Dependable systems

The central problem in information technology management has shifted. Runaway

systems development projects have given way to a new central concern — that

of making systems dependable.

The road to success is well-known: understand the mission and goals,

design the system with the users in mind, rely on off-the-shelf technology,

take a modular approach and so forth. Solving the Year 2000 problem was

strong proof that if industry and government chief information officers

follow this road, they can successfully manage large initiatives.

Fixing the Year 2000 bug also ushered in the focus on making systems

dependable. This crops up in a variety of guises, which then compete for

resources and create confusion about priorities. The three most common variations

are often heard as cries to:

* Protect critical infrastructures, including federal computer systems,

from cyberthreats.

* Provide confidentiality, integrity and privacy in electronic transactions.

* Ensure reliability and dependability in application software.

Crisis-mongers fill the air with sound and fury to hype each cause.

Those promoting critical infrastructure protection remind us that the keels

of all the U.S. battleships that won World War II were laid before the Pearl

Harbor attack.

In the second case, we are warned by cyberspace's brightest legal scholar — Lawrence Lessig, in his book, Code and Other Laws of Cyberspace — that

industry's very design for the network is destined to undermine freedom

and autonomy.

As for the third point, we are counseled to rise up against a software

industry that dismisses as "undocumented features" bugs that steal, as coldly

as Jesse James, the productive time of scores of people.

We are at the beginning of what author Lester Thurow calls the third

industrial revolution, one that encompasses IT and its unruly offspring — forces such as biotechnology and globalization. Revolutions are by nature

confusing, contentious and troubling.

Those of us at the helms of craft that ply these turbulent waters must

now adjust our bearings and set a course for the middle way.

The true middle ways are robust "win-wins." They stand above the competing

calls for security, privacy, reliability and free access and create balanced

solutions that serve all interests better. One such solution is U.S. encryption

policy that, in the words of longtime administration critic Rep. Bob Good-latte

(R-Va.), "will protect privacy, promote our national security and allow

U.S. companies to compete with foreign encryption manufacturers."

Like good system designs and well-managed projects, these middle ways

are not born perfect. They grow best from iterative, participative, risk-taking,

cross-functional teams of public- and private-sector experts who struggle

together to achieve a common goal. The goal of creating innovative, dependable

solutions is worthy. We, too, must be.

—McConnell, former chief of information policy and technology at the Office

of Management and Budget and director of the International Y2K Cooperation

Center, is president of McConnell International LLC.


  • Budget
    Stock photo ID: 134176955 By Richard Cavalleri

    House passes stopgap spending bill

    The current appropriations bills are set to expire on Oct. 1; the bill now goes to the Senate where it is expected to pass.

  • Defense
    concept image of radio communication (DARPA)

    What to look for in DOD's coming spectrum strategy

    Interoperability, integration and JADC2 are likely to figure into an updated electromagnetic spectrum strategy expected soon from the Department of Defense.

Stay Connected