CHESS: A Guide to Hardware Procurement

CHESS: A Guide to Hardware Procurement

The CHESS system is roughly divided into hardware (ADMC-3/ADMIC-2, ITES-3H, and MFD), services (ITES-2S, and ITS-SB), and software (ELA, ESI, and ITES-SW). This article will focus on hardware. Much like the game, the US Army’s Computer Hardware, Enterprise Software...
CHESS: A Guide to Software and Services Procurement

CHESS: A Guide to Software and Services Procurement

UPDATE: To learn about ACCENT, the Army’s new cloud program procured through CHESS, click here.  Much like the game, the US Army’s Computer Hardware, Enterprise Software and Solutions (CHESS) fathoms many a seasoned contractor. This article is a guide to everything...
Cybersecurity Hot Topics

Cybersecurity Hot Topics

New Cybersecurity and Infrastructure Protection Agency? As far as hot topics go, cybersecurity seems to be at the forefront of U.S. governmental concerns. 2016 has brought to center a range of cybersecurity issues and legislation. Spurred on by cyber-attacks such as...
Say goodbye to legacy technology!

Say goodbye to legacy technology!

Stuck with old technologies and need a jumpstart to the new age? Then you’ll want to know about the IT resolving fund worth $3.1 billion for IT modernization. The bill was introduced was first proposed by  Federal Chief Information Officer Tony Scott and introduced by...
New Schedule 70 SIN (HACS)

New Schedule 70 SIN (HACS)

The Obama Administration’s Cybersecurity National Action Plan led to a host of government cybersecurity initiatives, including HACS as well as the appointment of the first Federal Chief Information Security Officer Gregory Touhill. (Photo courtesy of USAF) GSA’s IT...

    Start my free 5-day trial

      Member Log In