The Making of Two Technowizards

Human resources and training. Hard to think of two government disciplines further removed from the bright screens and big changes of the information technology revolution. But if managers from such humble beginnings as these can become techno-wizards, so can you.

Steve Kennedy, Social Security Administration training director, absorbed enough techno-smarts from around home and the office to come up with a whiz-bang solution to an expensive problem. Don Heffernan, who runs GSA's wide-area computer network as assistant CIO, got his first taste of technology using a computerized personnel system in the early 1980s in GSA's employment and labor relations office.

Kennedy was choking on the estimated $7 million price tag for training SSA staffers in just a portion of the rule changes brought by a redesign of SSA's disability program. At home at night, Kennedy kept seeing a television commercial showing a woman teaching French via video to a group of students in another location. "I thought, 'Why can't we do that?'" Kennedy made time to go to a conference on video training, where he gathered business cards, asked questions and set up visits to companies using the technology. In addition, Kennedy works in an agency where reengineering using technology has become a way of life. "They've been pushing a lot of reengineering," he says. "The disability system redesign followed the [Michael] Hammer method. Program managers would have benchmarking and go to conferences. They had no idea how the architecture was to be structured, but they would see AT&T or American Express doing something and say, 'Hey, they have cases on line, why can't we?'"

Following what has become common practice at SSA, Kennedy read more about teletraining, looked at how private companies were using it, and got a vendor to come up with a cost-benefit analysis demonstrating tremendous potential savings. "We made a business case for it here. We begged, borrowed and stole equipment to come up with a system to demonstrate it for the executive staff." The top people were sold on the idea and coughed up funding for a satellite-based interactive distance learning system with a broadcast facility at the Baltimore headquarters and communications facilities at 200 SSA sites.

Surfing a Techno-Wave

Heffernan enjoyed using the automated personnel management system so much he began writing programs for it. He toyed with the idea of switching fields so he could work with the new technology, but put aside the notion as he climbed the ladder, eventually becoming acting personnel director in 1990. Five years into the personnel chief's job, Heffernan bought his daughter a personal computer and began playing with it himself. He discovered the Internet, and later, the World Wide Web. A self-described wind surfing fanatic, Heffernan used his PC to communicate with surfers worldwide. Heffernan's love affair with the computer grew in concert with the interest of GSA officials in making better use of information technology. Eventually, Associate Administrator for Administration Elaine Johnson created a job accommodating all Heffernan's skills: head of a new office of labor relations and information technology.

Heffernan pulled together a strategic plan for using IT in administrative systems. He began rubbing shoulders with GSA's information resources shop, then run by Joe Thompson, now GSA's CIO. When Thompson was named CIO, he followed private firms' strategy for advice building a staff. They brought in business managers interested in technology, not typical IT managers. "Looking around, he spotted me," Heffernan recalls. "I was a business manager, I had good relations with other managers, I had an ability to work with people, I was a customer [of the IT shop] and I appeared interested."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.