Feds release map of data center closings
The U.S. is accelerating the closing of data centers
Computerworld - While Congress debates the debt ceiling and the federal budget, the White House is accelerating its plans to close data centers as a means to trim billions of dollars from its IT budget.
By 2012, the U.S. plans to close 373 data centers, representing about 800,000 square feet of space, or about the size of 14 football fields, an official pointed out on Wednesday.
The White House today released a map showing the locations of the 373 data centers earmarked for closing over the next two years. The Google Maps-based map is sprinkled with targeted data centers from coast-to-coast, with the highest concentration in the Northeast.
The targeted data centers range in size from a 195,000-square foot Department of Homeland Security facility in Alabama to four Department of Agriculture data centers, each of less than 1,000 square feet in size.
If the White House reaches its 2012 goal, it will put the government almost half way to its plan to shut down 800 of its 2,000 data centers by 2015. The government expects to save about $3 billion annually.
The U.S. had planned to close 137 data centers by the end of 2011, but updated that to 195 by year's end.
Outgoing federal CIO Vivek Kundra, in a conference call today to discuss the closings, said average utilization for these data centers, in terms of computing power, is less than 27% and storage utilization is less than 40%.
"This is unacceptable in any time, especially when we are talking about a tough budgetary environment," Kundra said.
He said that on Oct. 7, each federal agency will be required to put online details of which data centers they intend to close and the square footage of all the facilities targeted for closing. The only exception is data centers the government wishes to maintain the secrecy of.
U.S. government agencies have rapidly expanded data centers since 1998, when there were only 432.
When asked in the call with reporters how the closings will affect employees, Kundra said that in many cases the data centers are managed by contractors, indicating it would be up to those firms to determine what happens to employees. For federal employees, he said the goal is to retool them for other jobs.
Kundra is leaving his post next month for a fellowship at Harvard and there's been discussion in federal IT circles about whether his initiatives, particularly his strong emphasis on cloud adoption, will continue.
The impact of Kundra's exit came up as a topic on a panel Wednesday at the Fose information technology conference here.
"It would be difficult to imagine that the IT reform agenda is going to be forgotten once Vivek leaves and a new (federal CIO) person comes in," David McClure, associate administrator in the IT department of U.S. General Services Administration.
"This administration has really tied itself to achieving these things. I wouldn't expect major shifts" in administration IT policy, McClure said.
Patrick Thibodeau covers SaaS and enterprise applications, outsourcing, government IT policies, data centers and IT workforce issues for Computerworld. Follow Patrick on Twitter at @DCgov or subscribe to Patrick's RSS feed . His e-mail address is firstname.lastname@example.org.
- IT managers are increasingly replacing servers with SaaS
- Microsoft sees huge potential in fuel cells
- Snap, crackle, pop: Electrical troubles shed light on NSA's data center
- Tornadoes and data centers are OK in Oklahoma
- It's twilight for small in-house data centers
- GM CIO calls HP hiring probe a 'fishing expedition'
- Sandy wounded servers, some grievously, say services firms
- Storm forces Internet hubs to run on generator power
- GM to hire 3,000 HP employees as it insources IT work
- Prepare for the era of the data center in a box
Read more about Government IT in Computerworld's Government IT Topic Center.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you think getting it right from day one is always what matters, you probably haven't been following technology too closely.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
- Armed and Dangerous: Help your IT Organization Embrace Enterprise Mobility
- Becoming a mobile enterprise means new opportunities for your organization yet letting employees choose their own devices and then access corporate resources, apps,... All Government IT White Papers
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- Fighting Fraud Videos: IBM Intelligent Investigation Manager Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both...
- IBM Intelligent Investigation Manager: Online Product Demo Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.