Using Technology Where The Operational And Fiscal Parameters Dictate
We are in the process of building a new business portal labeled Kentucky Business One-Stop where businesses can go to register a new business with all the appropriate state agencies. This is providing a forum for the agencies to evaluate their business processes and use this opportunity to modify and transform the manner in which they manage their business and interact with customers.
Using data to identify and reduce duplications in service; lower costs; decrease readmission and avoid adverse events
We are engaging the new analytics tools to let data drive our business decisions and mitigate adverse events such as tax and Medicare fraud. The real value of using these tools and our data however, comes when we can apply predictive analysis to things like human behavior and health care; when we can substantially improve the quality of life for our citizens.
Addressing pain points for which solutions do not exist
The single most powerful and far reaching technology solution I would wish for is truly high speed wireless communications capability. Wireless at speeds enjoyed today by fiber optic broadband users. Wireless at 10 gigabyte (and higher) capabilities. As we move more into a mobile computing world, we need ubiquitous high speed wireless bandwidth to realize the full potential of mobile computing.
Impact of social media, mobile, cloud and tablets on business environment
We are certainly excited about some of these trends and the positive impact they will have on the business of state government. Cloud computing offers us the opportunity to flex our technology footprint to match demand on an almost real-time basis; to have a new set of alternatives for disaster recovery and business continuity; and to manage our capital investments and operating expenses in a different manner. Software as a Service gives us the option to implement business and operational functionality without the same support structure that usually accompanies the implementation of new application suites. Our view of these technologies is that they represent another delivery mechanism (as is our current on premise data center infrastructure) to be used when and where the operational and fiscal parameters dictate.
Mobile computing, likewise, presents us with the opportunity to address the information needs of those workers whose day is spent out of the office serving our citizens. Caseworkers and inspectors, highway maintenance and construction crews, public safety officers, and many others are candidates for the mobile computing environment. It provides real-time access to information necessary for decisions; it provides a data collection vehicle that eliminates keying errors and digit transposition; it provides a connection to the home office management and support teams; and, not the least of the benefits, it provides a level of job enrichment for the users. Obviously, mobile computing brings into play a whole new category of end user equipment, such as tablets (and various derivatives). While firmly entrenched in the consumer marketplace, tablet computing requires a new view of information security that can no longer make assumptions about physical device location and security. We must now be concerned with the security of the device as well as the security of the data.