Contracts/Awards

  • Demand for vendor-furnished information security products and services by the U.S. federal government will increase from $8.6 billion in 2010 to $13.3 billion in 2015 at a compound annual growth rate (CAGR) of 9.1%. INPUT\'s John Slye explains why.

    December 06, 2010
  • Several of the most promising technological research projects at University System of Maryland-related labs are getting a strategic infusion of federal cash to help them through the most difficult phase of development, and toward the commercial market. Maryland\'s Jacques Gansler explains.

    December 06, 2010
  • IBM has a new tool to spot security vulnerabilities even while they\'re being written.

    December 06, 2010
  • Arnold Fields, the special inspector general for Afghanistan reconstruction, failed to convince his congressional critics that he\'s qualified to handle his watchdog job.

    December 03, 2010
  • Global Computer Enterprise submits a complaint to GAO after DHS awards the deal to CACI last month.

    December 02, 2010
  • According to a special report on Afghanistan prepared by KGS NightWatch, the number of clashes in October remained elevated at 701. The highlight of the month was the relative calm in Kabul and Parwan Provinces in central Afghanistan. That contrasted sharply with a surge of attacks in Kandahar, the setting for the latest Coalition offensive. 16 of the 34 provinces account for up to 90 percent of the fighting. The Pashtun heartland showed the sharpest deterioration. At current force levels backed by air power, the security situation in Afghanistan should be containable. For the full report, visit KGS NightWatch.com.

    December 02, 2010
  • Professional Services Council\'s Stan Soloway discusses how the new deficit commission plan will affect the contracting community.

    December 02, 2010
  • WFED\'s Jason Miller discusses OMB\'s plans to change IT acquisition and management.

    December 02, 2010
  • Washington said he wants to pursue work in the commercial aviation industry.

    December 02, 2010
  • Is it the little-engine-that-could, or a zombie that can\'t be killed? The controversial alternative engine for the F-35 fighter jet is back in the news.

    December 02, 2010
  • Increased reliance on the internet, networked systems, and connectivity creates opportunities for cyber attackers to disrupt government operations, as well as U.S. critical infrastructure.

    December 02, 2010
  • Jon Jordan, Deputy Commissioner of GSA\'s FAS, joins host Larry Allen to discuss the recent Excellence in Partnership Awards. November 30, 2010

    December 01, 2010
  • The contract could be worth $6 million over four years. GSA said it wants Unisys to replace several different versions of IBM\'s Lotus Notes and Domino software.

    December 01, 2010
  • WikiLeaks released more than 250,000 US embassy and consulate cables to The New York Times and other media. They include candid views of world leaders, foreign government negotiations and assessments of nuclear and terrorist threats. This could prove vastly more damaging to US interests and security than the tactical reports leaked earlier this year. State Department reports often describe long-standing issues of leadership, political conditions, and highly privileged conversations. While most information will have little value, the volume is so large that it will certainly reveal thousands of highly insightful and embarrassingly confidential assessments.

    December 01, 2010