Maximum benefit

How many times have we heard that government should be run more like a business? Let’s put aside the fact that more businesses fail than succeed. The idea that the operations of government should be driven by the same motive as private enterprise — profit, or more specifically, that deliciously bureaucratic phrase “return on investment” — is fallacious on the face of it.

That’s not to say that government agencies should not run more efficiently. Businesses try to minimize expenses to maximize ROI, and in that respect, their models can be instructive to any enterprise: for profit, nonprofit and government alike. But as contributing writer John Moore illustrates in this week’s cover story, government officials can’t always measure their technology-buying decisions based on bottom-line business results — i.e., ROI. If they did, government might not run as well as it does.

Case in point: service-oriented architecture. SOA, it turns out, is far from DOA in mission-critical government enclaves, even though it has been widely discredited in the business world. As John points out, the Defense Department and a number of civilian agencies have some of the biggest interoperability headaches in information technology, and SOA provides a means for both integration and development/deployment efficiencies. What chief financial officer can argue with that?

Also in this issue, the subject of technology purchases led us to get down to the brass tacks of federal contracting. The Obama administration has provoked a lot of lofty, if heated, conversations about procurement policy and acquisition reform, stoked to the blue embers with a mandate to spend $787 billion in economic stimulus money. But at some point soon, the administration will have to focus on the basics of purchasing decisions.

We asked three acquisition specialists to give their best advice on

  1. The General Services Administration’s schedule contracts.
  2. Interagency contracting.
  3. Small-business set-aside contracts.

Those types of contracts account for much of the money agencies spend on IT. See what Bill Gormley, Robert Burton and Guy Timberlake have to say about them.

This week we also introduce a new section called Reader’s Corner, which features op-ed pieces commissioned from and/or volunteered by readers who submitted particularly apt responses to stories or other comments on Contributors this week are Robert Fenton and Matt McKnight.

If you are interested in contributing an opinion piece, please contact John Monroe, director of community/user-generated content, at

About the Author

David Rapp is editor-in-chief of Federal Computer Week and VP of content for 1105 Government Information Group.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.


  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group