Getting IT and Web input from citizens for Recovery.gov is a way to "engage the American people in ingenuity and innovation," says federal CIO Vivek Kundra.
At Recovery.gov this week, there's a YouTube video best described as a plea for help. Earl Devaney, chairman of the federal government's Recovery Act Transparency and Accountability Board, asks that "leading IT businesses, thought leaders, developers, and consumers" join an online discussion to "influence how Recovery.gov is built and operated."
There's a big opportunity for IT vendors to participate in the creation of the $84 million Web site, as well as creative, thoughtful, and technically minded citizens. And Recovery.gov really does need good input. For starters, 29 federal agencies are being asked to report in RSS or Atom data-feed format, beginning in July, the details of all contracts and grants they award using funds from the $787 billion stimulus package President Obama signed in February, down to the subrecipient level.
Recovery.gov then has the job of making that data visually appealing and searchable by citizens, journalists, watchdog groups, government officials, and anyone else who's interested in it.
That means if Housing and Urban Development makes a block grant to the city of New York, which then gives the grant to a nonprofit housing organization, then HUD needs to report that nonprofit as the recipient.
It's easy to see how this gets complicated with 29 federal agencies and hundreds of billions of dollars in stimulus funds going out to hundreds or thousands of subrecipients. In a recent conversation, MicroStrategy chief operating officer Sanju Bansal said the effort behind Recovery.gov is "not unequivalent to building a national highway system." His company submitted an analysis and visualization dashboard it developed for review at the site.
In his video to participate in the "IT Dialogue," Devaney said Recovery.gov needs the most innovative approaches and solutions -- but they have to be low-maintenance, low-cost technologies that scale with minimum customization.
His request for input is expansive: how to collect, store, and warehouse data; how to analyze and visualize that data; how to detect fraud and abuse of stimulus funds; and how federal and state agencies can collaborate on data collection. Web site visitors are invited to pitch ideas, tag them, tag other ideas to form connections, and rate and comment on ideas.
6 Tools to Protect Big DataMost IT teams have their conventional databases covered in terms of security and business continuity. But as we enter the era of big data, Hadoop, and NoSQL, protection schemes need to evolve. In fact, big data could drive the next big security strategy shift.
Big Data Brings Big Security ProblemsWhy should big data be more difficult to secure? In a word, variety. But the business won’t wait to use it to predict customer behavior, find correlations across disparate data sources, predict fraud or financial risk, and more.
Join us for a roundup of the top stories on InformationWeek.com for the week of December 14, 2014. Be here for the show and for the incredible Friday Afternoon Conversation that runs beside the program.