Tech training center outlasts Lotus 1-2-3

The year was 1985. Office automation was a hot topic, and mainframe-dependent federal agencies were beginning to order truckloads of desktop computers.

Two Interior Department mainframe specialists were learning the new technology, using three or four shared microcomputers, as they were known, in the agency's Technology Information Centers (TIC) in Denver and in Flagstaff, Ariz.

When U.S. Geological Survey (USGS) managers in Denver needed more structure, they put one specialist, Susan Keen, in charge of the city's TIC and hired another, Ellen Sanchez, as the senior technical specialist.

Nearly 20 years later, Denver's TIC is strong, thanks to the programs Keen and Sanchez launched. The centers in other cities, including the one in Flagstaff, no longer exist.

Today, Sanchez is still running the TIC. Keen has retired, but she occasionally works as a consultant to the center, which has customers in 54 federal, state and local agencies. Many of the agencies are part of Interior, which is USGS' parent department. But the center serves other departments, as well. For example, the Bureau of Prisons, which is part of the Justice Department, is a major customer.

Thousands of people have taken courses at the center in topics such as Web design, databases, word processing and spreadsheets. When the center first began offering courses, the favorites were Corel Corp.'s WordPerfect and Lotus Software's Lotus 1-2-3. Today, the most popular courses are in Microsoft Corp. Word and Excel.

The fees for the self-supporting programs cost about one-third the price of similar commercial training courses, Keen said.

Despite their insistence on quality at a low cost, center officials are training only about one-third of the 2,400 people who took classes in a peak year in the late 1980s. "Training's been going down everywhere," Sanchez said. "Budgets are being cut back, and training...gets cut."

Training needs also have changed. Introductory classes about PCs are obsolete, but computer security classes are in demand. "Security has been a big topic everywhere because there's more and more mandates coming down on that," she said.

The center also provides help-desk services for Interior — an arrangement that Keen and Sanchez like because it keeps them on top of their customers' IT learning needs. "We learned a lot...by troubleshooting," Sanchez said.

The TIC recently started offering online training courses from a commercial source. Those courses have not become as popular as Sanchez had hoped, but she said she will continue to experiment with new offerings because changing with the times has been a hallmark of the center's success.

Dawn Bjork Buzbee, who has taught classes at the center for 15 years, says Sanchez and Keen are "not too locked into policy and procedures." Their characteristic response to change is, as Buzbee puts it, "If this isn't working, what else would work?"

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group