This document describes a webinar series on federal IT challenges in 2010 and beyond. The webinars will cover topics such as cloud computing, virtualization, cyber security, acquisition practices, and challenges facing the new federal IT workforce. Attendees include IT managers, directors, and specialists who want to learn how to implement new technologies, improve processes, and address IT challenges in support of the administration's goals of a more open and transparent government.
1. Security enjoys a revival as organizations significantly increase security budgets and prioritize continuity initiatives in response to increased risks from social networking, mobile technologies, and cloud computing. Nearly half of surveyed organizations expect significantly higher security spending in 2011.
2. While interest remains in social media and collaboration tools, organizations are more focused on deploying business intelligence systems to analyze large amounts of new data from these sources. Two-thirds expect strong commitment to business analytics and knowledge management in 2011.
3. Virtual desktop infrastructure (VDI) adoption grew rapidly in 2010 but is expected to slow somewhat as organizations take time to evaluate the technology's advantages and strategize its use. Server, storage, and application virtualization deployments are anticipated
The document discusses how information technology (IT) will play an increasingly important role in government, moving from a reactive to a proactive style of regulation. It argues that ensuring high quality data and establishing where data comes from (its "pedigree" or "provenance") will be critical for transparency initiatives and proactive oversight. The document proposes a framework called the Pedigree Management and Assessment Framework (PMAF) that could track data provenance across different systems to help assess data quality for these purposes.
Korea has made significant progress in developing its e-government systems over the past few decades. It established foundational laws and projects in the 1990s and 2000s to build administrative computer networks and promote informatization. Key achievements include consolidating administrative procedures, establishing common platforms, and advancing internal processes and integrated public services. Korea now provides seamless online services and is recognized as a global leader in e-government development. However, challenges remain such as further developing seamless and converged services. The government aims to complete this transition through tasks focused on usage, convergence and citizen-centered services.
This independent survey was commissioned by
Savvis and conducted with 550 CIOs, IT Directors,
Heads of IT and Senior IT Managers of global large
enterprises based in the USA (200), UK (100),
Germany (100), Japan (50), Hong Kong (50) and
Singapore (50), and was completed in August
2012. The research was conducted by Vanson
Bourne, a research based technology marketing
consultancy offering clients analysis and advice
based on incisive, rigorous research into their
market environment. The research used a
combination of online fieldwork methodology and
telephone interviewing. All research carried out by
Vanson Bourne adheres to the latest MRS Code
of Conduct. Demographic detailing respondent
communities includes industry sector, country
in which the respondents were based, and size
of business.
The document summarizes efforts by Enterprise Technology Services (ETS) at UC Santa Barbara to build and improve enterprise IT functions over the past year. Key accomplishments include expanding core infrastructure and application services, establishing plans and processes to create an Enterprise Service Desk, formalizing an IT service catalog, improving IT processes, revising the IT funding model, and appointing roles like Business Relationship Managers and an Enterprise Architect to develop an IT strategy and governance structure. ETS consolidated multiple campus IT organizations to provide centralized enterprise services more efficiently while maintaining local support.
The Business of IT - My Kingdom for an ArchitecturePaul Wohlleben
The above article was published in the June 2004 edition of FEDTECH Magazine. It addresses my observations on the enterprise architecture component of the Bush administration's IT management agenda. The article is one in the series I write entitled "The Business of IT."
This paper will examine why its become important for organizations to develop an comprehensive Information Technology (IT) Modernization strategy that focuses on improving their business process and protecting their network infrastructure by leveraging modern-day cybersecurity tools. Most of the topic will focus on the U.S. Department of Defense’s (DOD) strategy towards improving their network security defenses for the department and the steps they’ve taken at the agency level where components under DOD such as DISA (The Defense Information Systems Agency) are working towards adding tools that provides additional capabilities in the cyber space. This approach will be analyzed to determine if DOD goals address any of their vulnerabilities towards protecting their networks. One of the agencies under the DOD umbrella called DISA (The Defense Information Systems Agency) provides DOD a template on how to build a network that relies upon layers of security to help it combat cyber attacks against its network. Whether that provides an effective solution to DOD remains a question due to the many components that operate under its direction. Managing these networks is the principle responsibilities for the Department of Defense. Nevertheless, it does demonstrates that there are tools available to help DOD build an strong enterprise cyber network of situational awareness that strengthens the ability to protect their network infrastructure.
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Citrix Online
“Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And 2011”
Key Findings:
• Improving business continuity and disaster recovery (BC/DR) capabilities is the No. 1 priority for SMBs and the second highest priority for enterprises for the next 12 months
• IT plans to spend at least 5% more on BC/DR in the next 12 months (only 11% of enterprises and 8% of SMBs plan to decrease spending on BC/DR)
• BC/DR represents between 6% and 7% of the IT budget
1. Security enjoys a revival as organizations significantly increase security budgets and prioritize continuity initiatives in response to increased risks from social networking, mobile technologies, and cloud computing. Nearly half of surveyed organizations expect significantly higher security spending in 2011.
2. While interest remains in social media and collaboration tools, organizations are more focused on deploying business intelligence systems to analyze large amounts of new data from these sources. Two-thirds expect strong commitment to business analytics and knowledge management in 2011.
3. Virtual desktop infrastructure (VDI) adoption grew rapidly in 2010 but is expected to slow somewhat as organizations take time to evaluate the technology's advantages and strategize its use. Server, storage, and application virtualization deployments are anticipated
The document discusses how information technology (IT) will play an increasingly important role in government, moving from a reactive to a proactive style of regulation. It argues that ensuring high quality data and establishing where data comes from (its "pedigree" or "provenance") will be critical for transparency initiatives and proactive oversight. The document proposes a framework called the Pedigree Management and Assessment Framework (PMAF) that could track data provenance across different systems to help assess data quality for these purposes.
Korea has made significant progress in developing its e-government systems over the past few decades. It established foundational laws and projects in the 1990s and 2000s to build administrative computer networks and promote informatization. Key achievements include consolidating administrative procedures, establishing common platforms, and advancing internal processes and integrated public services. Korea now provides seamless online services and is recognized as a global leader in e-government development. However, challenges remain such as further developing seamless and converged services. The government aims to complete this transition through tasks focused on usage, convergence and citizen-centered services.
This independent survey was commissioned by
Savvis and conducted with 550 CIOs, IT Directors,
Heads of IT and Senior IT Managers of global large
enterprises based in the USA (200), UK (100),
Germany (100), Japan (50), Hong Kong (50) and
Singapore (50), and was completed in August
2012. The research was conducted by Vanson
Bourne, a research based technology marketing
consultancy offering clients analysis and advice
based on incisive, rigorous research into their
market environment. The research used a
combination of online fieldwork methodology and
telephone interviewing. All research carried out by
Vanson Bourne adheres to the latest MRS Code
of Conduct. Demographic detailing respondent
communities includes industry sector, country
in which the respondents were based, and size
of business.
The document summarizes efforts by Enterprise Technology Services (ETS) at UC Santa Barbara to build and improve enterprise IT functions over the past year. Key accomplishments include expanding core infrastructure and application services, establishing plans and processes to create an Enterprise Service Desk, formalizing an IT service catalog, improving IT processes, revising the IT funding model, and appointing roles like Business Relationship Managers and an Enterprise Architect to develop an IT strategy and governance structure. ETS consolidated multiple campus IT organizations to provide centralized enterprise services more efficiently while maintaining local support.
The Business of IT - My Kingdom for an ArchitecturePaul Wohlleben
The above article was published in the June 2004 edition of FEDTECH Magazine. It addresses my observations on the enterprise architecture component of the Bush administration's IT management agenda. The article is one in the series I write entitled "The Business of IT."
This paper will examine why its become important for organizations to develop an comprehensive Information Technology (IT) Modernization strategy that focuses on improving their business process and protecting their network infrastructure by leveraging modern-day cybersecurity tools. Most of the topic will focus on the U.S. Department of Defense’s (DOD) strategy towards improving their network security defenses for the department and the steps they’ve taken at the agency level where components under DOD such as DISA (The Defense Information Systems Agency) are working towards adding tools that provides additional capabilities in the cyber space. This approach will be analyzed to determine if DOD goals address any of their vulnerabilities towards protecting their networks. One of the agencies under the DOD umbrella called DISA (The Defense Information Systems Agency) provides DOD a template on how to build a network that relies upon layers of security to help it combat cyber attacks against its network. Whether that provides an effective solution to DOD remains a question due to the many components that operate under its direction. Managing these networks is the principle responsibilities for the Department of Defense. Nevertheless, it does demonstrates that there are tools available to help DOD build an strong enterprise cyber network of situational awareness that strengthens the ability to protect their network infrastructure.
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Citrix Online
“Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And 2011”
Key Findings:
• Improving business continuity and disaster recovery (BC/DR) capabilities is the No. 1 priority for SMBs and the second highest priority for enterprises for the next 12 months
• IT plans to spend at least 5% more on BC/DR in the next 12 months (only 11% of enterprises and 8% of SMBs plan to decrease spending on BC/DR)
• BC/DR represents between 6% and 7% of the IT budget
NJVC Implementation of Cloud Computing Solutions in Federal AgenciesGovCloud Network
This paper outlines the essential steps to constructing a solid cloud computing roadmap.This paper outlines the essential steps to constructing a solid cloud computing roadmap.
The GAO report assessed the progress of 7 federal agencies in implementing the federal "Cloud First" policy. The agencies have made progress by incorporating cloud requirements into policies and processes and meeting deadlines to identify and implement cloud services. However, 2 agencies may not meet the June 2012 deadline and agency plans were missing key elements like estimated costs. The report also identified 7 common challenges agencies faced in implementing cloud computing, such as meeting security requirements and obtaining guidance. It concludes better upfront planning is needed for future cloud efforts to fully realize expected benefits of improved efficiencies and reduced costs.
This document discusses the game changing role of enterprise mashups in government. It notes that government IT departments are under pressure to improve services while finding cost savings. Enterprise mashups can help by reducing costs through app development without large IT teams and by integrating siloed data and apps. Mashups emerged as a genre to create situational apps quickly by combining existing online data and tools. Governments can benefit from mashups to cut costs, improve transparency, support remote work, and address other drivers of IT innovation.
The Business of IT - Integration Management: The Missing Link?Paul Wohlleben
The above article was published in the August 2005 edition of FEDTECH Magazine. The article describes a key management technique, Integration Management, and attempts to make the case for its use in critical Federal IT modernizations. The article is one in the series I write entitled "The Business of IT."
The Living Country: Another Perspective to e-GovernmentAbdul Cader
A Computer Representation of a country, to Manage Information, improve infrastructure, provide revenue, provide real assessment of progress, provide guidance to strategic plans, Utilize assets and to reveal the hidden values and Services
The document discusses three ways the federal government is working to maximize the value of technology while minimizing costs: 1) Migrating to the cloud to reduce upfront hardware costs and allow for predictable subscription pricing; 2) Sharing services and technology across agencies through consolidated shared services centers; 3) Leveraging talent science to better identify the best candidates for jobs using behavioral data to increase hiring success rates.
A complex adaptive_system_perspective_of_enterprise_architecture_in_electroni...bambangpadhi
This document summarizes a paper that proposes analyzing enterprise architecture in electronic government using a complex adaptive systems perspective. The paper examines 11 e-government projects in the Netherlands involving enterprise architecture development between 1980-2004. By conceptualizing enterprise architecture as a complex adaptive system, the paper aims to better understand the interactions between central and local governments and identify design principles to increase inter-organizational coordination and IT implementation success.
EXPLORING CRITICAL SUCCESS FACTORS FOR CYBERSECURITY IN BHUTAN’S GOVERNMENT O...csandit
This paper presents the results of open-ended survey exploring the critical success factors for cybersecurity implementation in government organisations in Bhutan. Successful implementation of cybersecurity depends on a thorough understanding of cyber threats and challenges to the organisational information assets. It also depends on identification of a responsible, dedicated personnel to lead and direct cybersecurity initiatives. Furthermore, it is important to know the critical areas of cybersecurity activities for management to target, prioritise and execute. Understanding of what key things need to be done right by the responsible agency and its leader, at a particular time and in particular context, can lead to better decision making and resource optimisation including skills and knowledge. The survey findings indicate that, among other factors, awareness and training, policy and standards, and adequate financing and budgetary commitment to cybersecurity projects are three most important success factors. Channelling an organisation’s limited resources to these few factors is expected to enhance cybersecurity posture and its management. The research outcome has implications to both government and private organizations in Bhutan.
26 9133 data innovation resource edit satIAESIJEECS
The part of data innovation in information administration has dependably been a begging to be proven wrong subject in writing and practice. In spite of existing documentation with respect to the connection between IT assets what's more, information administration, restricted data is accessible on the diverse sorts of IT assets portraying this relationship. We coordinate two research streams rising in information administration what's more, broaden the writing on IT knowledge administration linkage by examining the directing part of asset sense of duty regarding conjure an unexpected asset point of view. Information from 168 associations in China give exact proof that three sorts of IT assets emphatically influence information administration capacity (IAC), which is decidedly related to upper hand. Moreover, this examination distinguishes two positive semi directing impacts of asset responsibility on the IT resource–IAC relationship. In particular, asset duty straightforwardly what's more, emphatically upgrades IAC, and reinforces the impacts of IT human and IT relationship assets on IAC. We talk about the hypothetical and viable ramifications of the outcomes.
The above article was published in the August 2009 edition of FEDTECH Magazine. It addresses my musings on the transparency agenda of the Obama administration. The article is one in the series I write entitled "The Business of IT."
A Reference Model For A Service Oriented GovernmentMario Halfhide
1. The document presents a reference model for a service-oriented government in the Netherlands. It outlines 12 developments towards modernizing government and making it more customer-focused.
2. The model divides the developments into primary processes like policymaking and revenue collection, and secondary supporting processes. It discusses the current state of IT systems and the impact of changes.
3. Examples are given of government agencies implementing new ERP systems from SAP to improve their primary processes and replace outdated customized systems, as the Netherlands transitions towards a more integrated, digital government.
Nordic eGovernment Conference 201 - Ellen StrålbergJulieCarlslund
This document summarizes a report from Norway's Agency for Public Management and eGovernment (Difi) on governing common e-government components. The report outlines objectives of better digital services for citizens and a more efficient public sector. It defines common components and identifies five that are particularly important. The report recommends standardizing management roles, financing cross-sectoral tasks, increasing coherent priority-setting, and pressure on line management to achieve goals of utilizing common components across agencies.
This document summarizes a report from Norway's Agency for Public Management and eGovernment (Difi) on governing common e-government components. The report outlines objectives to improve public services and efficiency through better technology use. It defines common components and identifies five that are particularly important. The report recommends measures to strengthen governance of these components, including clearer national responsibility, cross-sectoral financing, priority-setting committees, and increased management pressure to realize benefits.
E Bryan - An Analysis Of Content And Information Management As Drivers For E...Emerson Bryan
The document discusses content and information management as drivers for electronic government. It argues that effective information management is essential for successful e-government initiatives. The Government of Barbados aims to improve access to government information electronically but faces challenges around managing information consistently across agencies. Standards and guidelines for electronic records management are needed to support Barbados' national ICT strategy and the move towards more online government services.
The document summarizes the findings of a survey on global information security trends. It finds that while social media and cloud computing present new security risks, companies are taking steps to manage these risks such as monitoring employee social media use and ensuring virtualized environments are properly configured. It also notes that while outsourcing of security functions had been expected to grow, the economic downturn has led more companies to keep these functions in-house. Overall security budgets are holding steady despite cost-cutting in other areas.
The above article was published in the May 2008 edition of FEDTECH Magazine. It summarizes the key priorities of Federal CIOs as captured in the Information Technology Association of America's (now Tech Amercia) Survey of Federal CIOs, dated February 2008, entitled "Transforming IT to Support the Mission." The article is one in the series I write entitled "The Business of IT."
This white paper describes the benefits, challenges, and strategies of setting up a government entity-wide enterprise content management (ECM) as a service offering within a governmental central IT organization.
The document outlines plans to transform the US Department of the Interior's $1 billion IT operation over the next 4 years. It notes that current IT services are inconsistent and do not adequately support the Department's missions or customers. The transformation aims to shift IT's focus from hardware/software acquisition to delivering customer-oriented services, establish a new purchasing model where bureaus buy defined IT services, and meet high standards for reliability, accessibility and availability of information resources. The transformation will be funded through existing IT funds, cost savings from consolidation, and reinvested savings.
API-led connectivity: How to leverage reusable microservicesAbhishek Sood
Government agencies across the globe – whether they be state, local, central, or federal – face a digital transformation imperative to adopt cloud, IoT, and mobile technologies that legacy systems often struggle to keep up with.
This white paper explores how to take an architectural approach centered around APIs and microservices to unlock monolithic legacy systems for digital transformation.
Find out how to build up your API management strategy, and learn how you can:
Accelerate project delivery driven by reusable microservices
Secure data exchange within and outside agencies
Use API-led connectivity to modernize legacy systems
And more
This document summarizes the results of a survey of US federal Chief Information Officers (CIOs) conducted by TechAmerica. It finds that CIOs are taking actions to increase government transparency through open data initiatives and digital collaboration. However, they face ongoing challenges related to cybersecurity, aging IT infrastructure, workforce issues, and other areas. The report provides an overview of CIO views and recommendations for the Obama administration to further goals of an open and transparent government through strengthened IT leadership, priorities, and resources.
The Business of IT - CIO's On Their Priorities Today and TommorrowPaul Wohlleben
The above article was published in the August 2006 edition of FEDTECH Magazine. It summarizes key priorities reported in the Information Technology Association of America's (now TechAmerica) February 2006 Survey of Federal Chief Information Officers. The article is one in the series I write entitled "The Business of IT."
NJVC Implementation of Cloud Computing Solutions in Federal AgenciesGovCloud Network
This paper outlines the essential steps to constructing a solid cloud computing roadmap.This paper outlines the essential steps to constructing a solid cloud computing roadmap.
The GAO report assessed the progress of 7 federal agencies in implementing the federal "Cloud First" policy. The agencies have made progress by incorporating cloud requirements into policies and processes and meeting deadlines to identify and implement cloud services. However, 2 agencies may not meet the June 2012 deadline and agency plans were missing key elements like estimated costs. The report also identified 7 common challenges agencies faced in implementing cloud computing, such as meeting security requirements and obtaining guidance. It concludes better upfront planning is needed for future cloud efforts to fully realize expected benefits of improved efficiencies and reduced costs.
This document discusses the game changing role of enterprise mashups in government. It notes that government IT departments are under pressure to improve services while finding cost savings. Enterprise mashups can help by reducing costs through app development without large IT teams and by integrating siloed data and apps. Mashups emerged as a genre to create situational apps quickly by combining existing online data and tools. Governments can benefit from mashups to cut costs, improve transparency, support remote work, and address other drivers of IT innovation.
The Business of IT - Integration Management: The Missing Link?Paul Wohlleben
The above article was published in the August 2005 edition of FEDTECH Magazine. The article describes a key management technique, Integration Management, and attempts to make the case for its use in critical Federal IT modernizations. The article is one in the series I write entitled "The Business of IT."
The Living Country: Another Perspective to e-GovernmentAbdul Cader
A Computer Representation of a country, to Manage Information, improve infrastructure, provide revenue, provide real assessment of progress, provide guidance to strategic plans, Utilize assets and to reveal the hidden values and Services
The document discusses three ways the federal government is working to maximize the value of technology while minimizing costs: 1) Migrating to the cloud to reduce upfront hardware costs and allow for predictable subscription pricing; 2) Sharing services and technology across agencies through consolidated shared services centers; 3) Leveraging talent science to better identify the best candidates for jobs using behavioral data to increase hiring success rates.
A complex adaptive_system_perspective_of_enterprise_architecture_in_electroni...bambangpadhi
This document summarizes a paper that proposes analyzing enterprise architecture in electronic government using a complex adaptive systems perspective. The paper examines 11 e-government projects in the Netherlands involving enterprise architecture development between 1980-2004. By conceptualizing enterprise architecture as a complex adaptive system, the paper aims to better understand the interactions between central and local governments and identify design principles to increase inter-organizational coordination and IT implementation success.
EXPLORING CRITICAL SUCCESS FACTORS FOR CYBERSECURITY IN BHUTAN’S GOVERNMENT O...csandit
This paper presents the results of open-ended survey exploring the critical success factors for cybersecurity implementation in government organisations in Bhutan. Successful implementation of cybersecurity depends on a thorough understanding of cyber threats and challenges to the organisational information assets. It also depends on identification of a responsible, dedicated personnel to lead and direct cybersecurity initiatives. Furthermore, it is important to know the critical areas of cybersecurity activities for management to target, prioritise and execute. Understanding of what key things need to be done right by the responsible agency and its leader, at a particular time and in particular context, can lead to better decision making and resource optimisation including skills and knowledge. The survey findings indicate that, among other factors, awareness and training, policy and standards, and adequate financing and budgetary commitment to cybersecurity projects are three most important success factors. Channelling an organisation’s limited resources to these few factors is expected to enhance cybersecurity posture and its management. The research outcome has implications to both government and private organizations in Bhutan.
26 9133 data innovation resource edit satIAESIJEECS
The part of data innovation in information administration has dependably been a begging to be proven wrong subject in writing and practice. In spite of existing documentation with respect to the connection between IT assets what's more, information administration, restricted data is accessible on the diverse sorts of IT assets portraying this relationship. We coordinate two research streams rising in information administration what's more, broaden the writing on IT knowledge administration linkage by examining the directing part of asset sense of duty regarding conjure an unexpected asset point of view. Information from 168 associations in China give exact proof that three sorts of IT assets emphatically influence information administration capacity (IAC), which is decidedly related to upper hand. Moreover, this examination distinguishes two positive semi directing impacts of asset responsibility on the IT resource–IAC relationship. In particular, asset duty straightforwardly what's more, emphatically upgrades IAC, and reinforces the impacts of IT human and IT relationship assets on IAC. We talk about the hypothetical and viable ramifications of the outcomes.
The above article was published in the August 2009 edition of FEDTECH Magazine. It addresses my musings on the transparency agenda of the Obama administration. The article is one in the series I write entitled "The Business of IT."
A Reference Model For A Service Oriented GovernmentMario Halfhide
1. The document presents a reference model for a service-oriented government in the Netherlands. It outlines 12 developments towards modernizing government and making it more customer-focused.
2. The model divides the developments into primary processes like policymaking and revenue collection, and secondary supporting processes. It discusses the current state of IT systems and the impact of changes.
3. Examples are given of government agencies implementing new ERP systems from SAP to improve their primary processes and replace outdated customized systems, as the Netherlands transitions towards a more integrated, digital government.
Nordic eGovernment Conference 201 - Ellen StrålbergJulieCarlslund
This document summarizes a report from Norway's Agency for Public Management and eGovernment (Difi) on governing common e-government components. The report outlines objectives of better digital services for citizens and a more efficient public sector. It defines common components and identifies five that are particularly important. The report recommends standardizing management roles, financing cross-sectoral tasks, increasing coherent priority-setting, and pressure on line management to achieve goals of utilizing common components across agencies.
This document summarizes a report from Norway's Agency for Public Management and eGovernment (Difi) on governing common e-government components. The report outlines objectives to improve public services and efficiency through better technology use. It defines common components and identifies five that are particularly important. The report recommends measures to strengthen governance of these components, including clearer national responsibility, cross-sectoral financing, priority-setting committees, and increased management pressure to realize benefits.
E Bryan - An Analysis Of Content And Information Management As Drivers For E...Emerson Bryan
The document discusses content and information management as drivers for electronic government. It argues that effective information management is essential for successful e-government initiatives. The Government of Barbados aims to improve access to government information electronically but faces challenges around managing information consistently across agencies. Standards and guidelines for electronic records management are needed to support Barbados' national ICT strategy and the move towards more online government services.
The document summarizes the findings of a survey on global information security trends. It finds that while social media and cloud computing present new security risks, companies are taking steps to manage these risks such as monitoring employee social media use and ensuring virtualized environments are properly configured. It also notes that while outsourcing of security functions had been expected to grow, the economic downturn has led more companies to keep these functions in-house. Overall security budgets are holding steady despite cost-cutting in other areas.
The above article was published in the May 2008 edition of FEDTECH Magazine. It summarizes the key priorities of Federal CIOs as captured in the Information Technology Association of America's (now Tech Amercia) Survey of Federal CIOs, dated February 2008, entitled "Transforming IT to Support the Mission." The article is one in the series I write entitled "The Business of IT."
This white paper describes the benefits, challenges, and strategies of setting up a government entity-wide enterprise content management (ECM) as a service offering within a governmental central IT organization.
The document outlines plans to transform the US Department of the Interior's $1 billion IT operation over the next 4 years. It notes that current IT services are inconsistent and do not adequately support the Department's missions or customers. The transformation aims to shift IT's focus from hardware/software acquisition to delivering customer-oriented services, establish a new purchasing model where bureaus buy defined IT services, and meet high standards for reliability, accessibility and availability of information resources. The transformation will be funded through existing IT funds, cost savings from consolidation, and reinvested savings.
API-led connectivity: How to leverage reusable microservicesAbhishek Sood
Government agencies across the globe – whether they be state, local, central, or federal – face a digital transformation imperative to adopt cloud, IoT, and mobile technologies that legacy systems often struggle to keep up with.
This white paper explores how to take an architectural approach centered around APIs and microservices to unlock monolithic legacy systems for digital transformation.
Find out how to build up your API management strategy, and learn how you can:
Accelerate project delivery driven by reusable microservices
Secure data exchange within and outside agencies
Use API-led connectivity to modernize legacy systems
And more
This document summarizes the results of a survey of US federal Chief Information Officers (CIOs) conducted by TechAmerica. It finds that CIOs are taking actions to increase government transparency through open data initiatives and digital collaboration. However, they face ongoing challenges related to cybersecurity, aging IT infrastructure, workforce issues, and other areas. The report provides an overview of CIO views and recommendations for the Obama administration to further goals of an open and transparent government through strengthened IT leadership, priorities, and resources.
The Business of IT - CIO's On Their Priorities Today and TommorrowPaul Wohlleben
The above article was published in the August 2006 edition of FEDTECH Magazine. It summarizes key priorities reported in the Information Technology Association of America's (now TechAmerica) February 2006 Survey of Federal Chief Information Officers. The article is one in the series I write entitled "The Business of IT."
The Business of IT - Managing Performance by Setting StrategyPaul Wohlleben
The above article was published in the September 2004 edition of FEDTECH Magazine. It provides my thoughts on the use of strategy to establish performance goals and measures that are aligned to mission. The article is one in the series I write entitled "The Business of IT."
If you are a senior IT leader, you need to make the same kinds of disciplined choices for your department that the CEO and top leadership team are making about the strategic direction of the enterprise. Here's how to develop a sophisticated, more strategically oriented information technology approach--based on six ways to create value for the enterprise, and five archetypes that resolve the tension among those six value drivers.
Shared Services Canada, IT Modernization and Emerging Market Opportunities fo...KBIZEAU
This document provides an overview and analysis of the impacts of the Canadian government's IT modernization initiative on small and medium enterprises (SMEs) in the IT field. It finds that SMEs will need to adapt their business models to succeed within the new procurement framework established by Shared Services Canada, which now manages IT infrastructure for 43 government departments. The government is committed to assisting SMEs through resources and programs, but SMEs will need to proactively seek opportunities and understand emerging trends. While opportunities remain within unaffected departments and external organizations, SMEs are encouraged to diversify their service offerings and client base to adjust to the disruption caused by the IT modernization effort.
Challenges of Technology Infrastructure Availability in EGovernance Program I...IOSR Journals
This document discusses the challenges of technology infrastructure availability for e-governance program implementations. It proposes a cloud-based solution to address some of these challenges. The key challenges identified are the complexity of setting up and managing infrastructure across different locations, ongoing system management needs due to rapid technology changes, and high costs of recruiting and retaining IT professionals. The proposed solution involves implementing a hybrid cloud model with both public and private clouds. This would provide 24/7 access to services, reduce costs by outsourcing infrastructure needs, simplify administration, enable mobile access, and ensure scalability and high performance. The cloud-based framework is presented as an effective way to overcome infrastructure challenges and efficiently deliver e-governance programs.
Crafting a Comprehensive Digital Government StrategyGovLoop
With public sector resources dwindling and demand increasing from citizens, government has little choice but to innovate and reform service delivery. Through qualitative and quantitative analysis, this report will provide a snapshot of what a digital government truly is and the path agencies can take to craft a comprehensive digital strategy.
Reinventing government for the Internet age Jerry Fishenden 2008Jerry Fishenden
A presentation given various times back in 2008 derived from earlier decks. Looks at the need for service reform rather than sticking plasters and lipstick on the pig of current service structures
Delivering stakeholder centric services: from strategy to executionIBM Rational software
Initial moves to deliver ‘e-government’ have had mixed success, and citizens have not benefited overall. A move to stakeholder-centric service delivery represents a new phase of e-government which is truly transformational, and as a result it requires deep commitment and coordination between agencies to ensure information is shared effectively. Some key capabilities are required to support stakeholder-centric service transformation: Business Process Management (BPM), supported by business analytics, and Enterprise Architecture and Business Planning. All need to be open and collaborative.
The cumulative effect of decades of IT infrastructure investment around a diverse set of technologies and processes has stifled innovation at organizations around the globe. Layer upon layer of complexity to accommodate a staggering array of applications has created hardened processes that make changes to systems difficult and cumbersome.
The document summarizes 11 key trends transforming government in 2021: 1) Accelerated digital government as COVID-19 increases digitization, 2) Seamless service delivery through personalized digital services, 3) Adaptive workplaces and location liberation due to increased remote work, 4) Generating greater public value from shared data, 5) Using data-driven decision making and anticipating future needs, 6) Building agility through iterative policies, regulations and workforce, 7) Expanding government's role in cybersecurity through collaboration, 8) Embedding inclusion and equity, 9) Strengthening public trust in government through transparency and fact-checking, 10) Inclusive design of services and programs, and 11) Sustaining trust through
In this presentation, we will discuss in depth about the importance of technology in business, what IT governance is and its impact.
To know more about Welingkar School’s Distance Learning Program and courses offered, visit:
http://www.welingkaronline.org/distance-learning/online-mba.html
The DATA Act - IT Infrastructure Guidance - CT SIG 08-2015Subhasis Datta
This document provides guidance for IT departments on facilitating changes required to meet the requirements of the Digital Accountability and Transparency Act (DATA Act). It outlines three key areas for IT infrastructure that can help enable success: 1) IT infrastructure consolidation to reduce duplication and complexity, 2) engaged data governance across all data users and stewards, and 3) virtualization to abstract away from legacy systems and expose useful data through a dynamic virtual layer. Addressing these infrastructure priorities can help simplify IT and set the stage to efficiently meet the DATA Act's objectives.
Digital Fuel- Achieving IT cost visibility-Id gresearch cio_study_1009yisbat
The document discusses the challenges organizations face in achieving visibility into their IT costs. It found that while having detailed cost visibility is important, over half of respondents were less than satisfied with their current level of visibility. The biggest challenges are a lack of an explicitly defined IT cost model and difficulties obtaining detailed cost breakdowns and mapping costs to specific services. Achieving true cost visibility requires new processes and tools to capture both direct and indirect costs associated with delivering various IT services.
In the digital-centric business environments of today, the integration of cloud computing with progressive software development stands as a key driver in reshaping IT infrastructures.
Read this Article here: https://ciente.io/blogs/cloud-computing-and-software-a-dynamic-duo-for-it-transformation/
Get some Articles here: https://ciente.io/
Follow for more Technical Tech talk: https://ciente.io/techtalk/
CHALLENGES FOR PUBLIC SECTOR ORGANISATIONS IN CLOUD ADOPTION: A CASE STUDY OF...ijmpict
This research explores critical aspects of procurement of ICT cloud services for South Australian public sector organisations with the case of South Australia Police (SAPOL) for evaluation. SAPOL as one of the state government agencies at the time is initiating this transition to the cloud environment. This exploratory research takes place when this public sector agency is doing its due diligence to ensure a successful implementation. In this study the researcher started off with surfacing the challenges in this journey for a public sector organisation before the actual journey commenced. SAPOL being a public sector organisation operates differently from private enterprises and has certain constraints and limitations that pose additional challenges for the organisation to transition towards the cloud. Interview with the CIO of the organisation responsible for the cloud migration initiative was organised. After detailed literature review, an interview questionnaire was prepared in accordance with the subject of interest. The information gathered in the interviews was recorded for detailed analysis. This paper contains a detailed report on the information analysed highlighting fourteen important challenges faced by the organisation in this cloud migration journey.
Globally, e-Government has become an effective tool for civic transformation. In the recent years, e-Government development gained significant momentum despite the financial crisis that crippled the world economy. For most of the governments, the crisis was a wakeup call to become more transparent and efficient. In addition, there is a growing demand for governments to transform from traditional agency/department centric approach to “Citizen-Centric” approach. This transformation is expected to enhance the quality of life of citizens in terms of greater convenience in availing government services. Eventually this would result in higher levels of citizen satisfaction and improved trust in government.
However, projects of such scale and complexity, faces numerous roadblocks which eventually hamper its potential to deliver the intended benefits to the citizens. The success of these programmes calls for strategic direction, policy making and greater coordination among multiple agencies, following a uniform approach in achieving the vision. This necessitates a strategic framework comprehensive enough to visualize and enable the leaders in addressing the potential roadblocks or resistance. This report presents the outcome of a research to define a strategic framework that models the opposing and propelling forces dormant during a project time. This would help the strategic decision makers to visualize each project as a whole and take quick decisions in the areas that need additional thrust, to ensure that the initiatives achieve the envisaged goals.
This document is an image file without any text content. Therefore, I am unable to provide a meaningful summary in 3 sentences or less based on the information given. The document appears to be an image but I cannot determine the subject or essential details of the image from the file itself.
The document discusses five common workplace legal pitfalls and provides strategies to avoid them. It addresses issues related to employee classification, health and safety litigation, equal employment opportunity laws, social media use, and limiting supervisor liability. For each pitfall, it provides tips such as carefully auditing employee classifications, establishing clear expectations and accountability, asking consistency questions during EEO investigations, defining appropriate social media use policies, and conducting harassment training for supervisors.
This document provides information about a two-day conference on applying Lean Six Sigma methodology to improve IT processes and drive business results. The conference will provide an overview of Lean Six Sigma and the DMAIC process, techniques for selecting and managing Six Sigma projects in IT, and case studies on implementing Six Sigma in IT departments. Sessions will also address change management, integrating Six Sigma with ITIL, and migrating from waterfall to lean development models. Attendees can earn up to 18 CPE credits. The conference will be held in Arlington, VA on September 29-30, 2010.
The document discusses a Lean Six Sigma conference for IT professionals to be held from September 27-30, 2010. The conference will provide 18 CPE credits and optional yellow belt certification. Attendees will learn how to apply Lean Six Sigma methodology to improve IT processes and drive business results. They will gain tools to continuously improve work through problem solving. The yellow belt track on September 27-28 will cover Lean Six Sigma concepts and techniques to define, measure, analyze, improve and control processes.
This 3-day course provides comprehensive exam preparation for the Project Management Professional (PMP)® certification exam. Participants will learn the essential terminology, tools, and techniques to navigate the five process groups and nine knowledge areas of the PMBOK® Guide. The course covers key topics like scope, time, cost, quality and risk management, and communication skills. Participants receive a complimentary copy of the PMBOK® Guide and take practice questions and a full-length mock exam to prepare for the real PMP® exam.
The document discusses a Lean Six Sigma conference for IT professionals to be held from September 27-30, 2010. The conference will provide 18 CPE credits and optional yellow belt certification. Attendees will learn how to apply Lean Six Sigma methodology to improve IT processes and drive business results. They will gain tools to continuously improve work through problem solving. The yellow belt track on September 27-28 will cover Lean Six Sigma concepts and techniques to define, measure, analyze, improve and control processes.
This document provides information about a two-day conference on applying Lean Six Sigma methodology to improve IT processes and functions. The conference will provide an overview of Lean Six Sigma and the DMAIC process, discuss specific case studies, and offer a pre-conference certification option. Sessions will address topics such as change management, process transformation, and integrating Six Sigma with other frameworks like ITIL. Attendees will learn techniques for enhancing the quality, efficiency and results of their IT operations through Lean Six Sigma.
This document provides information about a 3-day training course on preparing for the Project Management Professional (PMP) certification exam. The course will cover the key concepts and processes needed to understand the PMP exam, provide sample questions and a practice exam, and help attendees create a personalized study plan. It will be held in Arlington, VA in October 2010. Attendees will learn about the latest PMBOK guide, tips for passing the exam, and how to apply and prepare to take the PMP exam.
This document provides an agenda for a three-day training on implementing a balanced scorecard for government. The training will cover developing a strategy map, identifying key performance measures, building balanced scorecards, setting targets, and creating strategic initiative maps. Attendees will learn best practices for rolling out a balanced scorecard and creating a strategy-focused organization through presentations, exercises and case studies.
This 3-day training event provides government employees with the skills to implement a balanced scorecard performance management system. Attendees will learn how to create strategy maps, develop performance measures, link individual performance plans, and build organizational strategies. The training will cover building scorecards, setting targets, prioritizing initiatives, and communicating results. Attendees can earn 18 continuing education credits, and the training is offered at the Performance Institute in Arlington, VA from October 18-20, 2010.
The document announces an environmental performance summit to be held from June 28-30, 2010 in Arlington, VA. The summit will focus on measuring and improving environmental performance in government through workshops on developing quality performance measures, performance-based budgeting, and selecting the right performance measures for environmental programs. Featured speakers will discuss renewable energy contributions to environmental sustainability and innovations for utilizing performance measures. Attendees include environmental managers, specialists, researchers, and sustainability coordinators.
The document describes a Lean Six Sigma Yellow Belt certification course that will teach participants to apply Six Sigma tools and the DMAIC process to solve organizational challenges and improve processes. The 2-day course will cover Six Sigma concepts and methods, process mapping, project management, and tools for defining problems, measuring performance, analyzing causes of defects, improving processes, and controlling gains. Attendees will learn techniques to support continuous improvement through team problem solving and complete a work-related project.
The document announces an upcoming training event on auditing and evaluating government program performance held from September 27-30, 2010 in Arlington, VA. The event features two interactive courses on performance auditing and program evaluation. Performance auditing focuses on achieving maximum impact through relevant program measures and improving program objectives. Program evaluation teaches how to determine if a program is accomplishing its intended outcomes and how to build an evaluation system. Attendees will learn how to use performance information to drive decision making and capture accurate data to prove government programs are achieving their goals.
The document announces an upcoming training event on auditing and evaluating government program performance held from September 27-30, 2010 in Arlington, VA. The event features two interactive courses on performance auditing and program evaluation, with the goal of helping participants use performance information to drive decision making and prove that government programs are achieving intended outcomes. The performance auditing course will cover creating successful auditing strategies, developing relevant program measures, and learning how to improve program objectives. The program evaluation course will teach how to determine if a program is accomplishing its goals and how to build an evaluation system within an organization.
The document describes two interactive courses on performance auditing and program evaluation taking place from September 27-30, 2010 in Arlington, VA. The performance auditing course will focus on creating strategies to improve performance auditing and developing relevant program measures. The program evaluation course will teach how to determine if a program is achieving its intended outcomes and how to build an evaluation system. The courses will provide techniques for using performance data to drive decision making, assessing risks and vulnerabilities, developing audit objectives, and selecting appropriate data collection and analysis methods. Attendees include government auditors, inspectors general, program managers, and other professionals.
The document discusses a Lean Six Sigma conference for IT professionals to be held from September 27-30, 2010. The conference will provide 18 CPE credits and optional yellow belt certification. Attendees will learn how to apply Lean Six Sigma methodology to improve IT processes and drive business results. They will gain tools to continuously improve work through problem solving. The yellow belt track on September 27-28 will cover Lean Six Sigma concepts and techniques to define, measure, analyze, improve and control processes.
This document provides information about a two-day conference on applying Lean Six Sigma methodology to improve IT processes and functions. The conference will provide an overview of Lean Six Sigma and the DMAIC process, discuss specific case studies, and offer a pre-conference certification option. Sessions will address topics such as change management, process transformation, innovation, and combining Six Sigma with the ITIL framework. Attendees include IT professionals seeking to enhance quality, efficiency and results. CPE credits are offered.
This document provides an agenda and information for the "Budgeting and Forecasting Conference 2010" event being held from September 13-15, 2010 in San Diego, CA. The agenda outlines keynote speeches and sessions on each day that will discuss implementing tools for budgeting and forecasting, utilizing balanced scorecard techniques, developing rolling forecasts, and identifying key business drivers to improve forecasts. A post-conference workshop on September 15th will focus on modeling and forecasting key business drivers. The document provides information on registration, CPE credits, hotel accommodations, and pricing for the conference and workshop.
The document provides information about a conference on implementing balanced scorecards effectively that will take place from August 23-25, 2010 in Washington DC. The conference will include workshops on the first day covering balanced scorecard fundamentals and using business intelligence to enable strategy-aligned scorecards. Day two will focus on developing key measures and cascading scorecards throughout an organization. Speakers will provide guidance on topics such as change management, strategy mapping, monitoring performance, and motivating employees. Attendees include CEOs, CFOs, and other executives seeking to transform strategy into action using balanced scorecards.
This document provides information about a 5-day training seminar on project management titled "Project Management for Results". The seminar will be held from October 4-8, 2010 in Arlington, VA and offers 35 PDUs and 30 CPE credits. Over the 5 days, participants will learn about project initiation, planning, execution, closing, tracking projects, using earned value management tools, understanding the project life cycle, developing estimates and schedules, and more. The seminar is aimed at project managers, program managers, procurement managers, IT specialists, and others involved in project management. Attending the seminar will help professionals bring projects from initiation to execution, develop performance measurements, understand factors for improving troubled projects, and prepare
1. Federal IT in 2010
and Beyond:
An online series to solve pressing IT challenges and plan for the future
During this online webinar series you will learn how to:
• DISCOVER a variety of approaches that will help you • DISCOVER the virtualization fundamentals and how to begin
shape your government 2.0 strategies implementing these changes within your agency today
• UNDERSTAND the promise and practice of wiki infused • DISCUSS configuration management, network monitoring and
innovation into the business of delivering services various best practices to protect computer networks and systems
• LEVERAGE growing citizen influence to help shape • REVIEW the upcoming challenges to the new Federal IT
agency strategies workforce can expect to face in the future
• LEARN to combat the possible security and privacy risks • DISCOVER various methods to improve managing the
cloud computing and open government presents acquisition process
www.PerformanceInstitute.org/FedIT
2. SIGN UP FOR THIS WEBINAR SERIES TODAY
TO BECOME BETTER EQUIPPED TO TAKE ON
THE IT CHALLENGES OF 2010.
Federal IT in 2010 and Beyond
Advancing government IT to improve the delivery of services to taxpayers
and improve agency collaboration is a high priority of this Administration.
With the federal IT community receiving the one of the biggest budgets
in history this year, the technology and resources are there and available
for agencies to utilize. During this webinar series we will not only discuss
how IT can be used to increase transparency and accountability within
your agency, but also review the Open Government Plan, the National
Cyber Security Initiative, cloud computing, federal IT acquisition practices
and the challenges the new federal IT workforce can expect to face in this
new technology focused era in government.
3. Federal IT Webinar Schedule
SESSION ONE SESSION TWO
Thursday, May 13, 2010 Thursday, May 27, 2010
Federal Cloud Computing Federal IT Acquisition Practices and
Interest in cloud computing has increased among
What Needs to Change:
government agencies that see it as a way to With the current state of the Department of Defense
cut costs, increasing storage and allow for IT acquisitions system deemed unacceptable from a
department to shift focus no longer having to on panel focused on Defense Acquisition Reform,
worry about constant server updates and other much needs to be examined if we are to enhance
computing issues. This would allow for governmental this process. DOD’s mishandling of acquisitions
organizations to be free to concentrate on and procurement fails to fulfill the military’s current
innovation and process improvement. This new mission needs and therefore must be corrected,
innovative style of computing in which the ability improved and upgraded. Federal IT acquisition
to offer virtualized resources online and over the practices in general need to adapt and keep up with
internet to the public and/or other agencies has the pace of the substantially changing acquisition
become more than a trend and is picking up speed process of today’s modern world and we can begin
within the federal arena. Cloud computing also making those changes today. This webinar will help
allows the federal government to make a variety you understand the potential rewards of altering
of their services and documentation available the current acquisition process and how to begin
online and to the public at as much faster pace. If implementing them in your office today.
successfully implemented, this would improve the
government’s ability to create a transparent, open • Discover various methods to improve managing
and participatory government. This webinar will help the acquisition process
you understand the rewards of this new method and
• Develop and incentivize the highest quality
how to begin implementing it in your office today.
workforce possible
• Continue the migration towards a services-based • Maximize the industrial base by improving
environment through Cloud Computing contracting and competitive practices
• Enable rapid deployment of technology
solutions within your agency to improve your
ability to create a transparent, open and
participatory government
• Increase savings through virtualization by reducing
the cost of infrastructure, building and power
CIOs / CFOs / CTOs IT Analyst IT Supervisor
WHO Managers of IT IT Directors Group IT Managers
Chief Project Officer IT Project Managers Resource Managers
SHOULD Chief of IT IT Division Chief Program Managers
IT Leaders IT Deputy Manager PMO Managers
ATTEND: IT Architect IT Specialist PMO Directors
4. Federal IT Webinar Schedule
SESSION THREE SESSION FOUR
Thursday, June 10, 2010 Thursday, June 24, 2010
The Challenges of the New Federal The Challenges of Cyber Security
IT Workforce in an Open and within an Open Government
Transparent Government
Government organizations face ongoing pressure
to improve security to reduce risk and comply with
With the large amount of the Federal budget being put
regulatory mandates. The appointment of a cyber
in the IT arena, new IT workers are being hired at a
coordinator will surely drive a federal strategy in a
rapid pace. With this new workforce also come new
new direction and we must be ready for that. Under
challenges and an ever changing IT environment. With
this administration, federal agencies are clearly
the focus switching to a more open and transparent
seeking new ways to integrate risk, compliance and
government the old protocols for how things get done
security to reduce both cost and complexity while
are being rewritten. Today’s managers in IT are
maintaining strong, secure uninterrupted access
accountable not only for using technology to enable
to government resources and applications. New
government processes but also for helping shape the
important topics such as, configuration management,
strategic direction of their organizations and improving
network monitoring and various other best practices
results to the taxpayer. Improving civilian transparency
to protect computer networks and systems will be key
is a main objective of the administration because
in successfully moving forward. During this webinar
greater access to government information benefits the
you will learn about the dangerous security and
country by sustaining an informed citizenry, aiding
privacy risks that surround the use of cutting edge
government decision makers and supporting the
technology and discover how the new administration
economy. During this webinar you will examine the role
aims to strengthen federal leadership on cyber
of government IT managers and discuss a variety of
security.
ways you can improve citizen transparency and create
an open and transparent government.
• Review the important aspects of The National
Cyber Security Initiative which is broadly defined
• Discuss the two main objectives of the Open
Government Plan • Examine the technical standards that need to be
put in place to protect the national infrastructure
• Discover the specific skill sets needed to succeed
in this new setting and in order to become an • Do to the increasing exposure to cyber attacks
effective leader given this new form of open government, discover
how to best go about taking the right steps to
• Guide your employees to implement and use
secure our nations networks
technologies to publish government information online
in accordance with the Open Government Directive
For more information on group discounts for Federal IT Webinar Series contact
Melvin Hall at 202-739-9630 or email him at Melvin.Hall@PerformanceInstitute.org
5. Logistics & Registration Form
FEDERAL IT IN 2010 AND BEYOND WEBINAR SERIES
• Each session in the Federal IT Webinar Series begins at 1PM EST and lasts for a duration of 90 minutes.
• Webinar registrations are accepted up to 1 day before the start time of each webinar. Each registration is valid for one logon
and one phone line only. Attendees can access the webinar anywhere an Internet connection and phone lines are available.
4-Part Webinar Series $399 Single Session $150
TO REGISTER:
CALL FAX this form to VISIT
877-992-9521 866-234-0680 www.PerformanceInstitute.org/FedIT
Registration Form
Yes! Please register me for the entire Federal IT Webinar Series 2010
Register me for a single webinar: Session 1 Session 2 Session 3 Session 4
Attendee Information
Name Title
Organization Dept.
Address
City State Zip
Telephone Fax
Email
Payment Information
Check Purchase Order/Training Form Credit Card
Credit Card Number Expiration Date Verification no.
Name on Card
Billing Address
Please make checks payable to: The Performance Institute
ACKNOWLEDGED AND AGREED
By: ______________________________________________________________________________________________ Date: _______________________________________
6. About the
Performance Institute
Called “the leading think tank in performance measurement
for government” on OMB’s ExpectMore.gov, The Performance
Institute has been a leader in Performance Management
training and policy since the 2000 administration transition.
As part of the Government Performance Coalition, a group of
good government organizations, the Institute worked in 2000
to deliver recommendations to the then new administration on
what would become the President’s Management Agenda.
In 2009, the Institute is leading Innovations in Government:
From Transition to Transformation, or InnoGOV.org, a collection
of forums, research and recommendations to bring insight
and transformation to the federal government. The goal of
InnoGOV.org is to centralize the importance of performance,
accountability and transparency in government and to
disseminate the leading best practices to government managers.
The Performance Institute has published several research
reports regarding performance management initiatives
and trains over 10,000 government managers per year on
performance-based topics. Dedicated to improving citizen The Performance Institute
805 15th Street, NW, 3rd Floor
services and taxpayer transparency, the Institute uses a best-
Washington, DC 20005
practices foundation to deliver the most effective and tested Ph: 877-992-9521 Fax: 866-234-0680
methodologies for improving performance. www.PerformanceInstitute.org