recommended reading To House New APIs


By Dawn Lim June 21, 2010

recent posts

A series of new application programming interfaces - tools that facilitate interaction between datasets and other software programs - will make it easier for developers to play and interact with the content on, the online repository of federal information and a cornerstone of the open government initiative.

But those are just the preliminary steps to establishing a self-running ecosystem that will convert raw government data into valuable content and interesting applications, a White House technology expert said last week at a government IT forum.

At a June 15 panel hosted by technology news platform Information Week, Eugene Huang, senior adviser to the chief technology officer at the White House Office of Science and Technology Policy, announced that API interfaces on "will be rolled out over the next three to six months." Details are being finalized, he added.

"We hope this will make it easier for developers to access the raw data behind and incorporate it into their applications," Huang said in an interview.

The real question that the Obama administration faces as it attempts to open up the government doesn't revolve around implementing the right tools, he said.

"The question is, how do you build a community of individuals who are not just the data geeks but more importantly, individuals who really want to do interesting things with the data and turn that into applications that can be used by the public, much more so than the apps that have already been done?" he said.

A mysterious formula of alchemy, serendipity and the right amount of will, perhaps?

Clay Johnson, the director of Sunlight Labs, an open source community of thousands that builds applications out of government data, said that his organization, the Sunlight Foundation, never had a "sophisticated plan" for moving forward. Growth was the result of making the right connections at the right time and allowing one thing to lead to another. In his own words, "serendipity."

A sustainable ecosystem of support, once given the first spark, will happen "in a snowball as it gets going," said Todd Park, chief technology officer at the Health and Human Services Department, which is rolling out a public-private effort to build a public data warehouse and portal and was recently approached by five private sector organizations that volunteered to publish their health data in the same format and metadata as HHS' datasets to make the work of developers easier.


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.