recommended reading

Impact of data center closures unclear

Nearly three weeks after the White House announced the first round of 137 federal data center closures -- part of a massive cost and energy-savings program -- it's far from clear how much physical space and computer space will actually be eliminated and how many jobs might be cut.

The 23 data centers that the State, Veterans Affairs, Agriculture and Energy departments plan to have closed by 2012 take up about 44,000 square feet, according to agency emails to Nextgov. For the sake of perspective, that's real estate equal to about 18 standard family homes, according to the National Association of Home Builders, but a full 11,000 square feet shy of consolidator-in-chief President Obama's digs.

One Homeland Security Department data center slated for closure in Arlington, Va., covers about 1,500 square feet, an agency official said. But the agency does not know the size of the other four data centers it plans to close in Texas and in the Washington metro area, he said.

Data centers can vary hugely in the amount of physical space they take up and server space they provide, so there's no way of telling whether the more than 100 other data centers pegged for closure each take up a similar amount of space, or much more or less.

Most of the agencies operating the remaining 109 data centers scheduled for closure did not respond to Nextgov requests for specific details.

Other agencies said the information was too difficult to gather. Some of the centers are leased or contractor-operated facilities, or are too closely integrated into other nondata center operations to be meaningfully split out, they said.

The Defense Department, which operates 57 of those 109 data centers, did not respond to multiple emails and phone calls requesting information. Defense operates more than a third of the roughly 2,100 federal data centers now in operation.

Federal Chief Information Officer Vivek Kundra's 25-point implementation plan for reforming federal IT, released in December 2010, calls on the government to shut down about 800 data centers by 2015, either by consolidating the data they hold into underutilized centers, or by moving it to more versatile cloud computing storage.

The consolidation plan will save the government millions of dollars over the next decade and significantly reduce its carbon footprint, Kundra has said.

Kundra's office has not collected from the agencies information on the physical space or server space used by the data centers slated for closure or the likely layoffs stemming from the closures, a spokeswoman said.

The 10 data centers to be closed by Veterans Affairs and State won't result in any layoffs because the existing staff managing those facilities will be reassigned, the agencies said.

The five centers Homeland Security is closing won't produce any employee layoffs, but the Arlington facility, which houses Transportation Security Administration information, may yield up to six contractor layoffs, the agency said.

Other agencies did not provide information about likely layoffs.

The State Department will be shutting down about 7,000 square feet of space actually taken up by computer servers and the Veterans Affairs Department will be closing about 6,000 square feet, according to responses from the agencies.

Other agencies did not provide information about server space they'll close, or said they are unsure.

Threatwatch Alert

Network intrusion / Stolen credentials

85M User Accounts Compromised from Video-sharing Site Dailymotion

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.