Data centers

12:41 PM
Art Wittmann
Art Wittmann
Commentary
Connect Directly
LinkedIn
Twitter
RSS
E-Mail
50%
50%
Repost This

Research Shows Cutting Costs Not A Gov IT Priority

I started my career in government, running the IT operations of a college within a large state-funded university. While that's a far cry from the scale of federal agencies, I don't think the mind-set necessarily is. First rule of government: If you don't spend your budget, it'll be given to someone who will. We did our best to make great and clever use of the funds we had for the benefit of students, faculty, researchers, and staff, but I understood that a dollar saved was never going to trickle

I started my career in government, running the IT operations of a college within a large state-funded university. While that's a far cry from the scale of federal agencies, I don't think the mind-set necessarily is. First rule of government: If you don't spend your budget, it'll be given to someone who will. We did our best to make great and clever use of the funds we had for the benefit of students, faculty, researchers, and staff, but I understood that a dollar saved was never going to trickle back to the taxpayers. Never.

As I read through our just-released InformationWeek Analytics report on new government IT initiatives, I get a sense of the frustration that public-sector tech leaders must feel. In one survey question, we asked government IT leaders about the perceived success of three important government initiatives: FISMA (security) HSPD-12 (unified ID management), and IPv6. All three were rated as moderate failures. Now, maybe some could be excused for thinking they have bigger fish to fry than IPv6, but security is at the top of everyone's list. How can it be that FISMA is allowed to be a bust?

We also asked government tech pros to rate their management challenges. At the top: lack of resources (money), and hiring and retaining IT talent.

This brings us to a good second rule of IT: If you're not sure you can at least come close to completing a project, don't start. Sure, we blew a few deadlines at the college, but by days and weeks, not years. But when you get told by the President and Congress to do things that simply can't be done with current funding, who do you push back against? Loop back to the sad tale of HSPD-12 and other massive resource draws and you have a bottomless well of systemic frustration.

Before you break out the violins, note that increasing transparency and lowering costs came in at the bottom of the list of management challenges. The first is a priority of the Obama administration, and the second is a priority for taxpayers--making these responses tone deaf in the face of trillion-dollar deficits. The answers also suggest a distinct lack of leadership. Of course, a constant challenge for any manager is to know what your team is and is not able to do--and be willing to ask for help when you're up against a demand you know you can't meet. Here again, our survey reveals some cognitive dissonance on the part of government IT managers.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
More Blogs from Commentary
Edge Devices Are The Brains Of The Network
In any type of network, the edge is where all the action takes place. Think of the edge as the brains of the network, while the core is just the dumb muscle.
SDN: Waiting For The Trickle-Down Effect
Like server virtualization and 10 Gigabit Ethernet, SDN will eventually become a technology that small and midsized enterprises can use. But it's going to require some new packaging.
IT Certification Exam Success In 4 Steps
There are no shortcuts to obtaining passing scores, but focusing on key fundamentals of proper study and preparation will help you master the art of certification.
VMware's VSAN Benchmarks: Under The Hood
VMware touted flashy numbers in recently published performance benchmarks, but a closer examination of its VSAN testing shows why customers shouldn't expect the same results with their real-world applications.
Building an Information Security Policy Part 4: Addresses and Identifiers
Proper traffic identification through techniques such as IP addressing and VLANs are the foundation of a secure network.
Hot Topics
1
SDN Strategies Part 3: Juniper, Dell, Brocade, Alcatel-Lucent
Kurt Marko, Contributing Editor,  4/17/2014
1
SDN Strategies Part 4: Big Switch, Avaya, IBM,VMware
Kurt Marko, Contributing Editor,  4/18/2014
1
IT Certification Exam Success In 4 Steps
Amy Arnold, CCNP/DP/Voice,  4/22/2014
White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
Video
Slideshows
Twitter Feed