Vendors need to be ready to answer questions about cost, security and applications when their customers look to the cloud computing, writes DLT Solutions CIO Van Ristau.
Five Wisconsin lawmakers are urging the VA and Defense departments to consider the benefits of a single vendor for an electronic health record system, according to a Nextgov report.
Alleged missteps in the selection of Boeing Co. as prime contractor for a new intelligence-gathering aircraft system bound for Afghanistan have grounded the project until the Army can redress the issues.
The government is broke. Nevertheless, there is some good news for the government contracting community if you can help agencies save money, says former Congressman Tom Davis.
Cloud computing's acceptance across a wide swath of government is inevitable. For contractors, some will get hurt and others will flourish. Which side will you be on?
The Homeland Security Department canceled the SBInet border surveillance system two months ago, but SBInet-like capabilities will live on in the new system proposed for some parts of the border, a GAO official says.
Government contractors must have a chief financial officer who understands operations, business development and other critical issues that affect a company's success.
Tired of expensive IT projects that fail and tight budgets, government agencies are demanding faster and more flexible prime contractors. Can your company make the shift?
The SBInet system might be gone, but the need for border security continues. What lessons did DHS and industry learn from the attempt to build a virtual fence along the border of the United States and Mexico?
The words you pick when you write a proposal are often the most critical decisions you make. Here's a quick guide to the words that can kill your proposal.
Accuvant Inc., an information security provider, has just launched Accuvant Federal Solutions, its cybersecurity business unit specifically for government clients. The Denver-based company currently protects more than 2.3 million government endpoints from malicious threats.