Feeds

Cabinet Office pushes suppliers on open source

Govt wants to create a 'level playing field' for OS in its ICT policy

Seven Steps to Software Security

The government's deputy chief information officer has told suppliers that it wants to open source technology to feature in its ICT strategy.

Bill McCluggage met with suppliers last week to make clear that the Cabinet Office, which leads on ICT policy, wishes to increase the deployment of open source across government.

He emphasised that the government wishes to see the industry offer more solutions based on open source, and listed a number of approaches that it expects it to follow. These include: evaluating open source solutions in all future proposals; including open standards and interoperability as key components in IT systems; and moving towards the use of open source as normal practice.

The coalition has adopted a policy included in the Conservatives' pre-election technology manifesto to "create a level playing field" for open source software in government. It believes this will make it possible to split ICT projects into smaller components and deliver substantial savings.

There have also been reports of the development of a new model, to be used as part of the procurement process, for assessing the use of open source in government systems.

At the end of January, the Cabinet Office published a procurement policy note on using open standards in specifying IT requirements. It said that government assets should be interoperable and open for re-use in order to maximise return on investment, avoid technological lock-in, reduce operational risk in ICT projects and provide responsive services.

This requires the inclusion of open standards in ICT procurement specifications, although the paper says this can be waived if "there are clear business reasons why this is inappropriate".

This article was originally published at Guardian Government Computing.

Guardian Government Computing is a business division of Guardian Professional, and covers the latest news and analysis of public sector technology. For updates on public sector IT, join the Government Computing Network here.

Mobile application security vulnerability report

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.