Just a few days into 2018, it’s clear that blockchain technology and cryptocurrency are hot topics whose popularity will continue to surge. In 2017, at times it seemed impossible to escape a discussion with peers about how we wish we’d invested in Bitcoin starting in 2009. The spike in public interest in blockchain-based cryptocurrency has nearly everyone taking note – now even the U.S. Government. What makes cryptocurrency so valuable is the underlying technology it depends on, called blockchain. Blockchain could have a dramatic impact on internet security and communications moving forward.
The North American Industry Classification System (NAICS) classifies businesses into over 700 different industrial categories or codes. For government contractors, it’s crucial to understand these codes and effectively leverage them to win government business. What are NAICS codes? Developed by the Office of Management and Budget (OMB), NAICS is a classification system used by government agencies to collect, analyze and publish statistical data on the United States business economy. OMB developed this system with statistical agencies in the United States, Canada and Mexico to create common industry standards for statistical data presentation and analysis. The federal procurement sector uses the code to classify industries.
Do you know what the real benefits of being on the GSA Schedule are? Learn the top 10 reasons (and advantages) why you should consider it.
GSA Multiple Award Schedules (MAS) contracts often have many compliance standards, some of the most complex being the ones for the Trade Agreements Act (TAA). How do you know if your products meet TAA standards? The simplest way to determine if your product is TAA compliant is to check the list of approved countries of origin. This list outlines all the pre-approved countries of origin permissible under the TAA. But what if the products you want to offer come from a non-TAA compliant country? Under TAA, a vendor may import goods from a non-compliant country if the final product undergoes a “substantial transformation” either in the U.S. or another TAA- compliant country. So, if acquired parts or goods supplied from a non-compliant country are “substantially transformed” in the final product, a contract holder can assert TAA compliance.
Networking with government buyers and other contractors can drive business success in 2018. Now is a great time to take a NEW approach to networking beyond the usual tactics. So, how do you capture the attention of decision makers in more innovative ways? Networking channels and tactics have changed as agencies now reach out to the private sector for help driving their missions. Last week’s HHS hackathon addressing the opoid crisis with data is just one example.
Government contracting is fiercely competitive today. Often, what drives your chance of capturing a win includes having a competitively-priced, unique or timely offering, or being small-business certified. One important factor in any win is whether your company is the contract incumbent, having already done business with the agency. Traditionally, being the incumbent gives you a competitive edge though the market is changing. New research on winners and losers Grant Thornton’s (GT) 2016 Government Contractor Survey collected and analyzed data from companies who primarily do business with the federal government during Fiscal Year 2016. For six years, this survey has shed light on how companies compete for contracts.
This update will affect SINS 520-16 through 520-20. The General Services Administration’s (GSA) Federal Acquisition Service (FAS) is planning to release Refresh 28 of the 00CORP Professional Services Schedule (PSS) in Mid-November 2017. This update will implement a variety of changes to the scope of Special Item Numbers (SINs) 520-16, 520-17, and 520-20. It will also delete SINs 520-18 and 520-19 in order to redefine Data Breach Response and Identity Protection Services under PSS. These changes help to embrace the transition seen in data breach response and help create a proactive solution for identity protection.