Feeds

Dying HealthCare.gov bagged JUST SIX registrations on first day

Reports detail startup disaster of Obamacare portal

Top three mobile application threats

The much-maligned US HealthCare.gov medical-insurance portal managed to process just six registrations on its first day of availability.

A series of notes [PDF] from the Center for Consumer Information and Insurance Oversight (CCIIO) suggest that as problems plagued the healthcare registration site in its opening hours, only a half-dozen new accounts were able to be logged in the portal's opening day.

Subsequent memos from the office show that as the early wrinkles were ironed out of the site, a trickle of new registrations was able to begin. By the second day, registrations had managed to break into triple digits: October 3 memos suggest that all of 248 accounts had been enrolled.

The early problems for the Obamacare portal have been well documented as the hotly debated public insurance platform collapsed under numerous technical gaffes and a flood of early traffic from US citizens seeking to register with the government-backed health-insurance program.

The daily reports, released amid ongoing government investigations into the botched rollout, provide an early snapshot of just how mightily administrators were struggling as the health care portal floundered in its first days.

According to the October 2 and 3 reports, the early headaches for the site included improperly configured data on multiple servers as well as back-end problems which had prevented brokers from registering with the portal.

Other issues detailed in the report include problems connecting with the Experian credit-check service and problems integrating data from the department of Veterans Affairs.

Since the release, White House officials have sought to quell public outcry and criticism by beefing up staffing and enlisting further assistance from experts in helping to bring the portal up to snuff. Thus far, reports have indicated that the reinforcements have included engineers and consultants from Google, Red Hat, and Oracle.

Officials hope that the added manpower and expertise will put an end once and for all to the embarrassing saga. ®

3 Big data security analytics techniques

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Reprieve for Weev: Court disowns AT&T hacker's conviction
Appeals court strikes down landmark sentence
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.