recommended reading Performs Well After Making White House’s Repair Deadline

Jon Elswick/AP

The Obama administration’s once barely functioning online health insurance marketplace performed solidly on Monday, the first weekday after a White House deadline for the site to be vastly improved, but the site had to keep some insurance seekers waiting to lower the overall volume of visitors.

About 375,000 people visited between midnight and noon on Monday, according to metrics provided by the Health and Human Services Department. That half-day figure suggests that the site could effectively serve 800,000 daily visitors, the capacity officials estimated it would be able to handle by Dec. 1.

When the site originally launched on Oct. 1 visitors suffered long wait times and frequent error messages, preventing the vast majority from enrolling in an insurance plan. Obama pledged to fix those errors in time for a series of deadlines mandated by his health care overhaul. A team led by contractor QSSI has been working for the past six weeks to clean out software bugs and add server capacity.

To prevent applicants from overwhelming the site, designers added a queuing system that keeps new shoppers out once the site has reached capacity. Officials implemented the queuing system around 10 a.m. Monday when response times were averaging more than 2 seconds and error rates were approaching 1 percent, officials said.

Several users reported being placed in the queuing system on social media and two Nextgov visits to the site after noon both resulted in being placed in a queue. The queuing alert offers to email visitors when they can return to the site.

Despite’s solid performance Monday, it's not yet clear whether the site will be able to handle the large volume of visitors officials expect to come throughout December as the first deadlines to purchase health insurance approach.

Some experts fear the site’s poor performance during its first two months will push younger and healthier consumers to pay a penalty rather than purchase insurance through the site, raising the cost of premiums for people who do enroll in the program to an unsustainable level.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.