Twitter Facebook Google RSS
 
National Defense > Blog > Posts > New Year Could Bring Change for Government IT Industry
New Year Could Bring Change for Government IT Industry
By Sandra I. Erwin



The U.S. military and intelligence communities could soon begin to make massive investments in cloud computing and cybersecurity. Coupled with these developments are new federal procurement rules that could wreak havoc on small businesses.

The 2013 landscape is shaping up to be a mix of good and bad news for the IT industry, analysts said. There will be new business opportunities in the $80 billion federal IT market. But shifting government needs and revisions to procurement policies could shake up the industry, and create new haves and have-nots.

The Pentagon, which spends the preponderance of government IT dollars — about $37 billion a year — is studying ways to overhaul the way it buys information systems. The Defense Department by law must develop a new procurement plan for IT acquisitions. The 2010 National Defense Authorization Act mandated the change following a string of failed IT procurements. The debate is whether the Pentagon should buy IT under the same arcane rules that govern the procurement of weapons. As a result, it can take up to five years to acquire a system that, over that period, becomes technologically obsolete.

Reforms, however, have been slow and difficult, industry insiders said. “The current IT delivery process hinders our ability to take advantage of new commercial technology,” said a Pentagon report. Other problems that plague defense IT systems are limited interoperability and cybersecurity vulnerabilities.

A senior defense official who spoke recently to an industry audience said the Pentagon is considering a simplified process for IT acquisitions, but it could take months for different fiefdoms within the building to come to an agreement before a final proposal is sent to Congress. The Defense Department is under pressure to turn IT acquisitions around, particularly in the wake of the cancellation last month of the Air Force Expeditionary Combat Support System. After seven years and more than a billion dollars sunk into its development, the Pentagon decided to terminate the program when it became clear it would never achieve its intended goals. Industry consultant Ron Giuntini said the ECSS is one of the worst cases of wasteful spending he has seen in enterprise software procurements.

Other reforms could affect contractors that provide IT systems and services to any federal agency. A Dec. 5 memo by Jeffrey D. Zients, deputy director of the Office of Management and Budget, asked procurement managers to make purchasing more efficient via “strategic sourcing.” That would require each agency to reduce the number of IT programs and suppliers in order to save money across the federal government. The goal is to “maximize the return on IT investments by consolidating the acquisition and management of commodity IT goods and services and increasing the use of shared-service delivery models,” the memo said.

Analysts predict this policy could be detrimental to small businesses that do not get selected to participate. Industry groups and small business advocates plan to push back over the coming months. A group of federal contractors and lawmakers have called for a more level-playing field between large and small firms that are competing in the federal IT market. One proposal is to standardize the definition of a small business to one employing less than 1,500 workers. Small business groups contend that current policies that seek to simplify contracting, gain efficiencies, reduce costs, and consolidate IT services favor large contractors.

Meanwhile, 2013 also could see a shift in the products and services that agencies buy, says Mark Cohn, chief technology officer of Unisys Federal Systems.

Federal IT systems integrators increasingly will become “cloud brokers,” said Cohn. Agencies quickly are moving applications and data to the cloud. But commercial cloud providers don’t appear to satisfy government needs, Cohn said. Issues such as liability, service agreement and security have become bones of contention in the cloud computing business. “Commercial models don’t work well for federal agencies,” he said. Many IT firms will be jumping into cloud brokerage work. They will serve as intermediaries between commercial cloud providers and government agencies. “It’s a model that will be growing,” said Cohn. “You are not going to see the government going directly to Google or Amazon so much.”

Another wild card in the IT industry is cybersecurity. Companies had expected that spending would have soared over the past several years, but the government has taken longer than planned in developing a cybersecurity strategy. The Pentagon, with a cybersecurity budget last year of $3.4 billion, is the 800-pound gorilla. Defense and intelligence officials have hinted there will major new investments in “private clouds” that could lead to big-money opportunities for industry.

“There is no question the intelligence community has plans to implement commercial cloud technology in a privately managed facility,” Cohn said. “This is to get the performance advantage of virtualization but without running risk that data will be compromised.”

Civilian agencies would not be likely candidates for private clouds because of their high cost, he said. “There aren’t very many customers that can afford this.”

Another potential industry bonanza in 2013 could be mobile devices. “There will be a convergence of desktop and mobile devices,” he said. “Phones will be increasingly used to do things previously done on PCs, and new software for PCs will allow them to act more like phones.” Pentagon contractors eye new opportunities here because the military looks at wireless and mobility differently than civilians. Deployed military personnel, particularly, will seek “controlled platforms with limited configurations that may even have non-commercial wireless capabilities,” said Cohn. “It remains to be seen what spectrum will be used and how the military will deploy its tactical wireless networks.”

Photo Credit: iStockphoto

Comments

There are no comments yet for this post.
Items on this list require content approval. Your submission will not appear in public views until approved by someone with proper rights. More information on content approval.

Name: *

eMail *

Comment *

Title

Attachments

Name: *


eMail *


Comment *


 

Refresh
Please enter the text displayed in the image.
The picture contains 6 characters.

Characters *

  

Legal Notice *

NDIA is not responsible for screening, policing, editing, or monitoring your or another user's postings and encourages all of its users to use reasonable discretion and caution in evaluating or reviewing any posting. Moreover, and except as provided below with respect to NDIA's right and ability to delete or remove a posting (or any part thereof), NDIA does not endorse, oppose, or edit any opinion or information provided by you or another user and does not make any representation with respect to, nor does it endorse the accuracy, completeness, timeliness, or reliability of any advice, opinion, statement, or other material displayed, uploaded, or distributed by you or any other user. Nevertheless, NDIA reserves the right to delete or take other action with respect to postings (or parts thereof) that NDIA believes in good faith violate this Legal Notice and/or are potentially harmful or unlawful. If you violate this Legal Notice, NDIA may, in its sole discretion, delete the unacceptable content from your posting, remove or delete the posting in its entirety, issue you a warning, and/or terminate your use of the NDIA site. Moreover, it is a policy of NDIA to take appropriate actions under the Digital Millennium Copyright Act and other applicable intellectual property laws. If you become aware of postings that violate these rules regarding acceptable behavior or content, you may contact NDIA at 703.522.1820.

 

 

Bookmark and Share