recommended reading

IT problems still hound Census as it readies count

Census Bureau officials say they are cautiously optimistic that the computer systems it built for the 2010 decennial count will work as planned, but critics doubt the systems will be able to handle the demand as hundreds of thousands of census takers hit the streets in April.

Witnesses at a House hearing on Thursday gave mixed reviews of how prepared the bureau is to count the citizens who have not sent back census forms. Two critical database systems still are not working as planned, and time to test and fix defects is running out, witnesses told lawmakers at a hearing of the House Oversight and Government Reform Information Policy, Census and National Archives Subcommittee.

One of the networks not operating smoothly is the Decennial Applicant Personnel and Payroll System that issues payments to the more than 600,000 temporary employees who will travel door to door in the coming weeks, visiting households that have not filled out a census form. That system has been sluggish when trying to manage fewer accounts than what it will handle when in full operation in April, said Robert Goldenkoff, director of strategic issues at the Government Accountability Office. Another system, the Paper-Based Operations Control System, which processes census forms, also has shown limited functionality, he said.

The bureau has experienced numerous technical problems in the years leading up to the decennial census. It struggled to develop handheld computers that enumerators could use to collect data in the field and send it immediately back to headquarters, but hardware and software glitches, along with missed deadlines and cost overruns, forced officials to drop the devices in April 2008 in favor of its traditional paper-based process.

Census officials testified in February that software defects threatened the rollout of these two IT systems. Arnold Jackson, Census' associate director, said on Thursday the bureau is developing workarounds scheduled to be completed by April 4, when the technology will have to be operational in the field.

"[We have] network configurations that are very powerful but somewhat new to us, [so we] have brought in consultants from each of those vendors to make sure the way we're using their technology is appropriate," he said.

The bureau must solve a number of problems, including meeting the fixed dates by which it must begin operations, completing additional testing and addressing more defects if found, according to Goldenkoff.

"In the end, there are these immutable deadlines, and the workload that needs to be done, and from what we're seeing right now it's going to be a challenge to complete all the testing to complete the workload in time for these operations to start," he said.

In addition, the bureau has few employees working to maintain the new systems, and they might not be able to fix defects that they have identified and address any new ones that surface, Goldenkoff said.

If Census gets behind schedule, it also will see costs increase. Jackson said the bureau believes it will be on time and under budget for its nonresponse follow-up activities.

But GAO's Goldenkoff warned, "There's time, but it's running out. That's the bottom line."

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.