2020 Census Recognized as Top 10 “Most Influential Projects” Across Government

2020 Census Recognized as Top 10 “Most Influential Projects” Across Government

Date: November 24, 2020
  • Home
  • >
  • We're on point
  • >
  • 2020 Census Recognized as Top 10 “Most Influential Projects” Across Government

Tags: , ,

Each year, the Project Management Institute (PMI) recognizes the “Most Influential Projects” by industry, region and overall. These projects showcase “compelling efforts across industries and around the world that achieved a significant milestone,” said PMI President & CEO Sunil Prashara.1

This year, the U.S. 2020 Census was highlighted as #6 in the Top 10 “Most Influential Projects” list across government. T-Rex Solutions is proud to be a part of the team that helped make the 2020 Census a success. As the Technical Integrator, T-Rex was responsible for modernizing and protecting U.S. Census Bureau’s IT Infrastructure, systems, applications and data to effectively support its mission even amidst a global pandemic.

“We are proud to support the U.S. Census Bureau in making the first ever online census a success. We were able to ensure the online response system was reliable, effective, and easy to use while prioritizing the health and safety of Americans during the pandemic,” says T-Rex CEO Seth Moore.

In selecting this group of projects, the project management community — including experts, volunteers, academics, and industry leaders around the world — first provided their recommendations for consideration. This year’s list specifically highlights projects in which project professionals were able to use “ingenious ways to keep initiatives moving forward in the face of unexpected obstacles associated with the global pandemic.”

Through the thousands of recommendations made, a “special PMI thought leadership team” further culled down the list of projects. The final list “represents PMI’s vision of how project work and the change makers behind them represent the creative spirit shaping how the world collectively reimagines a new future, makes ideas and dreams reality, and as a result changed the world.”2

“These projects should give all of us cause for optimism in these tough times. Each team had to make hard decisions, often going against the grain of tradition – all for the betterment of society,” states Prashara.3

1 What Makes a “Most Influential Project” in 2020

2 PMI Celebrates Project Ingenuity and Fortitude with 2020 Most Influential Projects Lists

3 What Makes a “Most Influential Project” in 2020


recently posted
Zero Trust Lift: Network Visibility and Analytics Maturity using Zeek

Zero Trust Lift: Network Visibility and Analytics Maturity using Zeek

Zeek is a proven open-source network visibility and analytics tool that you can leverage to increase your agency’s Network Visibility and Analytics Capability maturity under CISA’s Zero Trust Maturity Model Version 2. Zeek (https://zeek.org, formerly named Bro) is a network […]

T-Rex is Hiring at Hill Air Force Base

T-Rex is Hiring at Hill Air Force Base

Since 2016, T-Rex has been supporting large scale hybrid-cloud migrations and systems modernization, to include the successful deployment of the first-ever online U.S. Census in 2020. We are excited about expanding our IT Modernization services within the National Security market, […]

Secure by Design and Zero Trust: Integrating Supply Chain Risk Management with DevSecOps

Secure by Design and Zero Trust: Integrating Supply Chain Risk Management with DevSecOps

Agencies are seeking innovative ways to mature their Zero Trust posture. In this article, we have focused on improvements to your DevSecOps to increase maturity in two pillars: 1) Devices and Applications and 2) Workloads.

Protecting Government Apps and Workloads from Zero-Day Cyber Threats

Protecting Government Apps and Workloads from Zero-Day Cyber Threats

In April 2023, CISA released Zero Trust Maturity Model Version 2, which added a fourth security maturity level and reaffirmed application and workload cyber requirements. In this article we consider Application Threat Protections security levels within the Applications and Workloads […]