recommended reading

Federal CIO announces new data center consolidation baseline

This story has been updated.

The White House plans to close 40 percent of roughly 3,100 federal data centers by 2015,according to a new blog post by federal Chief Information Officer Steven VanRoekel.

That amounts to shuttering about 1,200 centers. The government expects to save $5 billion overall through the consolidation, according to earlier estimates, but VanRoekel hasn't given a firm end date for when those savings will be realized.

Agencies have committed to shuttering 1,080 data centers so far, VanRoekel said. The remaining 120 or more centers will be identified in the future, a spokeswoman said.

The total number of data centers the government planned to shutter was thrown into question in October when the CIO announced he was expanding the definition of a federal data center to include small government-owned data rooms and closets scattered across the country.

The White House had earlier announced plans to shutter about 800 of 2,100 federal data centers by 2015. That plan, established by VanRoekel's predecessor Vivek Kundra, included only facilities that measured at least 500 square feet.

In an October conference calls with reporters, VanRoekel estimated government's data center footprint under the expanded definition would be about 2,800. The new figure of 3,133 data centers is the result of a governmentwide inventory since October, a VanRoekel spokeswoman said Wednesday.

The consolidation goal will remain at roughly 40 percent of the government's data center inventory regardless of any new information on the number of facilities, she said. It's not clear whether VanRoekel's office still intends to shutter 40 percent of data centers that exceed the original 500-square-feet definition.

The consolidation program also is aimed at revamping many remaining data centers to take advantage of new virtualization technology that allows federal agencies to store information more efficiently and cheaply. The government also aims to save roughly $5 billion annually by 2015 by transitioning to more nimble cloud computing storage.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.