Government Technology

Bringing Innovation to Procurement

Former federal CTO Aneesh Chopra
Former federal CTO Aneesh Chopra says public purchasing should welcome entrepreneurial ideas.

March 4, 2014 By

When a mid-sized city in the northeastern United States became frustrated with its antiquated accounting processes a few years ago, officials there decided to seek a modern, technology-based solution. Hoping to capitalize on the latest accounting technology while minimizing the city’s investment in new servers and software, they opted to pursue a cloud solution.

Mindful of stringent government procurement rules, the city put together an RFP. But rather than write an RFP from scratch outlining its interest in a cloud-based solution, the city borrowed much of the text from an RFP written years before. The vendors that reviewed the RFP were confused. Here the city was saying it wanted a cloud-based solution, yet its requirements as outlined in the RFP were inconsistent with such a solution. As a result, most of the interested vendors simply did not bid.

The only company that did bid on the project recognized the problem, but assumed the situation could be fixed once the job was under way. It was wrong. The company was awarded the contract, but once its representatives sat down with city officials to begin the project, it became clear they weren’t on the same page. Unable to bridge the gap between what the city asked for in the RFP and what the company could provide, the contract eventually was canceled. Both the vendor and the city spent a great deal of money, time and effort — only to end up back at square one.  

Unfortunately this scenario is far from rare. News headlines regularly tout the latest government procurement debacles. Projects like can and do go wrong, leaving taxpayers baffled and the government agencies that awarded the contracts scrambling for an explanation. In fact, IT research firm the Standish Group found that 94 percent of large-scale federal IT projects have been unsuccessful during the last decade. Yet the United States has had rigid procurement rules and a system of checks and balances in place to prevent such scenarios for decades. Why are such failures still occurring?

One of the biggest factors preventing successful government procurements today may be the rapid evolution of technology. Purchasing in government is frequently cited as an example of a slow, inflexible and expensive bureaucratic process. But that becomes doubly true when purchasing technology.

“The alignment of technology and procurement has always had a lot of tension to it,” said Dugan Petty, former Oregon CIO and procurement director who now serves as a senior fellow for e.Republic’s Center for Digital Government. “Often, it’s about whether the jurisdiction has met the procurement laws first, and perhaps secondly whether or not they actually achieved the outcomes they were looking for.”

There is no quick and easy solution to government’s procurement struggles. But years of shrinking budgets recently have prompted many organizations to devote more energy to improving the process. The good news is, while procurement reform is a long-standing issue for all levels of government, cities and counties may be in a unique position to lead the evolution.

“Because local governments are more streamlined, it’s often easier for them to make decisions and to move on an innovative path than it is for states or the federal government,” said John Miri, who previously served as director of e-government and Web services for Texas. “Today, local governments are in a great position to help drive reform and encourage more procurement innovation.”

Arcane Processes versus Modern-Day Realities

The modern procurement process was born out of the civil service movement that reformed government contracting and hiring processes during the transition from the 19th to the 20th century. The goal of the procedure was to help ensure accountability and transparency in how government awarded contracts. The process had three main objectives: to prevent corruption and therefore protect taxpayers from fraud and abuse; to standardize processes in order to allow government to take advantage of scale and efficiency; and to ensure equality and prevent discrimination against certain groups like minority business owners.  

These traditional procurement policies, many of which are still in play today, serve legitimate purposes. They ensure the procurement process remains open to the public and makes government officials accountable for their purchasing decisions. A built-in appeal and protest process serves as a check-and-balance in case the procedures aren’t carried out effectively the first time.

6 Ways to Shake Up Procurement

1. Join a Group

Pooling resources, adopting standard purchasing specs and issuing cooperative bids using tools like cooperative purchasing agreements and master contracts help drive down costs and improve results.

2. Try Before You Buy

View Full Story
| More


Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
McAfee Enterprise Security Manager and Threat Intelligence Exchange
As a part of the Intel® Security product offering, McAfee® Enterprise Security Manager and McAfee Threat Intelligence Exchange work together to provide organizations with exactly what they need to fight advanced threats. You get the situational awareness, actionable intelligence, and instantaneous speed to immediately identify, respond to, and proactively neutralize threats in just milliseconds.
Better security. Better government.
Powering security at all levels of government with simpler, more connected IT.
Cybersecurity in an "All-IP World" Are You Prepared?
In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-IP world. Read how your cybersecurity strategies and attitudes compare with your peers.
View All

Featured Papers