regularly employed by the very commercial organizations who may be next providing the outsourced citizen services.

Posted August 15, 2008 in Government Leadership
Technorati:  Add to Technorati Favorites Add to Technorati Favorites
Del.icio.us:  del.icio.us Save this page to del.icio.us
View CC license
Permalink | Comments (2) | Trackback (0)

egov

CIA Top Secret Wiki
gov

The CIA's top secret wiki became a little less secret last week. IT officials from the normally reticent Central Intelligence Agency told an overflow audience at the Enterprise 2.0 conference last week about one of the newest technologies being used in intelligence gathering - its Intellipedia wiki.

In yet another example of business to government cross pollination, the presenters articulated how the super-secret Intellipedia knowledgebase accumulates meaningful information and makes it accessible to intelligence agents and agencies around the world.

According to CIA staff Don Burke and Sean Dennehy, there was some initial resistance to the idea of the Intellipedia wiki, however, the cultural change and user adoption challenges were comparable to the obstacles incurred by private industry. "In a big organization, there's always someone who can say 'no,'" said Burke, who also carries the title of Intellipedia Doyen.

Intellipedia is based on the same underlying platform as the popular Wikipedia online encyclopedia. The wiki satisfies the critically important role of delivering information for members of intelligence community agencies. The Intellipedia is new solution to an age-old dilemma of how to best get information to agents who can put it to immediate use.

Dennehy stated that Intellipedia is still in the "early adoption state" and while there are is comparison to the online Wikipedia encyclopedia, there are many material differences as well. "We're not dealing with facts," he said of the general mission of intelligence and security agencies, "We're dealing with puzzles and mysteries."

While Burke and Dennehy said they were not in a position to reveal many Intellipedia details, they did indicate that the implementation of a major system like Intellipedia is similar to the challenges incurred by any large operation that is geographically and organizationally dispersed. They also shared that the CIA wiki has three levels of user access -- all of which are secured behind firewalls. The top secret network is now available to members of the intelligence community. The next level is also available to military and State Department officials. The lowest level of security permissions permit access to non-agency staff such as university researchers cleared for work with government agencies.

Posted June 15, 2008 in Web 2.0
Technorati:  Add to Technorati Favorites Add to Technorati Favorites
Del.icio.us:  del.icio.us Save this page to del.icio.us
View CC license
Permalink | Comments (0) | Trackback (0)

egov

GWACs On The Downturn
gov

A report released earlier this month by FedSources shows that GWACs (Government Wide Acquisition Contracts) have been on the decline for at least the last three years. From fiscal 2005 through 2007, GWAC spending fell by about 30 percent while at the same time agency-sponsored multiple award contract spending rose more than 40 percent.

GWAC Total Spending
  • 2007 -- $3.19 billion
  • 2006 -- $3.78 billion
  • 2005 -- $4.46 billion

I think FedSources has objectively determined what I've been thinking for some time - and that is GWACs don't live up to relieving agencies from the time, effort and cost of managing procurement contracts - and in fact, have become more of an additional contracting burden than a relief from the already burdensome process. The FedSources review results continue a consistent theme as the Government Accountability Office and several inspectors general have echoed the incremental effect GWACs bring to the contracting process. In fact, these later sources go on to say that federal agencies often award GWAC task orders without sufficient competition and then fail to manage the task order performance thereby chipping away any savings that were suppose to be realized from using the GWAC vehicle. The DOD IG has documented case after case after case in which defense agencies assumed a laissez faire attitude to task orders, over-relying on the GWAC contract officer to provide oversight and leaving task order in limbo.

The GWAC results trend doesn't come at a good time for GSA as the Alliant and Alliance Small Business GWACs appear to be in complete confusion - or possibly chaos - from an earlier judicial ruling which slapped the GSA across the head. If GSA cannot demonstrate a clear vision, concrete operational plan and proven cost savings for GWACs, the programs should be terminated and their role in the federal procurement process ended.

Posted April 20, 2008 in Procurement
Technorati:  Add to Technorati Favorites Add to Technorati Favorites
Del.icio.us:  del.icio.us Save this page to del.icio.us
View CC license
Permalink | Comments (2) | Trackback (0)

egov

Lean Six Sigma Gains Government Traction
gov

After decades of alternating and sometimes overlapping quality discipline methodologies, including big names such as CMM (Capability Maturity Model), CMMi (Capability Maturity Model Integration), ISO (International Standards Organization), Baldrige Criteria, ITIL (Information Technology Infrastructure Library), Six Sigma and Lean Six Sigma, one has finally reached near wide spread federal adoption and appears to have staying power. Lean Six Sigma has taken root among approximately two-thirds of DOD organizations and many other federal bureaus.

The Lean Six Sigma quality improvement methodology has seen piece meal utilization throughout the military since the early 1990's and began a slow but steady penetration into federal bureaus since the turn of the century. In 2007, Deputy Defense Secretary Gordon England instructed that Lean Six Sigma will be the tool of choice and provide the framework for DOD's business transformation and continuous process improvement plans. In April 2007, Deputy England mandated the Office of the Deputy Undersecretary of Defense for Business Transformation to implement a Continuous Process Improvement Lean Six Sigma (CPI/LSS) program management office to evolve and expand utilization.

Lean Six Sigma is a quality management methodology and discipline which is actually a hybrid of Lean Manufacturing and Six Sigma. Six Sigma was originally developed by Motorola and is a quality measurement system which defines processes which produce fewer than 3.4 defects per one million cycles. Lean Manufacturing was developed by Toyota to improve its car production systems. Both Six Sigma and Lean Manufacturing attempt to reduce variability, eliminate non-value added activities and make processes repeatable. However, where six sigma focuses on quality as measured by deviations, Lean Manufacturing focuses on speed and cycle times. The combination of the two seek to achieve a balance along with the end result of increased quality faster.

DOD has clearly become a champion for six sigma government adoption. DOD plans to have 5 percent of its workforce trained as Green Belts and 1 percent of staff trained as Black Belts. Green Belts are normally entry level practitioners who apply Six Sigma practices and techniques to projects. Black Belts are normally dedicated full time Six Sigma practitioners and often provide project management or advisory roles on two to three projects at a time.

The U.S. Army has also taken the lead in training, knowledge management and post project measurement. For the two year period concluded at the end of 2007, the Army had completed approximately 770 Lean Six Sigma projects and achieved an estimated savings of $1.2 billion during 2007. As an example, the Army's Red River Army Depot implemented Lean Six Sigma to improve its Humvee refitting operation. The operation now averages approximately 23 rebuilds a day compared with three per day before the project. Army deputy undersecretary Mike Kirby commented "It's a forcing function for our business transformation. It's a readily adaptable commercial best practice that requires very little in the way of human resources, maybe several weeks of people's attention, and it takes up very little computer time."

While impressive, Lean six sigma isn't a silver bullet. Practitioners have pointed out that many times Lean Manufacturing alone can achieve the lion's share of project objectives in short order and without the statistical requirements of six sigma. Many times there is also a lapse between the classroom and actual implementation. It's not productive to get staff trained as green belts or black belts and then fail to mature and harvest their skills in actual projects. Lean Six Sigma is also not particularly well suited for projects or processes with significant political or outside environmental influence.

However, despite flaws which exist in any methodology, Lean Six Sigma has proven very effective for empowering people who are closest to the business processes needing improvement and solving various types of problems which involve repeatable processes and are supported by data. I will be implementing my first Lean Six Sigma project next quarter. If any blog readers would be inclined to share their lessons learned or general advice, it would be much appreciated.

Posted March 20, 2008 in IT Strategy
Technorati:  Add to Technorati Favorites Add to Technorati Favorites
Del.icio.us:  del.icio.us Save this page to del.icio.us
View CC license
Permalink | Comments (0) | Trackback (0)

egov

IPv6 Government Progress, Benefits and Concerns
gov

I've been speaking with government IT executives and reading the progress reports for the OMB mandate to achieve IPv6 compliance for network infrastructure equipment such as switches, routers and hardware firewalls by the June 30, 2008 deadline. The skinny of the mandate is that agencies must be able to:

  • Transmit IPv6 web traffic from a LAN through the network backbone to another LAN;
  • Transmit IPv6 web traffic from a LAN through the network backbone to the Internet and outside peers; and
  • Transmit IPv6 web traffic from the Internet and external peers to the LAN.

Keep in mind the directive only requires that network equipment be able to carry both IPv6 and IPv4 traffic. There is not a requirement that federal agencies actually use IPv6 at this point; however, I'm encouraged to see many government IT leaders and OCIO (Office of the CIO) personnel are pushing their new infrastructures with increased utilization.

The benefits of IPv6 adoption are clearly more understood now than prior to the OMB directive. It seems the most cited and appreciated benefits by government IT managers include a greatly expanded 128 bit address space (over IPv4's 32 bit space), end to end network control and performance, improved peer-to-peer IP traffic security, enhanced wireless and mobility features and more efficient system administration.

However, not all of the news is good. A GCN report released in February indicated that 74% of federal IT Managers were not aware of administration's IPv6 transition policy - ouch! The same poll found that only 42% of federal IT Managers' agencies had determined how existing infrastructure will support IPv6 packets - a whopping 30% didn't know and 28% had not determined this basic tenant.

Another clear theme from all of my discussions is that system administration training will be the key that ultimately determines whether this new IT roll out is a boon or a bane. The management of IPv6 requires new thinking and advanced planning. As Sean Siler, an IPv6 Program Manager for Microsoft points out, "With IPv6, one subnet is as large as the entire Internet is today." With the new Internet protocol, each federal agency will now have tens of thousands of subnets. The near inexhaustible range of IP addresses will certainly become unwieldy if not planned in advance and a systemic structure applied. The best recommendation I've heard so far is to develop an IP address methodology that incorporates the most salient organizational factors, such as geography and architectural components, so that intelligence is attributed to the numbering scheme, network resources aren't wasted and overly complex routing tables can be avoided. The old IPv4 make it up as you go method will no longer suffice. The second best recommendation I've heard so far is to invest in early in system administration training.

Posted February 2, 2008 in IT Mandates
Technorati:  Add to Technorati Favorites Add to Technorati Favorites
Del.icio.us:  del.icio.us Save this page to del.icio.us
View CC license
Permalink | Comments (0) | Trackback (0)

egov

SAML and Federated Identity Initiative Make Big Advancement
gov

The federal Government's push of SAML (Security Assertion Markup Language) as a standardized e-authentication and identity management system moved forward with the help of GSA (General Services Administration). This is a great accomplishment and endorsement for all of us trying to advance interoperability via the E-Authentication Federated Identity and Authentication Initiative program and achieve a standard protocol in all (or most) identity management products.

Progress on this IT aid has been slow but is now picking up steam. If you're not familiar, the e-authentication program was created in 2002 and is sponsored by an alliance of 160 private and public sector organizations including the GSA and Defense Department. According to Tom Kireilis, GSAs program executive, the purpose of the e-authentication program "is to provide credentialing services for outward facing government applications on the Web." The program provides Assurance Level 1 and 2 credentials, which are typically a user ID and password. The program is intended to permit system users single sign on capabilities so they can authenticate once and freely traverse across integrated systems. This efficiency has the potential to save massive dollars in system integration projects, improve security (as users won't be forced to maintain many different User ID's and passwords), improve the user experience and increase user productivity.

Identity federation requires a common standard that can be embedded by product manufacturers. The e-authentication program started with SAML 1.0 as the identity protocol for user authentication when it first went live in 2005. Two months ago, the program upgraded to SAML 2.0 and the GSA which had previously performed testing turned over the testing of the standard to the Liberty Alliance Project. Liberty Alliance chose Drummond Group to provide SAML 2.0 interoperability testing.

GSA has thus far certified seven information technology solutions under its interoperability testing guidelines, however, that number is expected to dramatically increase. Analyst firm Gartner recently commented in a research report that the federal government's commitment to SAML will bolster mainstream adoption of the markup language and federation capability. The report stated "The U.S. government's adoption puts considerable weight behind the standard and its continued maturation." This has a big savings potential for me so expect future blog posts on this topic as SAML advances and acquires mainstream vendor adoption.

Posted December 14, 2007 in Information Systems
Technorati:  Add to Technorati Favorites Add to Technorati Favorites
Del.icio.us:  del.icio.us Save this page to del.icio.us
View CC license
Permalink | Comments (0) | Trackback (0)

egov

Sun Microsystems Drops GSA
gov

In a move that surprised many of us who procure, manage and upgrade Sun systems hardware and software technology solutions, Sun Microsystems informed the GSA in September that the company is canceling its GSA multiple-award schedule contract, effective October 12. The timing of the cancellation seemed to surprise even GSA Administrator Lurita Doan who had just solicited outside help to facilitate the long running contract dispute between the GSA and Sun.

In a follow-on statement by a Sun spokeswoman, "We took this step reluctantly, as we have always valued our relationship with GSA." However, Larry Allen, President of the Coalition for Government Procurement probably better said what most of us are thinking, "That sets a dangerous precedent for government acquisition." Allen's follow-on comment spoke to what may be the underlying issue with Sun, "It doesn't matter if you make a good faith effort to comply, if an official or the [inspector general] has it in for you, you're in trouble. You can dot all your I's and cross all your T's, if there's a vendetta against you, it won't matter one bit."

This GSA cancellation is really a story of politics and egos. Not the least of which is Senator Charles Grassley's insistence to cancel the Sun GSA contract, thereby, escalating the battle of egos between himself and Sun Chairman Scott McNealy who two months prior to the GSA cancellation requested a meeting with Grassley to discuss the dispute. The meeting never took place.

While Sun products remain available on other GWACs (Governmentwide Acquisition Contracts) such as NASAs Solutions for Enterprisewide Procurement (SEWP) contract, SEWP has dramatically less vendor representation than the GSA schedule, thereby, inherently making Sun products more difficult to buy and potentially making them more expensive to buy as SEWP GWAC members may charge premiums for other contractors to work through their contact vehicle (SEWP is a closed membership).

Doan has escalated this unfortunate issue to the President's Council on Integrity and Efficiency for an independent review. However, once the ego's of politicians and CEO's set the stage, there will be no common sense solution or other resolution forthcoming. The end result of this competition of egos is a loss to information technology civil servants, and ultimately a loss to taxpayers.

Posted November 13, 2007 in Information Systems
Technorati:  Add to Technorati Favorites Add to Technorati Favorites
Del.icio.us:  del.icio.us Save this page to del.icio.us
View CC license
Permalink | Comments (0) | Trackback (0)

egov

Government Web 2.0 IT Wiki Release
gov

The Government's use of web 2.0 technology accelerated this week with the release of GovITwiki.com. For an initial release, the wiki is surprisingly strong. Because the site was constructed from the same MediaWiki open source software used to create Wikipedia, it leverages the same recognized user interface, simple organization and intuitive navigation. This public sector wiki is created by members of the Government Information Technology Community and the wiki audience is described as government IT managers, vendors engaged in selling IT solutions to the government and citizens who desire to learn more about government information technology.

The government wiki is supported by volunteers, which currently number about seven regular participants and several occasional contributors. To continue the momentum and make this a relevant, government-wide IT resource, many more volunteers will be needed. There is a participation link on the front page. I intend to be a contributing member and encourage other government IT managers to consider the same.

Posted October 8, 2007 in Web 2.0
Technorati:  Add to Technorati Favorites Add to Technorati Favorites
Del.icio.us:  del.icio.us Save this page to del.icio.us
View CC license
Permalink | Comments (0) | Trackback (0)

egov

Advancing Government to e-Government
gov

What's holding back government, all of government, from truly becoming e-government?

e-Government is moving forward, albeit one agency and project at a time. Thanks in part to Karen Evans (OMB administrator for e-government, shared services and IT initiatives), cross-agency initiatives have taken root and continue to grow. However, for government to truly advance as a single entity with some element of uniformity will require the creation of a political constituency around those strategic initiatives that lay the foundation for future building. Gaining support from Capital Hill is a must. However, my experience on capital hill is that while there are some very good ideas, many on the hill don't fully understand the initiatives, value, payback and end results. To be approved by the policy makers and the appropriations guardians, e-government initiatives and IT projects must be simplified to a layman level, supported by overarching evidence and focused on end results. Some of the best end results that clearly speak volumes to policy makers are taxpayer savings, enhanced citizen services and more efficient government.

Another challenge is the approval processing procedural difficulty. Getting appropriations through a stove piped Congress where agencies and congressional appropriations committees desire to control the funding for each agency stifles the legitimate funding flow and delays progress. Certainly congressional oversight is required, however, until this oversight matures from an operational hands-on participant role to a governance perspective major and valuable IT initiatives will follow the way of political progress; or lack thereof.

Finally, I also believe longer-term e-gov projects face additional prejudice and hurdles. Appropriators operate on an annual basis. The high number of short-term projects competing for funding cast a shadow on longer-term projects extending well beyond the fiscal year. Appropriations Committees often find it more difficult to see and authorize the long-term value from funding requests that extend and project value beyond the next fiscal year.

So what's going to overcome these obstacles? In a word, leadership. Good leaders backed by closely aligned management teams are a powerful one - two punch in addressing the issues and results in the language and style of the recipient. Good leaders don't simply make presentations. They champion causes backed by empirical evidence, supportable projections and tempered emotions. They speak with clarity, they educate their audience when necessary, they talk only with a shared vocabulary, they replace rhetoric with engagement, they link their request to a policy, they deliver compelling business cases, they specify the benefits relative to the person or group with whom they are speaking, they translate the benefits to show citizen support (e.g. how does this request help get you re-elected?) and they rally support around initiatives in a way that achieves a cascading and perpetual effect. Need something done? Give it to a busy person. Need an IT initiative authorized by an agency or Congress, give it to a proven, creative and committed leader.

Posted September 18, 2007 in IT Strategy
Technorati:  Add to Technorati Favorites Add to Technorati Favorites
Del.icio.us:  del.icio.us Save this page to del.icio.us
View CC license
Permalink | Comments (0) | Trackback (0)

egov

IPv6 - T Minus 1 Year
gov

It's June and in the government IT world that means that one of the most lack luster but far reaching federal IT initiative deadlines is just one year away.

IPv6 was created in the mid-1990s under direction of the Internet Engineering Task Force (IETF), which is an international body responsible for developing Internet standards. On August 2 of 2005, OMB (Office of Management and Budget) set the objective to enable government networks for IPv6 by June 30, 2008. The looming deadline only applies to network infrastructure equipment such as switches, routers and hardware firewalls which makes it much easier and affordable than upgrading the entire extended network. Simply stated, an IPv6 compliant device or system will be able to receive, process and/or transmit IPv6 packets as well as interoperate with IPv4 and other protocols.

The unfunded initiative began simply by encouraging the planning and normal replenishment of equipment to the IPv6 protocol. As with many new government IT initiatives or mandates, the stimulus or push back for adoption is less about technology innovation and more about funding. At a Federal Information Assurance Conference on this topic, Peter Tseronis, co-chair of the group and a network services director for the Education Department, suggested applying real world IPv6 benefits and business cases in order to facilitate funding. While the value of IPv6 is relative to the beneficiary, the benefits of this new protocol are clear.

  • A greatly expanded address space over IPv4; 128 bit over 32 bit
  • End to end network performance
  • Peer-to-peer IP traffic security; with a virtually infinite number of IP addresses, peer to peer communication can occur over an infinite number of always on devices
  • Enhanced mobility features for wireless utilization
  • More efficient administration and auto configuration

In reality, much of the IPv6 hardware conversion costs are within most well organized technology refresh budgets. However, the training costs involved to truly maximize the value of this new protocol will likely be offset from other competing interests. Regardless of funding sources, there is no question this is a costly endeavor. An October 2005 study prepared by RTI International for NIST estimated that government agencies will spend approximately $1.5 billion over the next five years and $4.6 billion over the next 20 years transitioning to IPv6.

There's little doubt that OMB's mandate is in part political. The governments transition, or put another way, the world's largest IT buyer's transition, will both increase IPv6 awareness and influence the growth of IPv6 commercial IT products and services. It's also interesting to recognize that US government agencies are behind other countries IPv6 adoption in part because US government agencies and companies initially secured large blocks of IPv4 addresses when the Internet was first created - thereby lessening the need for the greater addressing schema. IPv6 is more popular in Europe and Asia where IPv4 address space is quite scarce.

The path to this mandate is not unlike most other technology upgrades. First, assess your IT/IP inventory in order to quantify your IP compliant and non-compliant devices. Per OMB, this should be done no later than this month. Second, incorporate the IPv6 standard into IT strategy and budgeting. A key here is justifying this protocol with real and tangible value. Third, incorporate this standard into all new procurement requests and RFPs. Fourth, for significant backbone equipment which may require a longer replenishment cycle, you may want to consider transition technologies such as IPv6-in-IPv4 tunneling technology which routes IP6 packets through virtual paths by encapsulating them in IP4 network address headers. Fifth, upgrade your IP address requirements, justification and provisioning policies. And finally, allocate some time and money to IT training for this protocol.

I find it interesting that while the IPv6 mandate does not apply to state and local governments, a recent survey illustrated that 46 percent of state and local respondents reported they are well into their IPv6 planning and budgetary requests and that an estimated 36 percent of their collective IT infrastructure is currently IP6 ready, a slightly higher percentage than civilian federal agencies.

Posted June 11, 2007 in IT Mandates
Technorati:  Add to Technorati Favorites Add to Technorati Favorites
Del.icio.us:  del.icio.us Save this page to del.icio.us
View CC license
Permalink | Comments (0) | Trackback (0)

egov

 

.gov
washington dc
.gov

 

gsa
 GovernmentBlogger.com | Government IT Blog