Feeds

Cabinet Office publishes open source procurement toolkit

Using document format that was proprietary until 2008

7 Elements of Radically Simple OS Migration

The Cabinet Office has published an open source procurement toolkit for the public sector on its website.

It said the purpose is to ensure that there is a level playing field for open source and proprietary software and that some of the myths associated with open source are dispelled.

The toolkit includes six documents:

  • All About Open Source – including FAQs;
  • ICT Advice Note - Procurement of Open Source;
  • Procurement Policy Note on Open Source;
  • OSS Options; Total Cost of Ownership;
  • and CESG Guidance on Open Source (this site will only open for users who have previously registered with a .gsi.gov.uk email address).
  • The first five papers are all available on the Cabinet Office website as PDFs.

The options document contains details of different IT functions such as servers, databases, application development, networks and business applications.

The document on cost of ownership advises taking into account issues around acquisition – such as purchase price, licences and integration – operation and management – including migration, upgrades, support services, training and software scaling – and end of life management.

It also advises that the total cost of ownership is only concerned with the financial cost of any solution, and does not involve any other benefits.

The government has had an open source policy dating back to the Labour administration in 2004, although it was reiterated in 2009 and 2010. Before coming to government, the Conservative party called for an increased use of open source technology in government IT systems.

The Government ICT Strategy, published in March, says that open source solutions should be considered alongside proprietary ones in procurement, and that when there is no significant cost difference open source should be chosen on the basis of its flexibility.

This article was originally published at Guardian Government Computing.

Guardian Government Computing is a business division of Guardian Professional, and covers the latest news and analysis of public sector technology. For updates on public sector IT, join the Government Computing Network here.

Best practices for enterprise data

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
VMware builds product executables on 50 Mac Minis
And goes to the Genius Bar for support
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
Microsoft says 'weird things' can happen during Windows Server 2003 migrations
Fix coming for bug that makes Kerberos croak when you run two domain controllers
Cisco says network virtualisation won't pay off everywhere
Another sign of strain in the Borg/VMware relationship?
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?