Government Technology

Denver Mayor Announces Appointment of Chief Information Officer



July 13, 2007 By

Denver Mayor John Hickenlooper announced Thursday his appointment of Molly Rauzi as the Chief Information Officer for the City and County of Denver.

"Molly is solution-oriented; she knows how to solve problems quickly and effectively, and she has demonstrated an ability to operate a complicated infrastructure within budget," said Hickenlooper.  "She has always been a valued member of the team and I'm delighted to make this promotion official."

Rauzi was hired as deputy CIO by Michael Locatis in August of 2004 and has served as the acting CIO since January of this year. In her new capacity, Rauzi will be responsible for executing the city's technology strategy and ensuring operational excellence citywide using applied technology. The CIO also manages the Channel 8 Television Station, the DenverGov Web site, and the 311 Call Center Operations.

Prior to 2004, Rauzi was the CIO of Denver International Airport. Recruited to the airport's management team in 1998, Rauzi designed and implemented state of the art operating and networking systems, software applications, and database management systems software; monitored and tuned system software, peripherals and networks; and resolved all systems problems and challenges in a systematic and efficient manner, said the Mayor's Office in a release. Rauzi conducted systematic reviews of all internal functions, software, and hardware. Her responsibilities included designing new solutions to harness more of the computers' power, reengineering the infrastructure to fit the specific needs of the airport, providing assistance and advice to system users, and overseeing project management timelines.

Rauzi has a strong technical background in software development, network engineering and design, IT operations, and strategic planning. She has applied her skills in business analysis and process improvement to bring strong planning and design disciplines to add value to the technology implementation projects she has overseen. Previous experience includes positions with the Cherry Creek School District, Litton PRC, and MCI Telecommunications.

Rauzi has a B.A. from Regis University and a Master of Systems Management from the University of Denver.


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
Best Practice Guide for Cloud and As-A-Service Procurements
While technology service options for government continue to evolve, procurement processes and policies have remained firmly rooted in practices that are no longer effective. This guide, built upon the collaborative work of state and local government and industry executives, outlines and explains the changes needed for more flexible and agile procurement processes.
Fresh Ideas In Online Security for Public Safety Organizations
Lesley Carhart, Senior Information Security Specialist at Motorola Solutions, knows that online and computer security are more challenging than ever. Personal smartphones, removable devices like USB storage drives, and social media have a significant impact on security. In “Fresh Ideas in Online Security for Public Safely Organizations,” Lesley provides recommendations to improve your online security against threats from social networks, removable devices, weak passwords and digital photos.
View All

Featured Papers