Linux in Government: CORE.GOV
One never can know enough about government and technology. So much fragmentation exists within the playing field that even if you win a significant contract with one department, you cannot expect it to fly through an entire agency. Another demoralizing facet to working with government is vendor pressures exerted by proxy by agency heads.
In a recent article, I wrote about the Emergency Response Network System and how it has worked for over three years in the Department of Homeland Security. Currently, this LAMP program has cost the government approximately 10% of what a comparably componentized proprietary system would have cost. It also works.
Yet, elements within DHS have attempted to push Microsoft into the process. Although the special interest groups have yet to succeed, they have not given up. Microsoft has proceeded, from the outside, to create a .Net solution that the company hopes can convince DHS is a better solution.
Microsoft also has rolled out its Regional Automated Information Network (RAIN) in King County, Washington. In case you don't know, both Seattle and Redmond are located within King County. Additionally, King County has circulated a request for information (RFI) to have vendors perform tests to prove Linux and other open-source software can out-perform Microsoft. The vendors must perform these tests by setting up labs at their own expense. Do you wonder if King County then will rule out open source because no one responded to its request?
When the US Government creates a software application, it becomes part of the public domain. In reality, however, few such programs ever see the light of day. In spite of Office of Management and Budget (OMB) Memorandum M-04-08, which stresses avoiding duplication of agency activities, few agencies release or even announce their software developments.
On July 1, 2004, Karen S. Evans and Robert A. Burton of OMB issued M-04-16, reminding agencies of regulations related to the acquisition of software. Keep in mind, this memo came from the Administrator, IT and E-Gov and the Associate Administrator, Office of Federal Procurement Policy, and it went to all senior executives and chief information officers within the federal government. Furthermore, as part of the following documentation indicates, OMB circulars also apply to state and local government units receiving federal financial assistance:
This memorandum reminds agencies of policies and procedures covering acquisition of software to support agency operations. The Office of Management and Budget (OMB) Circulars A-11 and A-130 and the Federal Acquisition Regulation (FAR) guide agency information technology (IT) investment decisions. These policies are intentionally technology and vendor neutral, and to the maximum extent practicable, agency implementation should be similarly neutral. As this guidance states, all agency IT investment decisions, including software, must be made consistent with the agency's enterprise architecture and the Federal Enterprise Architecture. Additionally, agencies must consider the total cost of ownership including lifecycle maintenance costs, the costs associated with risk issues, including security and privacy of data, and the costs of ensuring security of the IT system itself. Furthermore, software acquisitions must comply with OMB Memorandum M-04-08, Maximizing Use of SmartBuy and Avoiding Duplication of Agency Activities with the President's 24 E-Gov Initiatives [pdf] (February 25, 2004), and where required, be coordinated with the SmartBuy program.
This reminder applies to acquisitions of all software, whether it is proprietary or open-source software.
Founded in March of 2004, CORE.GOV resides on CollabNet and uses the SourceCast tool to, according to the site, "Integrate applications for software development, knowledge management and project communication. Control access through a Web-based project workspace with a centralized, role-based permissions model. Enables secure and cost-effective development across multiple agencies."
CORE.GOV stands for component organization and registration environment. It gives government agencies a place to put technology on-line for sharing. It also provides a software map so people can search for shared software that meets an agency's needs or to find code fragments and libraries for agencies to meet development requirements. Agencies, state and local governments can participate and recommend components for inclusion in the CORE.GOV repository. Vendors, however, aren't allowed.
The CORE.GOV Web site states that "CORE.GOV grew out of the Federal Enterprise Architecture (FEA) Project Management Office, the goal of which is to support cross-agency collaboration, transformation and government-wide improvement. CORE.GOV offers an environment where such collaboration takes place seamlessly and easily." Members of CORE.GOV include the Air Force, Navy and NOAA; the US Dept. of State; NASA; the US Dept. of Defense; and numerous state and local government units. On its Index of Mature Components, which is quite large, the administrators state:
Over time, CORE.GOV will become a networked community of component developers and re-users, and will offer numerous components of various types and complexities, including business components, e-forms and technical components. Using the CollabNet SourceCast tool, CORE.GOV's robust collaborative environment can organize and map components in a variety of ways to make them easy to identify, discuss and develop.
Please check this index in the coming weeks and months for the latest information regarding components and component projects.
If you are interested in a component or project listed here and would like to learn know more about it or join a project, please e-mail the contact person listed.
One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems
Join editor Bill Childers and Bit9's Paul Riegle on April 27 at 12pm Central to learn how to keep your Linux systems secure.
Free to Linux Journal readers.Register Now!
|diff -u: What's New in Kernel Development||Aug 20, 2014|
|Security Hardening with Ansible||Aug 18, 2014|
|Monitoring Android Traffic with Wireshark||Aug 14, 2014|
|IndieBox: for Gamers Who Miss Boxes!||Aug 13, 2014|
|Non-Linux FOSS: a Virtualized Cisco Infrastructure?||Aug 11, 2014|
|Linux Security Threats on the Rise||Aug 08, 2014|
- diff -u: What's New in Kernel Development
- Security Hardening with Ansible
- Tech Tip: Really Simple HTTP Server with Python
- NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance
- Monitoring Android Traffic with Wireshark
- RSS Feeds
- [<Megashare>] Watch Mrs Brown's Boys Movie Online Full Movie HD 2014
- Lock-Free Multi-Producer Multi-Consumer Queue on Ring Buffer
- Linux Security Threats on the Rise
- Examining Load Average