Feeds

Cabinet Office publishes open source procurement toolkit

Using document format that was proprietary until 2008

Secure remote control for conventional and virtual desktops

The Cabinet Office has published an open source procurement toolkit for the public sector on its website.

It said the purpose is to ensure that there is a level playing field for open source and proprietary software and that some of the myths associated with open source are dispelled.

The toolkit includes six documents:

  • All About Open Source – including FAQs;
  • ICT Advice Note - Procurement of Open Source;
  • Procurement Policy Note on Open Source;
  • OSS Options; Total Cost of Ownership;
  • and CESG Guidance on Open Source (this site will only open for users who have previously registered with a .gsi.gov.uk email address).
  • The first five papers are all available on the Cabinet Office website as PDFs.

The options document contains details of different IT functions such as servers, databases, application development, networks and business applications.

The document on cost of ownership advises taking into account issues around acquisition – such as purchase price, licences and integration – operation and management – including migration, upgrades, support services, training and software scaling – and end of life management.

It also advises that the total cost of ownership is only concerned with the financial cost of any solution, and does not involve any other benefits.

The government has had an open source policy dating back to the Labour administration in 2004, although it was reiterated in 2009 and 2010. Before coming to government, the Conservative party called for an increased use of open source technology in government IT systems.

The Government ICT Strategy, published in March, says that open source solutions should be considered alongside proprietary ones in procurement, and that when there is no significant cost difference open source should be chosen on the basis of its flexibility.

This article was originally published at Guardian Government Computing.

Guardian Government Computing is a business division of Guardian Professional, and covers the latest news and analysis of public sector technology. For updates on public sector IT, join the Government Computing Network here.

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
The DRUGSTORES DON'T WORK, CVS makes IT WORSE ... for Apple Pay
Goog Wallet apparently also spurned in NFC lockdown
IBM, backing away from hardware? NEVER!
Don't be so sure, so-surers
Hey - who wants 4.8 TERABYTES almost AS FAST AS MEMORY?
China's Memblaze says they've got it in PCIe. Yow
Microsoft brings the CLOUD that GOES ON FOREVER
Sky's the limit with unrestricted space in the cloud
This time it's SO REAL: Overcoming the open-source orgasm myth with TODO
If the web giants need it to work, hey, maybe it'll work
'ANYTHING BUT STABLE' Netflix suffers BIG Europe-wide outage
Friday night LIVE? Nope. The only thing streaming are tears down my face
Google roolz! Nest buys Revolv, KILLS new sales of home hub
Take my temperature, I'm feeling a little bit dizzy
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.