This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Underlying these tools is a price analysis algorithm that assesses or compares several pricing data points to generate a “market threshold” that can then be used to determine whether a proposed price is fair and reasonable based on the market information available to GSA.
This issue of the Cost Corner concludes our coverage of TINA by addressing DCAA Truth in Negotiations (TIN) compliance audits (defective pricing audits) and identifying best practices for contractors to mitigate defective pricing risk. and evaluate significant variances for potential defective pricing. [48]
Underlying these tools is a price analysis algorithm that assesses or compares several pricing data points to generate a “market threshold” that can then be used to determine whether a proposed price is fair and reasonable based on the market information available to GSA.
Now there is a time and a place for pricenegotiation of course, but if you are an organisation where speed, innovation and agility is really important, key suppliers who play essential roles need to be handled differently. .
Artificial intelligence systems use machine and human-based inputs to- (A) perceive real and virtual environments; (B) abstract such perceptions into models through analysis in an automated manner; and (C) use model inference to formulate options for information or action. IT/Services Committee Meeting with GSA’s Office of IT Category, Feb.
Brian Friel , Co-Founder, BD Squared (confirmed) Kevin Plexico , Senior Vice President, Information Solutions, Deltek (confirmed) David Taylor , Founder & CEO, Federal Budget IQ Cybersecurity, Cloud, & AI Panel: What’s Next for the Federal Market? Pricing details included in the prospectus.
At the ASCEND BPA industry day held on February 8 th this year, FAS indicated that it was starting market research on Pools 2 and 3 and that industry partners should look for a Request for Information (RFI) for those pools this summer. For more information, please contact Heather Tarpley at htarpley@thecgp.org.
Brian Friel , Co-Founder, BD Squared (confirmed) Kevin Plexico , Senior Vice President, Information Solutions, Deltek (confirmed) David Taylor , Founder & CEO, Federal Budget IQ FAR Council & Beyond Panel: What’s Next? Pricing details included in the prospectus. NW, Washington, D.C.
CDC would collect data being reported by states, hospitals, and others and report out critical information needed for state and local health authorities and providers to track, prevent, and treat diseases. The Centers for Disease Control and Prevention (CDC) will continue support to protect the health and well-being of U.S.
This includes staying informed about regulatory requirements, implementing compliance programs, and conducting regular audits to ensure adherence to the rules. These cybersecurity standards are essential for protecting sensitive information handled by contractors working with the United States government.
program requirements proposed at 32 CFR part 170; Add definitions for controlled unclassified information (CUI) and DoD unique identifier (DoD UID) to the subpart; Establish a solicitation provision and prescription; and Revise the existing clause language and prescription.
CIO-SP4 Faces Additional Protests Nextgov reports that the National Institutes of Health Information Technology Acquisition and Assessment Center (NITAAC) CIO-SP4 contract vehicle is under protest once more, with at least four additional complaints being filed with the U.S. Access the recording here. IaaS provider or foreign reseller of U.S.
It would be shifting all risk to the contractor for pricing that the contractor could not estimate with “any reasonable degree of confidence.” [124] If the Government is withholding vital information that arises after award, it is treated as a breach of the implied duty of good faith and fair dealing. or [ ] continued operation.
The joint request for information , which is accepting responses through March 18, is targeted at contractors throughout the mid-Atlantic and Midwest where PJM Interconnection is the regional transmission operator. percent), COVID-19-related information technology efforts (9.9 VHA used 73.8 percent), high-cost medical equipment (0.5
Who uses this information, does a customer agency really care if a contractor does not report it? Less competition from the commercial market means less access to best value, innovative solutions to meet customer agency mission requirements. It imposes significant potential data submission requirements on contractors.
Who uses this information, does a customer agency really care if a contractor does not report it? Less competition from the commercial market means less access to best value, innovative solutions to meet customer agency mission requirements. It imposes significant potential data submission requirements on contractors.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content