Phone: (202) 296-5505 Email: info@winvale.com

New Call-to-action

Winvale Blog

The latest insights for government contracting success, GSA Schedule assistance, & IT Manufacturer support.

Blog Feature

Government | Technology

The FY 2024 NDAA Defense Policy Bill: What it Means for Veteran-Owned Businesses

By: Stephanie Hagan
December 15th, 2023

This week, Congress passed its $874.2 billion defense policy bill, better known as the National Defense Authorization Act (NDAA). This highly anticipated bill sets the funding and policy agenda for the Department of Defense (DoD) for Fiscal Year (FY) 2024. The DoD is currently operating under a stopgap funding bill, barring the agency from starting most new initiatives or moving forward with many acquisitions, so once signed by President Biden, this bill will enact a series of significant changes within the DoD.

Read More

Share

Blog Feature

Technology

Where to Find IT Solutions Through GWACs

By: Lillian Bohan
December 13th, 2023

Information Technology (IT) is a crucial part of our daily lives, no matter what industry we are in. Nearly all communication depends on it, whether it be casual such as chatting with friends, professional at work, or confidential. It holds up our websites, databases, and entire programs and structures that we depend on every day. This is not news to anyone, and especially not to IT contractors.

Read More

Share

Top 10 Reasons to Get on the GSA Schedule

Top 10 Reasons to Get on the GSA Schedule

Do you know what the real benefits of being on the GSA Schedule are? Learn the top 10 reasons (and advantages) why you should consider it.

Blog Feature

Government Business Development | Technology

Key Takeaways from the NASA SEWP VI Draft RFP

By: Elizabeth Mordica
December 1st, 2023

In October 2023, the 6th generation of NASA’s System for Enterprise-Wide Procurement (SEWP) draft was released for Q&A. This 100+ page draft Request for Proposal (RFP) provided industry with an abundance of information on how to best prepare for the upcoming opportunity. Let's dive into this draft and point out some key takeaways for you to consider.

Read More

Share

Blog Feature

Technology

All About the Newly Proposed Cybersecurity FAR Rules

By: Natalia Ventura
November 29th, 2023

As technology advances, the federal government focuses on adding regulations that improve the security of network systems. In early October, the Federal Register published two proposed cybersecurity Federal Acquisition Regulation (FAR) rules to partially implement Executive Order 14028, “Improving the Nation’s Cybersecurity.” In this blog we will discuss Executive Order (EO) 14028 along with the two proposed FAR rules and how it can impact you as a government contactor.

Read More

Share

Blog Feature

Government Business Development | Technology

GSA's COMET 2 On the Horizon

By: Stephanie Hagan
November 27th, 2023

North pole reindeer won’t be the only thing you think of when you hear the word comet this season—GSA has plans in FY 2024 for version 2 of COMET, a multiple award Blanket Purchase Agreement (BPA) for IT modernization, transformation, and operations/maintenance. COMET, which stands for CIO Modernization and Enterprise Transformation, has awarded task orders totaling almost $1 billion, making it a great success for GSA and all contractors involved, especially when it comes to updating GSA’s legacy systems. GSA wants to continue the success with COMET 2, but make it larger and improve upon certain lessons learned. Here’s what we know so far about COMET 2 and how GSA plans to further the impact of this vehicle.

Read More

Share

Blog Feature

Government | Technology

The Importance of Cyber Hygiene in Government Contracts

By: Stephanie Hagan
October 26th, 2023

If you have a government contract such as the GSA Multiple Award Schedule (MAS), or are thinking about getting one, good cyber hygiene is key. Of course, every company wants to avoid cyber attacks and hacking, but it’s important when you are selling to the federal government to have certain practices in place to proactively safeguard your network.

Read More

Share