Feeds

Dying HealthCare.gov bagged JUST SIX registrations on first day

Reports detail startup disaster of Obamacare portal

High performance access to file storage

The much-maligned US HealthCare.gov medical-insurance portal managed to process just six registrations on its first day of availability.

A series of notes [PDF] from the Center for Consumer Information and Insurance Oversight (CCIIO) suggest that as problems plagued the healthcare registration site in its opening hours, only a half-dozen new accounts were able to be logged in the portal's opening day.

Subsequent memos from the office show that as the early wrinkles were ironed out of the site, a trickle of new registrations was able to begin. By the second day, registrations had managed to break into triple digits: October 3 memos suggest that all of 248 accounts had been enrolled.

The early problems for the Obamacare portal have been well documented as the hotly debated public insurance platform collapsed under numerous technical gaffes and a flood of early traffic from US citizens seeking to register with the government-backed health-insurance program.

The daily reports, released amid ongoing government investigations into the botched rollout, provide an early snapshot of just how mightily administrators were struggling as the health care portal floundered in its first days.

According to the October 2 and 3 reports, the early headaches for the site included improperly configured data on multiple servers as well as back-end problems which had prevented brokers from registering with the portal.

Other issues detailed in the report include problems connecting with the Experian credit-check service and problems integrating data from the department of Veterans Affairs.

Since the release, White House officials have sought to quell public outcry and criticism by beefing up staffing and enlisting further assistance from experts in helping to bring the portal up to snuff. Thus far, reports have indicated that the reinforcements have included engineers and consultants from Google, Red Hat, and Oracle.

Officials hope that the added manpower and expertise will put an end once and for all to the embarrassing saga. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Singapore decides 'three strikes' laws are too intrusive
When even a prurient island nation thinks an idea is dodgy it has problems
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.