CHESS: A Guide to Hardware Procurement

CHESS: A Guide to Hardware Procurement

The CHESS system is roughly divided into hardware (ADMC-3/ADMIC-2, ITES-3H, and MFD), services (ITES-2S, and ITS-SB), and software (ELA, ESI, and ITES-SW). This article will focus on hardware. Much like the game, the US Army’s Computer Hardware, Enterprise Software...
Cybersecurity Hot Topics

Cybersecurity Hot Topics

New Cybersecurity and Infrastructure Protection Agency? As far as hot topics go, cybersecurity seems to be at the forefront of U.S. governmental concerns. 2016 has brought to center a range of cybersecurity issues and legislation. Spurred on by cyber-attacks such as...
Take HUBZone by the Horns!

Take HUBZone by the Horns!

What are HUBZones? HUBZones, Historically Underutilized Business Zones, were created in 1997, as part of the Small Business Reauthorization Act, to provide government contracting assistance to small businesses located in these zones.   The pre-conditions for a company...
New Schedule 70 SIN (HACS)

New Schedule 70 SIN (HACS)

The Obama Administration’s Cybersecurity National Action Plan led to a host of government cybersecurity initiatives, including HACS as well as the appointment of the first Federal Chief Information Security Officer Gregory Touhill. (Photo courtesy of USAF) GSA’s IT...
Say goodbye to legacy technology!

Say goodbye to legacy technology!

Stuck with old technologies and need a jumpstart to the new age? Then you’ll want to know about the IT resolving fund worth $3.1 billion for IT modernization. The bill was introduced was first proposed by  Federal Chief Information Officer Tony Scott and introduced by...

    Start my free 5-day trial

      Member Log In