Feeds

MPs set out on quest to find UK.gov's IT strategy

Also plan to go unicorn spotting

Remote control for virtualized desktops

The government's technology strategy is being scrutinised by the Common's Public Administration Select Committee (PASC).

The committee said it would look at how the government develops and implements its IT policy.

"The inquiry will examine the government’s overall strategy for information technology, including how it identifies business needs, the effectiveness of governance arrangements, and procurement policy and practice," it said.

Evidence sessions will kick off in the New Year, said the committee, and in the the meantime it is inviting written evidence on issues relating to the inquiry.

In effect, the committee will spotlight the government's procurement policy and behaviour. It will also consider how Whitehall determines its technology business requirements.

"Central government is notorious for large IT projects running over time, over budget and ultimately failing," said the committee.

Cabinet Office minister Francis Maude said last month that IT contracts agreed upon in Whitehall should be clearer.

"There are competitive processes, but actually the way we do procurement is often excluding smaller suppliers from the process. Very costly, very over-engineered and it isn't the open competition that we want to see that really does drive value and drives innovation," he said at the time. ®

Remote control for virtualized desktops

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.