Obama aids find White House in IT "dark ages"

The Obama administration found the White House in the "technological dark ages" during its first day at work, reports...

This Article Covers


The Obama administration found the White House in the "technological dark ages" during its first day at work, reports The Washington Post.

Obama aides found that phone lines did not work, PCs were loaded with six-year-old versions of Windows software, and that laptops and mobile phones were difficult to get hold of.

In addition, the administration's website was not being loaded with the information needed to support Obama's goal of delivering more openess about how the government runs the nation's affairs.

Obama aides' slick use of blogs, webmail, instant messaging, Blackberry smartphones and other gizmo technology in getting Obama elected, has not so far been available to them in the White House, reports the paper.

Part of the reason for the shortcomings is that governmental rules (under the Presidential Records Act) dictate that all governmental communications have to be conducted on internally controlled networks that can record government business - ironically to aid the openess Obama strives for when making government actions available for public view.

Barack Obama - the first truly digital US president >>



Enjoy the benefits of CW+ membership, learn more and join.

Read more on PC hardware

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...