Better Technology Buying

December 13, 1996

Better Technology Buying

In a three-part series this week, The Los Angeles Times looks at Uncle Sam's recent large-scale information-technology projects.

"After pumping $300 billion into computer systems in the last two decades," the report concludes, "the federal government has compiled a record of failure that has jeopardized the nation's welfare, eroded public safety and squandered untold billions of dollars."

The Times report looks at a series of failed federal computing efforts, from the IRS's $4 billion troubled tax systems modernization program to Social Security's inability to match $234 billion in wages to the people who earned them.

In an effort to address such failures, the report notes, Congress has overhauled the Brooks Act and other federal procurement statutes. Here's a quick look at some of those efforts:

The Information Technology Management Reform Act (1996):

Revokes the Brooks Act (which made GSA the overseer of information technology for the government), requires that each agency appoint a chief information officer (CIO), and creates a government-wide CIO council.

The Federal Acquisition Streamlining Act (1994):

Cuts red tape for federal employees who make purchases, most notably through allowing the use of credit cards for purchases under $2,500. It also simplifies procedures for procurements under $100,000.

The Federal Acquisition Reform Act (1996):

Frees the government from having to select only low bidders, eliminates several regulations for big purchases and allows agencies to cooperate more closely with suppliers on big procurements before awarding contracts.

The Government Performance and Results Act (1993):

Requires that federal agencies measure the results from their technology investments.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.