recommended reading

Data center goals depend on other programs’ success


The government’s ability to reach its goal of saving $5 billion by consolidating and shuttering agency data centers will ultimately depend on two other information technology initiatives, an industry official said Tuesday: the shared services strategy and Portfoliostat.

Unless those other programs -- both aimed at reducing and rationalizing the number of government computer programs and applications -- are successful, the data center initiative will merely have moved government computer servers around instead of trimming the number of servers and making them less cluttered, Citrix Systems Vice President for Public Sector Tom Simmons said.

Citrix contracts with the government on numerous data center efficiency projects. Simmons spoke with Nextgov on the sidelines of a conference sponsored by Meritalk, a government IT network.

The shared services strategy, which launched in May, aims to cut down on the number of computer systems that serve the same or similar functions within agencies, such as systems for human resources and financial management. There are more than 600 human resources systems across government, federal Chief Information Officer Steven VanRoekel has said.

, launched in March, aims to rationalize agencies’ full IT portfolios and cut or trim back ineffective programs.

The number of applications running in small data centers or server closets that serve a single office tends to grow over time as new applications are added for projects and never removed, Simmons said.

Consolidated data centers and computer clouds gather much of their efficiency, though, by piling different instances of the same application on top of each other, so if those one-off applications aren’t removed, the consolidation project will be significantly less efficient.

There are at least 16,000 applications spread across the Army’s enterprise, Col. Chris Miller, director of the Army’s Data Center Consolidation Program, told the Meritalk audience. Miller is in the process of identifying all of the applications the Army is using and determining which can be consolidated or shut down.

“You’ve got specific applications that were built on specific servers with specific storage years ago that are still being managed and maintained in the existing data centers,” Simmons said. “And the application owners are saying, ‘you can’t close that because I’ve got three people that rely on that application.’ ”

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.