Feeds

No more 'rip-off' IT disasters – UK.gov will be too busy tweeting

RT @SirHumphrey_Appleby A courageous move, minister

Combat fraud and increase customer satisfaction

Blighty's government has promised that its new "digital by default" campaign will put a stop to billion-pound IT catastrophes that have dogged the public sector for years.

In a commitment-light response to a report subtly titled Government and IT "a recipe for rip-offs" - published in January by MPs on the Public Administration Committee - bods within the Cabinet Office wheeled out claims that the government is better at agile procurement and is now commissioning significantly more from small and medium businesses.

The committee's suggestion that the government needed independent advice on handling IT projects was also rebuffed.

MPs on the committee also expressed scepticism that the Cabinet Office's "agile champions" would not be senior enough to make big decisions about procurement - a potential problem that the department, overseen by Tory Francis Maude, said it was aware of and working to avoid.

In making a commitment to access, the Cabinet Office promised to use social media more and touted the gov.uk domain, which it says would be easier to access and cheaper to maintain. However the commitments from the Government Digital Service (GDS) were vague at best:

The GDS is engaging with departments to accelerate their digital by default and channel shift plans using relevant social media and digital channels. GDS is working with departments to fundamentally change the way their policy teams think of social media.

The first edition of the A recipe for rip-offs report, published in July 2011, slammed the government for wasting "obscene" amounts of public money, fingering some Whitehall departments for spending £3,500 on desktop computers. ®

Top three mobile application threats

More from The Register

next story
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
APPLE FAILS to ditch class action suit over ebook PRICE-FIX fiasco
Do not pass go, do cough (up to) $840m in damages
Whoever you vote for, Google gets in
Report uncovers giant octopus squid of lobbying influence
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.