Tools and techniques

 

Connecting state and local government leaders

The winners of this year's GCN Technology Leadership Awards used some of the most effective technologies and project management techniques available. Here is a brief primer on those approaches.

The winners of this year's GCN Technology Leadership Awards used some of the most effective technologies and project management techniques available. Here is a brief primer on those approaches. The Information Technology Infrastructure Library provides a framework by documenting best-practices approaches to managing IT services.Developed by the United Kingdom's Office of Government Commerce, ITIL's approach is explained in a number of books and continues to evolve ' it currently is in Version 3. ITIL provides checklists and other procedures in areas such as incident management and service delivery, and it has gained international acceptance.To get more information, start at www.itil-officialsite.com. ITIL's systematic approach can help organizations improve IT development, operations and delivery of services. However, implementation can be a slow process, and it can require extensive staff training. Drew Jaehnig, chief of the Operations Division at the Defense Information Systems Agency's Joint Staff Support Center, used ITIL as a guide for reorganizing JSSC's service-desk functions in one of the first successful ITIL implementations in the U.S. federal government. ITIL got its start in the late 1980s in the British Central Computer and Telecommunications Agency and was called Government Information Technology Infrastructure Management. It caught on in Europe in the early 1990s. In 2000, Microsoft used ITIL as the basis of its Microsoft Operations Framework. ITIL Version 2 was published in 2001; Version 3 followed in 2007. Enterprise resource planning software has been around for some time, but its role in large organizations could grow as more enterprises seek to consolidate systems and integrate their data. The effects of ERP, which grew out of an approach called manufacturing resource planning, extend beyond information technology to all facets of an operation. Operating from a central database, ERP can allow you to integrate data and systems and, by extension, help enable the data sharing within and outside an organization that many government agencies strive for. Implementation can be difficult, however. It often requires breaking down long-established IT fiefdoms in addition to being expensive and requiring thorough planning and ongoing training. Susan Keen, technical director of the Navy's ERP Program, championed technical requirements for the largest public-sector ERP ever built.The Navy, noting that many integrator-led ERP projects had run considerably over budget, decided to take control of the program, including product development. Day-to-day management alongside integrator BearingPoint allowed the Navy to get the results it wanted and get them on time. If you're interested in ERP but find technical journals a bit dry, you might want to try 'Why ERP?,' a short novel by F. Robert Jacobs and D. Clay Whybark, which offers a narrative on how to implement ERP. It was patterned after Eli Goldratt's business novel, 'The Goal.' Web 2.0 doesn't have as much to do with the World Wide Web as with how you use it. The key word associated with Web 2.0 is one any agency can appreciate: collaboration. Rather than denoting a new version of the Web, the phrase refers to user-generated content, interaction and transactions that occur via relatively new platforms, such as wikis, social- and professional-networking sites, mashups, and blogs. Extensible Markup Language-based tools, Rich Internet Applications, standards-oriented browsers and a variety of other developing technologies are making Web 2.0 possible. Agencies have recently been making widespread use of Web 2.0 tools for everything from military recruiting to emergency preparedness plans developed by federal, state and local organizations using wikis. Such tools also can facilitate long-distance collaboration among dispersed workgroups. Sheila Campbell, team leader of USA.gov Web Best Practices at the General Services Administration, has pushed for Web 2.0 capabilities on government Web sites as part of an overall improvement effort.The key to her approach is collaboration.She is co-chairwoman of the Web Managers Advisory Council at the Library of Congress, is in charge of USA.gov's Web Manager University and has played a key role in expanding the Web Content Managers Forum ' which includes representatives from federal, state and local organizations ' from a handful of members in 2001 to more than 1,300.Nancy Sternberg, the Small Business Administration's Business Gateway program manager, uses Web 2.0 tools to foster collaboration among her staff members and contractors. For example, they use Basecamp, an open-source project management application that helps them work around the contractors' inability to access an internal drive. She also led an upgrade to Google Customer Search Engine technology to improve access to local regulations and use open-source Alfresco software for content management. The term Web 2.0 reportedly was coined in 2004 in a discussion among representatives of MediaLive International and Tim O'Reilly and Dale Dougherty, both of O'Reilly Media. Later that year, O'Reilly hosted the first Web 2.0 conference. On O'Reilly's Web site, www.oreilly.com, he offers an explanation of what is and is not Web 2.0. Service-oriented architecture refers to the collection and coordination of services delivered most commonly via Internet protocols. Usually relying on Web services built with Extensible Markup Language or one of its variations, SOA separates and integrates resources to make them available on demand. SOA can improve business processes by making large applications available as smaller modules. Significantly for government agencies, it can make better use of older systems ' and extend their life cycle ' by establishing a technology framework to let them share information across traditional boundaries. Toward the end of his recent five-year stint with the Peace Corps, Ram Murthy added a twist to SOA, using it to bring services to the corps' widely dispersed volunteer force in areas with intermittent connectivity. A general tenet of SOA is that its Web services are always available, which is not possible in many Peace Corps locations.Murthy promoted an SOA in which services are delivered when needed or available without being concerned about constant connectivity. SOA, like many other technology innovations, has its devotees. But few others have a Web site like soafacts.com.There you'll find comments like these: 'SOA is the only thing Chuck Norris can't kill'; 'SOA is an anagram for OSA, which means female bear in Spanish. It is a well-known fact in the Spanish-speaking world that female bears are able to model business processes and optimize reusable IT assets better than any other hibernating animal'; and 'SOA is the correct answer to all zen koans.' Service-oriented architecture can bring your organization many benefits, but it also can make securing your networks difficult. Widely accessible, distributed services can leave holes in your network environment.One way to secure a SOA starts with the tools used to build it, such as Business Process Execution Language or Extensible Markup Language. It's advisable to try to build in security throughout the development process. Securing SOA is essential to delivering the benefits SOA was designed for. Because of SOA's far-reaching nature, securing it requires a comprehensive plan. Carlos Vera, deputy program manager of the Defense Information Systems Agency's Net-Centric Enterprise Services, took a performance- based approached, concentrating on requirements without telling the providers how to meet them. He also, to an extent, mirrored SOA's distributed nature by forgoing a centralized approach to enterprise security. Web Services Security, commonly called WS-Security, released by the Organization for the Advancement of Structured Information Standards, provides a protocol for securing Web services. http://www.oasis-open.org/committees/wss. High-performance computing ties together dozens, hundreds or even thousands of microprocessors to work as a single computer. HPC systems often can execute trillions of floating-point operations/sec, or teraflops. They can be built relatively inexpensively by tying together commodity servers and open-source clustering software, such as Beowulf. HPC systems can tackle problems too large for a single computer to execute by breaking up the task across multiple processors. Some problems, such as fluid dynamics, weather modeling and in-depth product design, can only be modeled accurately on HPC systems. Using an Energy Department HPC system, the University of Chicago's Center for Astrophysical Thermonuclear Flashes simulated in fine-grain detail the detonation of a dwarf star into a full-blown supernova, a job that required 2.5 million hours of processing time. Early results offered a glimpse into the nature of dark matter. NASA is using its Columbia supercomputer for groundbreaking simulations of black holes. The most powerful HPC system in 1993, as judged by the first compilation of the Top500.org list, would not rank even at the bottom of today's Top 500 list.No. 1 in 1993 was Lawrence Livermore National Laboratory's CM-5/1024, which was capable of 60 billion floating-point opera tions/sec, or 60 gigaflops. In November, Top500.org declared Lawrence Livermore's BlueGene/L System, capable of 478.2 teraflops, the fastest computer of 2007. Telework is nothing new, but it has gained steam in government for reasons that range from green initiatives to attracting and retaining employees. Better, less-expensive tools ' from wikis to videoconferencing setups ' make it a viable option for more workers. Aside from attracting a wider pool of talent without having to consider commuting distance, studies show that telework tends to increase productivity and reduce turnover. Tangential benefits include reduced traffic and automobile emissions.And the hardware and software that support telework can extend beyond workers at home or a telework center for videoconferencing and other applications throughout the enterprise. More than 40 percent of the U.S. Patent and Trademark Office's 10,000 workers use the agency's telework program, as do 86 percent of its trademark and patent examination attorneys. And more continue to come on board. Acting Chief Information Officer Deborah Diaz said USPTO has instituted 17 telework initiatives. A February 2000 paper by Wendell Joice at the Office of Governmentwide Policy credits Jack Nilles as the father of telework. He telecommuted from Los Angeles to Washington in the early 1960s as a consulting rocket scientist at the Air Force Space Program. In early 1973, Nilles coined the terms telecommuting and teleworking.He later noted that although he pioneered telecommuting while working for the government, he could not get federal authorities interested in its wider application. Tracking supplies and vehicles can help organizations better manage their inventories and fleets. For supplies, many agencies rely on radio frequency identification tags fixed to crates or items.The tags send radio signals to readers, and that information is relayed to a central control center. Wireless tracking systems, such as those used for vehicle fleets, use Global Positioning System transmitters and receivers. Inventory systems have the obvious benefit of providing a near-real-time view of the status and location of supplies and materiel. Fleet systems help organizations more efficiently manage their vehicles. John Edgar, manager of the U.S. Postal Service's Network Operations Business Solutions Portfolio, has put several tracking systems to use at USPS. The Surface Visibility System uses mobile bar code scanners with 802.11 wireless capability at nearly 180 mail processing plants nationwide.More than 20,000 employees use the system, which is the result of strict requirements monitoring and collaborative engineering. Edgar also is leading a test at two bulk mail centers of the Yard Management System, which uses a radio tag system and 802.11 wireless to manage postal vehicles. The use of tracking systems is likely to get a boost as IPv6 is more widely adopted. IPv6 will allow a virtually unlimited number of IP address, which could be affixed to individual products as they are produced to enable their wireless tracking through a supply chain. The Defense Department, for example, is mulling the possibility of eventually assigning IP addresses to individual supplies and armaments. The government has been moving steadily toward identity cards with embedded chips to authenticate everyone from employees entering buildings or logging on to government networks to foreign visitors entering the country. Programs of this scale require not only reliable on-site equipment but also back-end systems capable of managing and securing the data, Accurate identification of employees or visitors increases security by protecting physical and technological infrastructures in practically any situation. Mike Butler knows a lot about large government ID card programs.He worked on an early Navy program and then the Defense Department's Common Access Card Program, which has issued more than 11 million cards to military service members and civilian employees. He then came to the General Services Administration as program manager of its Managed Service Office to develop the USAccess Program, which issues government ID cards in accordance with Homeland Security Presidential Directive 12. A day before the October 2006 deadline for agencies to begin issuing HSPD-12 cards, the Philadelphia lab producing the first batch told GSA it would not be able to ship the cards in time. Butler drove to Philadelphia, spent the night in his car on the lab's parking lot, got a box of cards at about 6:30 a.m. and drove back to Washington in time for a ceremony GSA had arranged to commemorate the event.


ITIL

What it is:





What it can do:

Example:

Fast fact:

ERP

What it is:

What it can do:

Example:



Fast fact:

WEB 2.0

What it is:

What it can do:

Examples:







Fast fact:

SOA

What it is:

What it can do:

Example:



Fast fact:



SECURING SOA

What it is:



What it can do:

Example:

Fast fact:

HIGH-PERFORMANCE COMPUTING

What it is:

What it can do:

Examples:

Fast fact:



TELEWORK TOOLS

What it is:

What it can do:



Example:

Fast fact:



RFID/WI-FI LOGISTICS TRACKING

What it is:



What it can do:

Example:



Fast fact:

ID CARD MANAGEMENT

What it is:What it can do:

Example:



Fast fact:

NEXT STORY: Technology visionaries

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.