Winvale Blog
The latest insights for government contracting success, GSA Schedule assistance, & IT Manufacturer support.
Technology | Resources and Insight
By:
Kevin Lancaster
June 25th, 2012
Los Alamos National Laboratory is one of the largest science and technology multidisciplinary research institutions in the world. In anticipation of a large federal migration to a virtualized cloud environment, Los Alamos Lab built a sophisticated cloud platform which is now serving as a model for how data center managers should charge and entice users.
By:
Kevin Lancaster
June 21st, 2012
Government agencies squander for years completing their gargantuan IT projects with their contractors, but often they take such extensive amounts of time to arrive on the scene that when they do the need for them is minimal or even nonexistent. During this inefficient and exhaustive process, billions of dollars are wasted and the government does not get the full benefit of their IT innovation. The Office of Management and Budget (OMB) developed a guide book, released June 14, 2012, about module contracting that maps out methods of more efficacious project planning in a variety of aspects from investment manageability to responsiveness of the contracts in Contracting Guidance to Support Modular IT Development.
Do you know what the real benefits of being on the GSA Schedule are? Learn the top 10 reasons (and advantages) why you should consider it.
GSA Schedule | Government | Technology | Resources and Insight
By:
Kevin Lancaster
June 19th, 2012
n a recent mobile strategy document released by the Department of Defense (DoD), they addressed the need to strengthen the efficiency of its workforce and operations and construct its business to be more relatable to today’s modern workplace and clientele. The document went on to explain this implementation would involve addressing 3 major goals for the department; “Advance and evolve the DoD Information Enterprise infrastructure to support mobile devices, institute mobile device policies and standards, and promote the development and use of DoD mobile and web-enabled applications.” This strategy “identifies the vision and goals for capitalizing on the full potential of mobile devices and supports the end-user services approach in DoD Information Technology Enterprise Strategy and Roadmap,” states Chief Information Officer, Teri Takai. In order to evolve into this developing strategy, the Department has stated that it must better familiarize itself with management methods of better utilizing available spectrum and also “develop mechanisms for rapidly transitioning technologies into programs of record.” DoD’s new enterprise infrastructure and wireless networks must have the capability to support both unclassified and classified high-bandwidth traffic, a critical up kept stream of wireless coverage to in-building and terrestrial locations, and also various networking architectures. This architecture must maintain a security between the interface of DoD networks and commercial networks by empowering a proper management of mobile devices, applications, and network connections.
GSA Schedule | Resources and Insight
By:
Kevin Lancaster
June 15th, 2012
Claims are now being made that millions of dollars in savings opportunities are open to the General Service Administration (GSA) by The Office of Inspector General (OIG). In their Semiannual Report to the Congress, released May 31, they stated there are multitude of ways in which money could be recovered by the GSA in focus areas such as acquisition programs, civil recoveries, and criminal investigations.
GSA Schedule | Technology | Resources and Insight
By:
Kevin Lancaster
June 11th, 2012
Wednesday, June 6th marked the launch of the Federal Risk and Authorization Management Program (FedRAMP) application process for cloud service providers. As required by the Office of Management and Budget, all cloud service offerings must meet FedRAMP requirements when working with Federal agencies.
Technology | Resources and Insight
By:
Kevin Lancaster
June 6th, 2012
The days of identity thieves digging through your trash can or calling you requesting your personal information are long gone. Those methods took up their time and resources with limited results. Now, fraudsters can reach millions of people in a day with a click of a button, or create a webpage that is similar to a target agency in content and URL for just a few dollars. Malware can be downloaded just by clicking on these websites and will lay dormant until key words are inputted into your PC.
Copyright Winvale | All Rights Reserved