Roy Kulatilake

Recent Posts

Professional Services Schedule Migration – The Time is Upon Us

Posted by Roy Kulatilake on Aug 18, 2015 1:18:00 PM

The GSA Multiple Awards Schedule Program’s Professional Services Schedule (PSS) Migration, has been somewhat of a distant mirage over the last year. Since January, multiple stories and webinars have been released discussing the upcoming collapse of eight GSA schedule contracts into one.

While some components of the PSS Migration have moved forward, in large part the migration has only resulted in pushing back deadlines. It appears however, that the GSA is finally ready to move forward.

Read More

Topics: Government Contracting, GSA Schedule, Professional Services Schedule, PSS

GSA Advantage Success: A finely tuned I-FSS-600 GSA Pricelist

Posted by Roy Kulatilake on Jul 1, 2015 9:00:00 AM

The “Amazon” for government, GSA Advantage, serves as the ultimate online shopping mall exclusively designed for government entities looking to make a purchase. As such, it is here you can find the public sector face of any GSA contractor. With a variety of contractors providing an even larger variety of products and services, GSA needed a way to standardize and present these contractors in a consistent way. In other words, a constant was needed to allow potential buyers to compare contractors and thus choose the company that fit their needs the best. This constant comes to form in the I-FSS-600 GSA Pricelist.

Read More

Topics: GSA Advantage

The Importance of Identity Management: Understanding the Lesson of the Target Breach

Posted by Roy Kulatilake on Apr 22, 2015 9:45:00 AM

With the ever growing accessibility of personal devices to organizational networks, identity management has never been of higher importance in both the public and private sector. Organizations’ IT networks contain an endless amount of sensitive data, and without proper authentication protocols, this data is at constant risk of breach. In the commercial space, the retailer Target’s breach in late 2013 was a difficult reminder that not addressing cyber risks on every level of your organization can lead to severe ramifications and security compromises.

Read More

Topics: cyber security, identity fraud, data breach

After Righting the Ship, GSA’s Captain Moving On

Posted by Roy Kulatilake on Jan 16, 2015 2:07:39 PM

Dan Tangherlini, GSA’s Chief Administrator, announced his resignation yesterday after nearly three years as the head of the federal government’s procurement arm. Appointed by President Obama in April 2012, Tangherlini was tasked with leading the GSA out of the midst of an employee spending scandal. Taking over an Administration that had suffered a severe hit to its credibility within the federal government, Tangherlini led a three year transformation to bring GSA to its much healthier current state. Highlights of Tangherlini’s accomplishments during his tenure included:

Read More

Topics: GSA Schedule, Government

SaaS for Government IT Help Desks, Can It Be Done?

Posted by Roy Kulatilake on Sep 12, 2013 9:14:00 PM

Software-as-a-Service (SaaS) for IT Help desks is no longer a foreign concept to government agencies. This solution can help provide improved government service to citizens from an environment entirely in the cloud. However, many questions of cost benefit and scalability still remain. With the long term ramifications of budget cuts and sequestration slowly taking a strangling hold on government procurement, agencies are scrambling to find new ways to “save a buck.”

Read More

Topics: BMC, Government Contracting, GSA Schedule, Government, Blog, Technology, Cloud

Open Data: The Latest Step toward Fed-Gov Transparency

Posted by Roy Kulatilake on May 13, 2013 10:13:00 PM


Another chapter of the open government initiative has been written as the White House announced the implementation of the newly minted Open Data Policy. Designed to incorporate all forms of information, the policy dictates a new standard for maintaining data. The standard requires all data be “open and machine-readable.” By forcing all data to be maintained in open, machine readable formats, the federal government hopes to improve efficiency, reduce costs, and increase public access to the information, thereby upholding the ideals of the open government movement.

Read More

Topics: Government, Blog, Technology, Resources and Insight, Cloud

Mobile Device Security: The Government’s Response

Posted by Roy Kulatilake on Mar 14, 2013 10:38:00 PM

As we dive deeper into the year 2013, we see now more than ever the workforce’s reliance on mobile devices. It has reached a scale so great that according to multiple technology research firms, before the end of this year, mobile devices will overtake personal computers as the most common tool to access the web.

Read More

Topics: BMC, Government, Blog, Technology, Cloud

Crime Fighting Mobile Technology: Police Incorporating Mobile Apps and Social Media

Posted by Roy Kulatilake on Feb 11, 2013 9:55:00 PM

Understanding that the easiest way to reach the public these days is through their mobile devices, police departments have begun publishing mobile apps for citizens to report petty crimes and thefts. According to a multitude of departments, the old system of calling in each crime would lead to a backlog of paperwork and nearly a month turnaround to obtain a police report. Additionally, a lot much crime data was lost as it would be difficult for the department to follow up. Appalling numbers such as for every 2000 phone calls for reported crimes, only 500 police reports would result, showed the need for a change. Now with the mobile app, citizens fill out the crime information through the app and upon approval, a PDF copy is sent directly to them. This new system leads to not only less time spent and paperwork, but greater record keeping accuracy and creating more crime data for certain areas.

Read More

Topics: Government Business Development, Government, Blog, Technology

Government Use of Social Media is a Two-Way Street

Posted by Roy Kulatilake on Jan 14, 2013 10:04:00 PM

As social media has grown in popularity and continued to encompass more citizens, the government has made effective use of its outbound reach by using the medium to get information to the citizens. Whether it is used for warnings and instructions during an emergency, or to gauge support for a particular pending protocol or bill, the social media communication channel is one that the government has taken full advantage of to push information out. However as it is with so many other innovations, the governments use of social media is slowly beginning to evolve to a more passive connection.

Read More

Topics: Government Contracting, Government, Blog, Technology

Federal Cyber Security: Securing by Decentralizing?

Posted by Roy Kulatilake on Dec 10, 2012 10:12:50 PM

As we close out 2012, it appears that the Feds will be making an early New Year’s resolution – proactive reformation of their network security and monitoring.

According to a spokesman at the Department of Homeland Security (DHS), a Request for Proposal (RFP) for continuous monitoring of IT assets and data will be put out by the department in the near future. The application of a secure, total Business Service Management (BSM) solution, while currently only at DHS, is being planned to spread across the entire government.

Read More

Topics: GSA Contract Consulting, BMC, Government Contracting, GSA Schedule, Government, Blog, Technology, Resources and Insight, Cloud

Subscribe to Updates


Subscribe to Email Updates