Winvale Blog
The latest insights for government contracting success, GSA Schedule assistance, & IT Manufacturer support.
GSA Schedule | Government | Technology | Resources and Insight | Contracts
By:
Kevin Lancaster
October 22nd, 2012
A proposal by Rep. Darrell Issa, Chairman of the House Committee on Oversight and Government Reform, seeks to eliminate the kind of governmental waste both of the Presidential candidates have pledged to eliminate. Backed by the ranking member of the IT subcommittee, Rep. Gerry Connolly, the proposal plans to save about $20 billion that is currently wasted supporting outdated technology by giving CIO’s of Federal agencies more authority with their IT programs and encouraging collective government IT procurement. Critics of the proposal note its limited scope and claim it would create more bureaucracy. The Department of Defense (DoD) is a conspicuous absence from the proposal even though it accounts for roughly half of the government’s $80 billion annual IT budget and is a major source of the waste the proposed law strives to eliminate. While the scope of the proposed law is not as expansive as some hoped, it has nonetheless received support from the private sector because it requires "active engagement with the private sector to use up-to-date commercial technologies and to remove unnecessary burdens on industry in its interactions with the government." Regardless of whether this proposal becomes law, it is an exciting step on the path to a more efficient and cost-effective commercial interaction between government agencies and the private sector. Wow! As if this time of year wasn’t already brimming with innovative ideas and exciting possibilities. This proposal is a great way for government agencies to save money by leaving expensive obsolete technologies behind to embrace the current tools of doing business. Businesses selling to the government will benefit from agencies improved ability to rely on each other’s expertise and collaborative purchasing. We are looking forward to see what happens when this proposal is introduced in early 2013. What do you think?
GSA Schedule | Government | Technology | Resources and Insight | Contracts
By:
Kevin Lancaster
October 18th, 2012
With both the Obama Administration and the Federal Risk and Authorization Management Program (FedRAMP) so steadfast on the implementation of the cloud, it is imperative that they subdue all doubts the general public may have about its security. FedRAMP has reached out to officials from General Services Administration (GSA), Department of Homeland Security, the Department of Defense, and others to standardize the security of government cloud-based services.
Do you know what the real benefits of being on the GSA Schedule are? Learn the top 10 reasons (and advantages) why you should consider it.
GSA Schedule | Government | Technology | Resources and Insight | Contracts
By:
Kevin Lancaster
October 11th, 2012
NASA Solutions for Enterprise-Wide Procurement (SEWP) IV is a government wide acquisition contract supporting IT investments spanning from 2007 to 2014. SEWP is an indefinite-delivery, indefinite-quantity (IDIQ) contract vehicle and is coveted by many contractors as a gateway into large scale contracts and access into a plethora of agencies. SEWP is one of the few contract vehicles which actually manages the contracts and allows agencies to utilize resources from a centralized platform. A Federal Computer Week Report highlights some key features:
Technology | Resources and Insight | Contracts
By:
Kevin Lancaster
October 8th, 2012
As IT systems continue to grow in size and sophistication, greater security measures are needed to ensure that critical data stays secure. Enter Continuous Monitoring. The automated process creates data on the status of operational and business processes that goes into constant feedback loop, allowing the system to constantly quantify risks and potential compromises to the system against a constantly changing environment. With constant awareness, those said risks and compromises can be dealt with immediately creating a secure network.
Government | Technology | Resources and Insight
By:
Kevin Lancaster
October 4th, 2012
The Open Government Initiative set forth by the Obama Administration in 2009 requires Federal agencies to take immediate steps to achieve milestones in transparency, participation, and citizen collaboration. Most Federal, state, and local organizations have jumped on the social media bandwagon as a tool for communicating with citizens and making their agency’s goals transparent. However, the average American largely still feels disconnected from large impersonal agencies. An excellent example of the inability of large organizations to genuinely connect with citizens is their Twitter feeds. Most agency Twitter feeds are merely pushing out information, not engaging in conversation. An article published by the Campaign for a Stronger Democracy, an independent group, noted “if you work for a government agency, and you’re interested in social media, ask yourself, can any average person name one person from your agency? If they can’t, you have failed at social media for your organization.”
GSA Schedule | Government Business Development | Government | Technology | Resources and Insight
By:
Kevin Lancaster
October 1st, 2012
An ever growing area of concern within Federal, State and Local governments is how to manage mobile devices securely- and how implement a policy allowing employees to use whichever device(s) they’d like. As these devices and applications become critical to an organization’s success, IT is challenged with efficiently managing the full lifecycle management of devices across the enterprise. Mobile Device Management provides IT organizations the control they need to securely manage mobile devices throughout their entire lifecycle, simplifying these processes across multiple device types and mobile operating systems in a single console. With discovery, configuration, apps, and policy management, organizations now have the peace of mind that their mobile devices, critical data, and networks are secure from potential threats.
Copyright Winvale | All Rights Reserved