This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Artificial intelligence systems use machine and human-based inputs to- (A) perceive real and virtual environments; (B) abstract such perceptions into models through analysis in an automated manner; and (C) use model inference to formulate options for information or action. IT/Services Committee Meeting with GSA’s Office of IT Category, Feb.
During the training, Jason, Liam, and Alex will cover the following topics and more: Pricing – Transactional Data Reporting (TDR)/Commercial Sales Practices (CSP); Domestic Preferences; Supply Chain; Enforcement/Mandatory Disclosure/Ethics; Sustainability Requirements/Policy; and Bid Protests Update.
Brian Friel , Co-Founder, BD Squared (confirmed) Kevin Plexico , Senior Vice President, Information Solutions, Deltek (confirmed) David Taylor , Founder & CEO, Federal Budget IQ Cybersecurity, Cloud, & AI Panel: What’s Next for the Federal Market? Pricing details included in the prospectus.
This includes staying informed about regulatory requirements, implementing compliance programs, and conducting regular audits to ensure adherence to the rules. These cybersecurity standards are essential for protecting sensitive information handled by contractors working with the United States government.
program requirements proposed at 32 CFR part 170; Add definitions for controlled unclassified information (CUI) and DoD unique identifier (DoD UID) to the subpart; Establish a solicitation provision and prescription; and Revise the existing clause language and prescription.
CIO-SP4 Faces Additional Protests Nextgov reports that the National Institutes of Health Information Technology Acquisition and Assessment Center (NITAAC) CIO-SP4 contract vehicle is under protest once more, with at least four additional complaints being filed with the U.S. Access the recording here.
The joint request for information , which is accepting responses through March 18, is targeted at contractors throughout the mid-Atlantic and Midwest where PJM Interconnection is the regional transmission operator. percent), COVID-19-related information technology efforts (9.9 VHA used 73.8 percent), high-cost medical equipment (0.5
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content