Government Technology

Five Things to Remember About 2009


November 24, 2009 By

The first decade of the 21st century is going out the way it came in -- with bubbles bursting: dot-com at the beginning and housing (and a tangled web of global financial shenanigans) at the end. Technically speaking, 2009 isn't the end of the decade, but for many households, businesses and public agencies -- it felt like the end of the world.

This page has long invoked the credo attributed to Father Guido Sarducci's Five Minute University (of vintage Saturday Night Live fame), which condenses a world of knowledge into the five things you'll remember in five years. Our year-end tradition continues.

1. The Public Record Is Alive

Our idea of public records (and the laws that prescribe the conditions of their disclosure) assumed a document in a filing cabinet in a physical location. The Internet took the physicality out of the equation, but we hung on to the notion of the record as static. No more, and everything from Apps for America/Democracy, NYC BigApps and Data.gov is just prolog. They provide the new platform on which governments will meet their obligation to interpret, contextualize and make data understandable to the public. But that game has been democratized.

2. The Rise of the Citizen Coder

If citizen journalists are bloggers on a mission, citizen coders are geeks similarly motivated to find meaning and value in government data feeds beyond what government would or could do for itself -- and in some cases, beyond what government would want done in terms of scrutiny on spending and official acts. There are the makings of tension and even conflict here, but it's our zeitgeist and the natural extension of all that citizen engagement we've been talking about.

3. The Portal Bypass

The portal is both less and more than it once was. The home page remains government's front door, and it's the standard-bearer for the growing suite of online applications that stand behind it. It's a gateway to the rapidly growing universe of mobile or smartphone apps that extend the portal's reach to the palm of the user's hand. Government home pages are being bypassed via back doors -- search, mobile apps and collaborative filtering -- in ways that make them invisible.

4. The Cloud Comes Down to Earth

The cloud will be (a) internal, (b) private, (c) public, (d) disruptive and (e) all of the above. There's fierce debate about whether it will be (a) secure, (b) cost-effective and (c) ultimately a friend or foe of the data center. It's also the newest face of consolidation of outsourcing.

5. City, County, State -- Pick Two

City/state projects have redrawn boundary lines based on how things work, not on how things grew up historically. These have whittled more than 10,000 political subdivisions to 363 regions -- each anchored by a large metropolitan area -- that account for 65 percent of the U.S. population, 74 percent of the economic output and 77 percent of good-paying knowledge jobs. It underscores the argument for shared services and regional collaboration. It may portend what consolidation looks like in the future, and has sparked debate about which level of government -- city, county or state -- is the most redundant and should be voted off the political map.

 


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
Best Practice Guide for Cloud and As-A-Service Procurements
While technology service options for government continue to evolve, procurement processes and policies have remained firmly rooted in practices that are no longer effective. This guide, built upon the collaborative work of state and local government and industry executives, outlines and explains the changes needed for more flexible and agile procurement processes.
Fresh Ideas In Online Security for Public Safety Organizations
Lesley Carhart, Senior Information Security Specialist at Motorola Solutions, knows that online and computer security are more challenging than ever. Personal smartphones, removable devices like USB storage drives, and social media have a significant impact on security. In “Fresh Ideas in Online Security for Public Safely Organizations,” Lesley provides recommendations to improve your online security against threats from social networks, removable devices, weak passwords and digital photos.
View All

Featured Papers