GSA readies WITS 3 solicitation

The General Services Administration plans to issue a final request for proposals</a> this month for its eight-year, $1.8 billion Washington Interagency Telecommunications System 3 program.

Preston named SBA administrator

Steven Preston, a financial management expert, was sworn in Monday as the new administrator of the Small Business Administration.

EFJ buys 3e Technologies International

EFJ Inc. has acquired 3e Technologies International Inc., a wireless security company, for $36 million in cash.

DHS seeks second data center

The Homeland Security Department is looking to IT companies for ideas on building a second, redundant data center to supplement the one it operates under an agreement with the Navy.

Defense to restructure contracting in Iraq

The Task Force to Support Improved DOD Contracting and Stability Operations in Iraq will evaluate Defense business enterprise processes and systems in Iraq affecting contracting and other processes.

Market Watch: Equity groups give owners a second bite at growth

In the last five years, private equity groups have discovered the federal services industry. Specifically, they're finding that it provides owners, managers and employees with an attractive alternative to a sale to a strategic buyer.

What a relief

Cities and counties across the country are seeking the latest technology and are looking at IT outsourcing as a way to improve services while reducing operating costs.

Ken Lloyd | Survival Guide: Perspectives from the field

We've all run into them: the project manager who manages by screaming; the deputy-assistant-whatever who belittles everyone; the suck-up associate who cannot kiss up enough. You want to do a good job, but dealing with the jerk is making you nuts. How do you get through this, professionally and sanely?

Small business | In brief

The Homeland Security Department anticipates announcing in July the winners of FirstSource, a $3 billion small-business IT contract to help the department integrate and standardize its IT systems and tools.

Infotech and the Law | Keep close tabs on your inner lobbyist

If you are, in even a loose sense of the word, lobbying someone in the government in an effort to get, modify or extend a contract, you may need to disclose that activity.

Homeland watch | In brief

Instead of hardening all critical infrastructure, focus should be on ensuring continuity of essential systems, advises a recent report by former White House cyber czar Richard Clarke and the Century Foundation.

Homeland watch | In brief

Instead of hardening all critical infrastructure, focus should be on ensuring continuity of essential systems, advises a recent report by former White House cyber czar Richard Clarke and the Century Foundation.

Buy Lines | Untying a knot in the acquisition lexicon

People in government and industry continue to confuse "assisted acquisition" with "direct acquisition" when talking about how purchase requests for items available under pre-negotiated contracts become purchase orders.

'We want them to approach us'

If RS Information Systems Inc.'s federal contracts were a remake of the movie "A Star Is Born," 1 Source Consulting Inc. would play the title role: the character who starts out in a supporting part but quickly is tapped to headline the show.

IT projects take a hit

Congress' willingness to consider gutting a program considered essential for government employees has industry and government officials wondering if lawmakers are targeting civilian IT projects for cuts in order to fund the war on terror.

Neither rain, nor snow, nor bird flu

Nicked by the recent rash of laptop thefts and natural disasters that cripple business operations, the federal government has renewed its push for agencies to beef up their telework plans.

More than just server backups

Over the years, the Army Knowledge Online portal has evolved into what military leaders envisioned it would become: a single point where warfighters and their support networks could log in and access applications and services. But it had a serious flaw.

Let's go to the tape

What may appear to be harmless loitering near the entrance of a subway tunnel could escalate quickly into a terrorist attack. Video surveillance helps monitor such vulnerable public areas, but the growing numbers of cameras have put a strain on the people tasked with monitoring them.

The business of security ? and security in business

For any frequent user of public transportation, the bombings in London in July 2005 were the stuff of nightmares. You get on a train with a few hundred strangers, and you're sent hurtling through dark tunnels. In the aftermath of the London incidents, even a routine delay or breakdown on a subway causes a prickle of anxiety.

Promise and peril in mentor programs

As the new millennium dawned, Force3 Inc. was on the verge of graduating from the Small Business Administration's 8(a) program. Company officials knew major internal improvements and upgrades to its strategy were needed to compete on the open market.