recommended reading

End-of-year IT spending expected to increase more than in past years

Federal agencies' end-of-fiscal-year spending on information technology is expected to spike higher than the past two years, according to industry observers.

August and September are traditionally the busiest months in government purchasing, a time when agencies rush to spend obligated funds before the end of the fiscal year on Sept. 30, or lose the money.

But the past two years have seen less spending during those months because most agencies were operating under continuing resolutions, which held spending in line with the previous year's budget, said Larry Allen, president of the Coalition for Government Procurement. This year, agencies have their fiscal 2009 IT budgets in hand, and for the most part they are fatter than fiscal 2008 versions.

"The end of this fiscal year is a return to four to five years ago," when the spike in spending was higher, he said. "There's a more defined flurry of activity. In [fiscal] 2007, 2008, there was not really as much of a bump at the end of the year."

Also adding to the jump is the fact that agencies have held on to their IT funds longer than usual this fiscal year, partly because they were distracted by the rush to complete Recovery Act-funded projects and partly because of the uncertainty involved in the transition to the Obama administration. That's built a pent-up demand. "Like the consumer market, [agencies] have just held on to their money to make sure they had something to spend at the end of the year," Allen said.

Procurement specialists did not say how much larger the spike would be, but Shawn McCarthy, research director for IDC Government Insights, estimated agencies have between 15 percent and 20 percent of their IT budgets left to spend.

Upgrading technology hardware seems to be one of the segments where agencies are most interested in spending money, according to McCarthy. He said agencies have used their remaining IT dollars to upgrade aging personal computers and network equipment, because it's often cheaper to buy a new PC or router than to address the security vulnerabilities in older products.

"There's extremely high interest in replacing older desktops with laptops," McCarthy said. "It's not only an energy saver, but also a business continuity issue" since workers can use their laptops elsewhere in the event of a power outage or damage to an office building.

IDC analyzed President Obama's proposed budget for fiscal 2010, which includes a mandate to increase spending on cloud computing, and concluded that the three lines of business likely to see the most activity in the coming fiscal year are the lines of business for information and technology management, health, and defense and national security.

Despite the Obama administration's push for cloud computing, McCarthy said the lines of business and their shared-service centers will remain attractive options for agencies looking to consolidate infrastructures and reduce IT expenses. He said cloud computing and shared-service centers are similar.

"I think the shared-service centers are economically viable as they are," he said. "So some cloud solution would have to offer an incredibly cheap solution to be a threat to them. That's not likely to happen overnight."

Cloud computing more accurately should be viewed as an evolution of shared-service centers and lines of business, rather than as a radically different approach, said Karen Evans, administrator of e-government during the Bush administration. The Obama administration's effort to deploy cloud computing would not be possible without the advances made under the previous administration, she said.

"It's not the newest trend," Evans said. "The whole cloud computing effort is building off the IT infrastructure line of business. Where we were was getting everybody used to the idea of working together, of one federal government and getting them to use enterprise architecture. Now that they think that way, it's a matter of implementing it on out."

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.