GSA / modernization

Report to the President on IT Modernization
https://itmodernization.cio.gov
59 stars 12 forks source link

Modernization report comments #14

Open craigschneider opened 6 years ago

craigschneider commented 6 years ago

Respectfully submitted by Excella Consulting.

1. What are major attributes that are missing from the targeted vision? a. The report promotes the use of agile development practices as key strategy for modernizing government software applications. Agile development should absolutely be used by the Federal government to build and maintain government software solutions, but procurement rules and regulations make this a difficult sell for many agencies. Procurement officials routinely demand defined requirements and measurable deliverables when soliciting for bids for software development, but agile software delivery is defined by identifying the business problem and desired outcome and adjusting requirements through learning and discovery. To promote agile procurement, increased usage of the 8(a) Program Digital Service Initiative is a great start. We also encourage the administration to fully utilize the Joint Venture Partner program at the National Technical Information Service (NTIS). Does the administration plan to adapt procurement policies to simplify the solicitation for and execution of software delivery contracts that comports to the needs of and agile software delivery model?
b. The report references the term “legacy systems” but doesn’t define the term. Do you intend to define what is considered a “legacy system” in this report or is this simply a placeholder for older agency systems whose meaning can be defined by agency policy? c. Many agencies and their technology decision-makers like the idea of moving software to the commercial cloud, but the rules, policies, and ramifications surrounding these decisions are not always easy to negotiate as noted in the report. Difficult leadership decisions nearly always default to inertia and prevent the desired outcomes this strategy seeks. Technology leaders need clearer definitions about what types of applications can be moved to the commercial cloud, what types of public and private data can be stored in the commercial cloud, and what needs to be done to certify the security of these cloud solutions would make these decisions much easier for system owners. Is there anything more the administration can do to make these decisions simpler and more clear cut for agency decision makers?

4. Are there any missing or extraneous tasks in the plan for implementing shared services to enable future network architectures? The authors of this report are spot on in their desire to push the adoption of shared services, where possible, across the federal government to achieve positive outcomes included in the report. Shared service solutions, especially those built by and for government, are much more adaptable to changing legal and policy requirements and can more effectively adapt to the changing unique needs of the Federal workforce. As noted in the report, the use of shared services has long been a strategy of the Executive branch, but adoption has not come as fast or as easy as desired. Does the administration have any plans to address the issues noted below to improve execution and adoption of existing shared service solutions?

johnaweiler commented 6 years ago

Craig makes some great points. However, we need to distinguish between "make biased" agile development and "buy/adopt biased" agile acquisition. The federal govt is the worlds largest BUYER of IT capabilities, but the worst performing sector. As it is not a major IT manufacturer (Google, IBM, Oracle, MS), it should follow commercial practices of other large consumers like Finance, Telecom, Healthcare, etc. Agile Acquisition is a relatively new approach that improves IT management and sourcing by framework three key elements of the IT SDLC; business/mission value, lifecycle cost and most importantly, RISK. There are many dimensions of risk; execution, quality, performance, and cyber vulnerabilities in code. Free Open Source S/W has the greatest risk if it is not commercial grade.