Transformation May Be Your Foot in the Door for Federal Sales

By Kevin Shaker, consultant

If you have genuinely transformational technology, public sector IT executives may be willing to listen now more than ever.

In August, public and private sector officials held a series of short discussions on government IT and procurement, emphasizing innovation in everything from protecting critical assets to reforming acquisition methods.

Here are three top takeaways

GSA Schedules

Alan Thomas, commissioner of the Federal Acquisition Service, said plans are being discussed to consolidate schedules for easier acquisition.

Read more of this post

What is a Smart City?

By Rachel Eckert, SLED consultant

Most of us who have been in and around the state, local and education space (SLED) have seen the term “smart city” more times than we can count. A simple search for “what is a smart city” returns dozens of examples, definitions and solution sheets that explain specific implementations being done under the heading of “smart city.” In a nutshell, a smart city is one that aims to improve the delivery of services to its citizens using technology.

That’s a simple definition and easy enough to understand, but, how does a city become smart? What technologies do they use to be smart? How does a vendor approach a city to make it smarter? And when you add in the typical SLED wrinkle with each city being its own fiefdom, finding a common definition and a strategy to target a smart city is understandably difficult.

Let’s dive into that definition a bit deeper. Cities provide all sorts of services to their citizens including public safety, transportation, health care and more. Each year, cities see their populations grow, thus increasing the number of people to whom they must now provide those public safety, transportation or health care services. The problem is that most cities aren’t seeing the same increase in budgets, leaving them with taxed resources and an ever-growing mission.

Read more of this post

National Cyber Strategy – What Does It Mean for Those Selling Security Tools to the Government?

Lloyd McCoy Jr.

By Lloyd McCoy, Market Intelligence Manager

You’ve probably heard of the release last week of both the National Cyber Strategy and the Department of Defense (DOD) Cyber Strategy. Some of the priorities highlighted are robust information sharing, greater resilience, encryption, cyber scalability and hardening of IT systems. In fact, we’ve seen demand for these capabilities reflected in recent cyber budgets which have hovered between $13 and$15 billion over the last couple of years. While the documents bring together much of the cyber policies heard from the administration over the past year, there are some important key takeaways you should be aware of as we head into FY19.

Offensive Cyber
One of the most notable developments is a more overt embrace of offensive cyber operations. The DOD Cyber Strategy especially, hones in on this “defending forward” strategy, where the U.S. will confront threats before they reach U.S. networks.

By giving the government more latitude to conduct proactive and offensive cybersecurity, we could see more funding and resources allocated to these operations as early as next year. Expect more demand for network mapping and reconnaissance, data extraction, firewall tunneling and encryption/decryption tools, just to name a few. I expect most of the funding and demand for offensive cyber tools will be generally confined to U.S. Cyber Command and the intelligence agencies.

Read more of this post

What’s the Future of NETCENTS-2 at Air Force?

Stephanie MeloniBy Stephanie Meloni, consultant

More details have begun to emerge about how the Air Force intends to fulfill procurement of products after NETCENTS-2 expires in November 2019. Recently, GSA blogged about the memorandum of understanding (MOU) between the Air Force and GSA. This MOU outlines a partnership between the two organizations that will allow the Air Force to establish a blanket purchase agreement (BPA) from GSA’s IT Schedule 70. This will entirely replace NETCENTS-2 for products.

The biggest change affecting potential bidders of this contract will be the requirement to be on GSA IT Schedule 70, which can take some time. However, teaming between companies is allowed, so subcontracting may be an option if that is the case. Many of the other details remain the same—the BPA will still be mandatory, as NETCENTS-2 is, and the competition type remains full and open. The ceiling value of the IT Products BPA is anticipated to be slightly lower than the current ceiling of $5.5B over five years. The number of awardees could marginally exceed the twenty-five NETCENTS-2 products category awardees.

Read more of this post

5 Reasons Shutting Down DISA Would Be a Bad Idea

Lloyd McCoy Jr.

By Lloyd McCoy, Market Intelligence Manager

Not for the first or last time, Congress this year considered getting rid of some agencies as a cost-cutting move, and the Defense Information Systems Agency (DISA) may end up on that list. DISA provides networking and communications hardware and software for systems and services across all of the DOD. What might happen if the agency that handles military networking, computing and communications services gets the axe?

Senior leader communication support – DISA provides secure communication services to the White House and to other senior leaders. Keeping the infrastructure and its security under one roof creates operating efficiencies.

CYBERCOM could, theoretically, handle the role, but it would dilute that agency’s core mission of ensuring U.S. military cyber superiority – and force considerable reorganization to do so.

Spectrum management – Managing the electromagnetic spectrum is crucial to the security of communication, navigation and warfighting. That’s part of DISA’s job for the DOD, and it’s more important than ever with the networking of our ground, sea and aviation military assets. It would be a coordination nightmare to make service branches and military agencies share risk assessment and vulnerability information in their warfighting communications.

Read more of this post

Time to Start a New Conversation About AI in Government

Lloyd McCoy Jr.

By Lloyd McCoy, Marketing Intelligence Manager

Artificial Intelligence is becoming a topic of real interest to federal and SLED governments. Companies that sell storage solutions, automation, big data, security and data mining tools should be encouraged to start a new conversation with their clients and prospects. Here are some of the drivers behind AI in government.

Dramatic cost savings
According to Deloitte, low-investment AI could improve human task speeds up to 20 percent. That would save 96.7 million human hours annually in government. A high investment in AI could save well over one billion human hours per year.

Read more of this post

Agencies Starting to Embrace New Telecom Contract

By Kevin Shaker, consultant

In August 2017, the GSA awarded the Enterprise Infrastructure Solutions contract to 10 companies that will provide systems integration work to civilian agencies to update telecommunications infrastructures with modernized next generation networks. The EIS contract replaces the current Networx contact, which expires in FY20. While most agencies are ramping up to use EIS and send out solicitations for telecom projects, the Treasury Department and the Social Security Administration seem to be ahead of the curve.

Iris Cooper, senior procurement executive at Treasury released a statement at the ACT-IAC Network Modernization Forum on June 19, affirming that the department is looking to move forward with EIS and was expected to release its first task order solicitation in early July. Eric Olson, who replaced Sonny Bhagowalia as the Chief Information Officer at the department, will be overseeing this solicitation. In a departure from standard procedure, the contract will not be managed by a contracting officer. Therefore, having his buy-in, along with the blessing of the prime contractor, will be crucial for getting your solution in the door.

Read more of this post

%d bloggers like this: