5 technology waves to ride in 2009

 

Connecting state and local government leaders

Agencies this year will likely find themselves following five Technology trends that can save energy and reduce costs, make the most of Web 2.0 capabilities, manage authentication, provide layered IT defenses, and make crossagency systems a reality.

WELCOME TO 2009. It’s time to ring in the new presidential administration.

In this report

GCN asked these experts for their views on the most important information technology issues facing government in 2009. Click their names to read their comments.

Andy Blumenthal
Jonathan Bruehl
Teresa Carlson
Vinton Cerf
Michael Daconta
Patrick Finn
John Gilligan
Tom Greenspon
Vance Hitch
Ed Meagher
Dave McQueeney
Alan Paller
Patrick Pizzella
Venkatapathi Puvvada
Harry Raduege
Hord Tipton
Dave Wennergren
Bill Vass

Through a series of well-thought-out mandates from the Office of Management and Budget, the departing Bush administration brought considerable order to federal information technology shops. But now the Obama administration wants to shake up agencies even more. It has promised that the federal government will use technology more than ever to offer services and bring transparency to government agencies. Guess whose plate that work will fall on?

“This is a technology administration,” said Patrick Finn, a Cisco Systems vice president for U.S. federal operations.

The good news for those who wish to rest for a while is that agencies won’t face any changes for some time. “It usually takes a significant number of months before an incoming administration can have clear and present effects,” said Ray Bjorklund, senior vice president and chief knowledge officer at market researcher FedSources Inc. However, agencies that anticipate the administration’s agenda with tests and updates to existing systems will be ahead of the game.

The new administration’s agenda will be only one of the factors agency chief information and chief technology officers must grapple with in the upcoming year. They also must manage shrinking budgets — because of a ballooning deficit — ever-evolving security threats and the ever-changing nature of the IT landscape.

The most dedicated officers are keeping an eye on all these tasks. In January, the Government Printing Office will formally launch its new public government electronic document repository, called Future Digital System (FDsys). In development for 41⁄2 years, FDsys “has been positioned so it can anticipate the needs for transparency and a lot of the initiatives that the Obama team is looking for,” said Mike Wash, GPO’s CTO.

Like GPO, agencies could anticipate the plans of the new administration and hit other agency milestones, too. Here are five technology trends that will help you accomplish that task this year.

1. Green IT

Last summer, as the presidential campaign heated up, gas prices soared. And as a result, then-presidential candidate Barack Obama made ambitious promises to fund the development of energy-saving technologies and promote more efficient energy use in government agencies.

“Obama does intend to keep his campaign promises around a better environment, greener approaches to all kinds of things,” said Tom Simmons, who leads federal sales at Citrix Systems.

Although many of the initiatives will not immediately affect IT, per se — such as making buildings more energy efficient — IT will not be safe from scrutiny. “In some agencies, the largest consumer of energy is the IT department,” Simmons said.

So in 2009, expect to see more emphasis on technologies that can help reduce energy bills.

One of them is virtualization, a technology many agencies have already started to embrace. More use of virtualization products from Citrix, VMware, Microsoft, Sun Microsystems and others is likely in 2009. “Virtualization’s [purpose] is to reduce the number of servers that are pulling energy.

By virtualizing [them], you reduce the footprint, therefore you reduce the requirement for cooling,” Simmons said.

Another technology that will likely get greater play is cloud computing. Cloud computing promises to move the burden of support IT infrastructure, namely by outsourcing computational and data storage services to third parties who could pool resources and use energy more efficiently.

“Everybody in government is talking about clouds,” said Bill Vass, president and chief operating officer at Sun Federal.

“It is getting significant traction, but the issue we’re running into with our government customers is that the commercial clouds aren’t meeting their basic needs,” Vass said. Commercial vendors such as Amazon don’t pay heed to government compliance standards, such as archiving schedules. However, expect to see more government-focused cloud offerings in the upcoming year, he said.

Another technology on the rise is virtual meeting software, though the growing use of this software might be caused by restricted budgets as much as a desire for energy- savings. “Budgets are absolutely going to be impacted, with record deficits,” Finn said. “I think you will see a demand for more fiscal responsibility from all budget owners in governments. Travel budgets are one of the areas that are discretionary.”

More organizations will likely use virtual from Cisco’s TelePresence systems to more economical Web meeting software, such as Citrix’s GoToMeeting, and collaboration tools, such as Microsoft SharePoint.

2. Web 2.0 and beyond

Government transparency is one of the Obama administration’s top goals. The public wants to see what the government is doing and how it is being done. The best tool for sharing this information is the World Wide Web. The new administration is expected to primarily use Web technologies to make the government more transparent, Simmons said.

“President-elect Obama took social networking to a new level during the campaign, using Facebook and MySpace, wikis, and other things to help communicate and connect with citizens in a way that is entirely different than the way it was done before” said Haywood Talcove, chief executive officer of LexisNexis Special Services. “It changes the way democracy is implemented because it gives people more of a way to interact.”

Web 2.0 technologies such as social-networking tools are nothing new for government. During the past few years, OMB has set up a wiki for Congress to help craft the annual budget, and a few agencies, including military and intelligence organizations, have used similar tools.

The trick for agencies is to fit freewheeling social technologies to the more controlled world of government bureaucracies by having them comply with archiving and security mandates already in place. “There were people on the transition team using social-networking tools. Bjorklund said, “Those are wonderful tools for a purely social environment and little less so for a professional environment. In time, they will become very useful.”

Another challenge is making sense of the data. It’s not enough to merely post the congressional budget wiki. The average user needs to know what they are looking at. Users will increasingly see analysis and reporting tools, most of which are already Web-enabled, accompanying the public presentation of data, said Teresa Carlson, who leads Microsoft’s federal government sales and operations. She said agencies must decide what data to post and how to post that data.

“The state of the art that people are coming to expect is to do a Google search and come up with what they are looking for with the first hit,” said Owen Ambur, a former cochairman of the CIO Council’s XML Community of Practice and co-author of the Strategy Markup Language (StratML). “You can’t do that when it is buried in a 150-page PDF that has three pages of graphics before you get to any text at all.”

Last month, Ambur posted a version of the Obama agenda in the StratML format so citizens, lobbying and advocacy groups, and others could easily parse it. Instead of organizing social-networking tools around people, as LinkedIn does, they could be organized around objectives.

3. Identity management

The most venerable cornerstone of government paperwork is slowly becoming a thing of the past: the written signature.

In October 2008, President George W. Bush used a digital signature to sign the 2009 budget. The secure log-on to the laptop PC he used, employing the two-factor authentication mandated by Homeland Security Presidential Directive 12, assured the validity of the signature.

The digital signature “was a great success for us and the country and a good demonstration that these kinds of tools are commonplace and accepted,” GPO’s Wash said.

Agencies’ compliance with HSPD-12 has established the framework for electronically managing crucial operations that require proof of identity, such as signatures. This year, they will have more ways to use this framework to establish authenticity in government affairs.

“The government is creating a lot of jobs and that means you will have a lot more people coming into agencies and a lot more churn. Identity management will have to be managed,” said Fiona Pattinson, director of business development and strategy security testing company atsec. This means adding new accounts for new employees, deleting accounts as employees leave or are transferred and coordinating accounts across different systems.

GPO’s FDsys will rely heavily on authentication. “We will have the capability to receive electronic information from the agencies and Congress that is digitally signed, so there is assurance that it hasn’t been altered or corrupted in any way,” Wash said. “Once it gets into GPO, we put it into the information management systems, and we will offer digitally signed versions of the data.”

4. Security: Defense in depth

In December 2008, the Commission on Cyber Security for the 44th Presidency, a panel of government and industry experts, released its recommendations for the incoming administration. The prognosis? A new National Office for Cyberspace needs to oversee security. Whether such an office is enacted, the message is clear: Despite agencies’ efforts and cross-agency efforts such as the Trusted Internet Connection initiative, security remains a serious concern.

“Security will continue to be important,” Bjorklund said. Unlike other challenges, security can’t be solved simply by the application of money. “The threat continues to evolve. There are people out there who know how to keep moving that threat forward.”

The next step for agencies may involve thinking about security in a broader fashion. “When you are doing your overall architecture, [at] every layer of the architecture you must ask yourself: Where is the security?” Microsoft’s Carlson said. “What are your policies? How do you have this configured?”

“The focus does need to be [on] infrastructure,” Finn said. “I think you will hear a lot more on policy around security. It’s not just going to be the latest technology but how do we actually look at this in the context of creating a secure infrastructure.”

Vass suggested that defense-in-depth plans will become more prominent. “If you can’t adequately protect the endpoint, then don’t. If you can’t adequately protect your network in one layer, then don’t,” he said. Instead, multiple security technologies can be layered on one another to provide an impenetrable barrier.

5.

Standardization

Although the Obama team used technology heavily in the campaign, how the administration plans to use technology once in office is still open to question. One clue could be in a November 2007 position paper released by then-Sen. Obama, “Connecting and Empowering All Americans through Technology and Innovation.” Technologies could help in government transparency, health care and universal access to electronic information, the paper asserts.

“In almost every case, these ambitious goals may only be achieved through the implementation of standards,” said Massachusetts- based standards attorney Andrew Updegrove. The federal government will never decide on one vendor or one technology for any of its needs. As a result, interoperability is necessary, and that, in turn, requires standards.

“We’ve tried to incorporate as much standard technology as we could” with FEDsys, GPO’s Wash said. “We didn’t want to create a closed and proprietary system. We went after [commercial software packages] and configured them through an integration process.”

He said standardization can also help if an agency must replace a component in the system. The old product can be removed and the new one installed easily because they both work with the same standardized interfaces. Without the interoperability, the agency gets locked into the vendor and the software maintenance costs can skyrocket, Vass said.

Standardization can also be critical in the reuse of software developed specifically for, or by, government, Vass said. Many agencies commission the development of similar software instead of looking at what other agencies have already commissioned. “What we need to do is to have an incentive system that rewards reuse,” Vass said.

To be sure, government agencies already heavily use standards, including those developed by outside international bodies and in government through the Common Criteria program and the Defense Department’s 5015.2-STD program for records management systems. Although Common Criteria and 5015.2 are mandatory only on specific systems, they are increasingly being used by additional agencies for procurements, Microsoft’s Carlson said.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.