Generative AI and Specialized Computing Infrastructure Acquisition Resource Guide now available

Goal: Help agencies buy Generative AI

Artificial Intelligence (AI) is one of the most profound technological shifts in a generation or more. If we learn how to harness its power correctly, AI tools could significantly strengthen how the federal government serves the public.

Seeing AI’s potential – and its risks –  the president signed Executive Order 14110 on Safe, Secure, and Trustworthy Artificial Intelligence (AI EO) on October 30, 2023. 

Since it was signed, there has been a lot of activity around highlighting AI use cases and increasing the AI talent and skills in the federal workforce.

I blogged about the procurement considerations it emphasized and we explored the pivotal role of the chief AI officer

The AI EO also sparked an ongoing effort to guide responsible artificial intelligence development and deployment across the federal government. 

Section 10.1(h) of the AI EO asks GSA to create a resource guide to help the acquisition community procure generative AI solutions and related specialized computing infrastructure.

In this post, I’ll describe our new Generative AI and Specialized Computing Infrastructure Acquisition Resource Guide and highlight some of the specific content.

A Focus on Generative Artificial Intelligence

As many of you know, some of the most popular promising tools in the broader field of artificial intelligence are in the field called generative AI.

Fundamentally, generative AI tools are software. It is starting to show up in our email and word processing programs, the search engines we use every day, and the more sophisticated software that agencies rely on. These tools can be helpful for many agencies trying to automate simple tasks or solve complex problems. We’ve seen agencies using generative AI tools to write summaries of rules, create first drafts of memos, and make more helpful chatbots. And many more uses are spooling up right now including using generative AI tools to write computer code and develop new training scenarios for agency staff.

These generative AI tools are getting better and more agencies are asking their contracting officers to help procure the right solutions. 

At the most basic level, because generative AI tools are software, acquiring them must follow the same acquisition policies and rules as other IT and software purchases. Contracting officers should consider cybersecurity, supply chain risk management, data governance and other standards and guidelines just as they would with other IT procurements.

At the same time, generative AI tools are unique. We are all hearing about the risks of generative AI solutions, some of which we talk about in the guide – from bias in how the systems were trained… to “hallucinations” where a generative AI tool states wrong information that it just made up. 

Contracting officers play a critical role in ensuring commercial generative AI offerings conform with federal and agency guidance, laws and regulations and have the right safeguards and protections while enabling their agencies to get the most out of generative AI projects.

We put together the Generative AI and Specialized Computing Infrastructure Acquisition Resource Guide to help contracting officers and their teams understand how to do just that.  

Practical Tips for the Acquisition Community

Because the field is emerging and the use cases are diverse, it’s impossible to provide guidance that applies to every situation. So the guide offers questions that contracting officers should ask and a process to use when scoping a generative AI acquisition. 

The guide also makes a few specific recommendations of other actions the acquisition workforce should take to procure generative AI solutions effectively. Many generative AI tools may already be available to agency staff in tools they use every day or through government cloud platforms they already have accounts on. And these tools may be available through professional service and system integrator contracts the agencies already have in place. In that way, the fastest acquisition may be no acquisition, or as simple as adding more “credits” to an existing cloud platform account. 

Before embarking on a large scale or complex new acquisition for generative AI tools, see if there is a simpler route. Work with your agency’s chief information officer, chief artificial intelligence officer, and chief information security officer to determine what you already have in place and whether you can just use an existing solution or contract.

Here are a few other recommendations in the guide:

  • Start with Your Agency’s Needs. Rather than starting with solutions and specifications, define the problem that the agency wants generative AI tools to help solve.
  • Scope and Test Solutions. Given the evolving nature of most generative AI tools, it is essential for agencies to use testbeds and sandboxes to try solutions before committing to large scale buys with too many unknowns about product performance.
  • Manage and Protect Data. Generative AI relies on data “inputs” to create content “outputs” so it is critical to know where data is coming from, what are its limitations and how data will be used and protected.
  • Control Costs. Generative AI is very often billed like other Software as a Service so usage costs can really grow quickly if not appropriately monitored and managed.

Acquisition staff also benefit from knowing what procurement actions their agency and others have already taken. You’ll also find a searchable data dashboard to give information about recent AI-related contract actions.

Specialized Computing Infrastructure

The guide also talks about “specialized computing infrastructure” per the AI EO. Specialized computing infrastructure can be thought of as the high-performance computers, powerful chips, software, networks and resources made specifically for building, training, fine-tuning, testing, using and maintaining artificial intelligence applications. Computing infrastructure can be on-premise, cloud based or a combination of both.

While most agencies will likely access generative AI tools through the cloud, some agencies may need to build some light specialized computing infrastructure to support their specific requirements.

This is the start.

The biggest challenge to producing any sort of guidance around a technology is anticipating and accommodating change. To do it, we organized a working group, gathered input from a wide array of acquisition specialists and technical experts, and collaborated with our IT Vendor Management Office to inform and support faster, smarter IT buying decisions across the federal community. We welcome your feedback at genai@gsa.gov.

Generative AI technology will continue to evolve. The risks and benefits will shift over time. Agencies will experiment with generative AI tools. And contracting officers will play a critical role by working closely with program and IT staff to find, source and acquire the right generative AI solutions for agencies’ needs. We hope the Generative AI and Specialized Computing Infrastructure Acquisition Resource Guide helps the acquisition community enable their agencies to start to responsibly harness the power of this promising technology and better serve the American people.

Follow ITC on LinkedIn and subscribe for blog updates.

Without you, we can’t make IT happen!

March marks National Procurement Month, a period to honor procurement professionals and the acquisition workforce across industry and government. Professionals like you who give your all to serve the public interest and make things happen.

Whether it’s making the most of emerging technologies like artificial intelligence or securing contracts to improve an agency’s cloud solutions and emergency mobile services, procurement professionals have tangible effects on the American public.

I want to take a moment to acknowledge the acquisition professionals across all levels of government and industry that work with GSA to deliver Best-in-Class service.

Key to successful organizations

Government acquisition professionals are out there every day doing the hard work of evaluating requirements to determine what’s possible, what’s working, and what could be improved. From reviewing offers and making awards, to monitoring the contract progress with a focus on transparency and accountability, you continue to make a difference and ensure taxpayer dollars are spent responsibly.

Team acquisition

Acquisition is a team sport, and as we continue to build IT acquisition vehicles, we recognize how important it is to be engaged and transparent with our agency and industry partners and to embrace innovative acquisition solutions, while learning from stakeholder feedback and expert procurement professionals in the IT field. Each group is instrumental to the success of our mission.

Evolving and improving

New technologies are rapidly changing and improving how we do procurement. Promising new tools such as Robotic Process Automation (RPA), machine learning, and AI are set to further streamline procurement processes and improve supply chain visibility. Credit for much of procurement’s quick tech evolution over the last couple of years can also go to members of the acquisition workforce: Data analysts, chief information officers, and emerging tech subject matter experts who have developed, found, tested and deployed IT solutions that make procurement more efficient and less risky, expanding our ability to directly impact the bottom line and drive successful outcomes for agencies.

Buy, sell — Be part of the procurement picture

Without YOU, we can’t make IT happen! Thank you for your unwavering dedication.
Do you want to continue your professional development as an IT procurement professional? Learn more at GSA’s Information Technology Acquisition University https://gsa.gov/itau or sign up for a training session and earn CLPs at https://gsa.gov/events.

Are you ready to be part of the vendors who support the American public? Find out how to work with GSA and become a vendor at the Vendor Support Center https://vsc.gsa.gov/vsc/.

Follow ITC on LinkedIn and subscribe for blog updates.

Post-Quantum Cryptography — What is it and where to start?

We all know cybersecurity is a dynamic field that is constantly evolving to protect people from the malicious use of technology. As we’ll explore in this post, cybersecurity professionals may soon be called to defend against technologies that blur the limits of classical physics.

What we know

Think back to high school physics, old episodes of the TV show “Nova,” or even the latest superhero movies, and you’ll recall the term “quantum” or “quantum mechanics.” Quantum, simply speaking, refers to what goes on at the subatomic level.

For decades, our friends at the National Institute of Standards and Technology (NIST) marshaled the resources of the federal government in applying the principles of quantum mechanics to information processing. They helped shape the field of quantum information science and birth an entirely new class of devices: quantum computers.

Right now, when a computer tries to solve a complex problem it has to check every possible solution one by one. That takes an enormous amount of time and computational power. Here’s where quantum computers shine. Because they operate at the subatomic level, they can actually explore and check multiple solutions simultaneously, drastically reducing the time needed to find the right answer. This means that tasks that would take classical computers years or even centuries to complete could be done by quantum computers in a matter of minutes or hours. It’s mind-boggling!

The problem

Here’s the catch: quantum computers could also break many of the encryption algorithms we currently rely on to protect sensitive data. We rely on encryption to keep information and data transfers safe both in our government work and everyday life – everything from logging into networks and websites to paying with credit cards. Quantum computers put all of that encryption at risk.

In 2022, the National Security Council issued a warning that certain quantum computers could “jeopardize civilian and military communications, undermine supervisory and control systems for critical infrastructure, and defeat security protocols for most Internet-based financial transactions.”

The Office of Management Budget then issued M-23-02 advising agencies how to take the threat seriously. Importantly, OMB said agencies should prepare to protect their data from quantum computers trying to break their encryption. Such stronger data protections became known as Post-Quantum Cryptography (PQC).

So what technologies and services will agencies need to transition to PQC?

Where to start

The first step, per M-23-02, is for agencies to inventory their active cryptographic systems and re-inventory them annually through 2035. That includes looking at all deployed cryptographic systems used for creating and exchanging encryption keys, providing encrypted connections, or creating and validating digital signatures. GSA has multiple acquisition vehicles ready to help you find the right resources to do that.

  • The Highly Adaptive Cybersecurity Services (HACS) Special Item Number (SIN) also offers quick access to vendors who have been technically evaluated to do such inventories.
  • If an agency has Enterprise Infrastructure Solutions (EIS) Managed Services awarded, it can tap into those suppliers to conduct these assessments.

The way forward

The experts at NIST are leading the effort to develop algorithms designed to withstand quantum computer attacks. NIST has begun the process of standardizing these algorithms — named CRYSTALS-Kyber, CRYSTALS-Dilithium, SPHINCS+, and FALCON. This is the final step before making these mathematical tools available so that organizations can integrate them into their encryption infrastructure. NIST also notes that there will be more post-quantum encryption standards to follow.

Some agencies may wish to start testing the PQC algorithms before they are standardized by NIST. Hardware, web browsers, content delivery networks, cloud service providers, devices and endpoints, and enterprise devices that initiate or terminate encrypted traffic all rely on encryption and might be areas to test pre-standardized PQC algorithms.

If your agency is ready to test or explore quantum computing further, GSA has contracts for that too:

Together, we’re on it

Quantum computers are advancing quickly, increasing the need for reliable PQC solutions. GSA works in close collaboration with NIST and the Cybersecurity and Infrastructure Security Agency (CISA) to keep our contracts aligned with the latest technical and security requirements including emerging PQC standards.

Agencies will need to protect their information systems and data from growing threats. The right suppliers can complement an agencies’ IT and information security staff and resources with relevant products, services and solutions to assess cryptographic risks, test safeguards and identify needed investments.

We look forward to working with more agencies to help them prepare for this imminent post-quantum future. We’re planning to host an in-person Quantum Summit at GSA headquarters on April 16, 2024 from 9-12 EST where you can learn more about quantum resilience from Federal practitioners, so save the date! And while we probably won’t be able to help you traverse time and multiverses like a movie superhero, we are ready to help you get your systems prepared for what comes next. Contact us with your needs and we will help guide you to a solution.

Follow ITC on LinkedIn and subscribe for blog updates.

Acknowledging our Veterans, their contributions to the IT Category

In celebration of Veterans Day, I want to thank our Veterans for their service and dedication. I’m grateful for the sacrifices they have made for us. Our Veterans exemplify the qualities that enable our country to overcome the greatest obstacles.

GSA partnering with Veterans

GSA is dedicated to supporting Service-Disabled Veteran-Owned Small Businesses (SDVOSBs) in the federal IT market. ITC currently has hundreds of highly skilled SDVOSBs between our Multiple Award Schedule – IT (MAS-IT) and the Veterans Technology Services 2 (VETS 2) and 8(a) STARS III IT services Governmentwide Acquisition Contracts (GWAC).

While SDVOSBs have many opportunities to participate in the IT marketplace, VETS 2 is currently the government’s only GWAC set aside exclusively for SDVOSBs.

I’m happy to say that the VETS 2 option was exercised earlier this year in February 2023. In total, 45 industry partners received their option. This will provide federal agencies with continued use of this best-in-class solution for their long-term IT service project needs, with the performance of task orders extending out through 2033. As of August 2023, VETS 2 has had more than 200 task order awards with over $1.4 billion in Obligated Sales and a Total Estimated Sales of over $3B.

The VETS 2 team has been hard at work training government agencies on the use of VETS 2, with more than 3,000 customers trained so far. If you’re interested, visit www.gsa.gov/events for a list of upcoming training opportunities.

SDVOSBs bringing real mission impact

Last year at this time, I shared several examples of the great work of our Veteran partners and I’m happy to bring fresh ones this year:

  • One of the DoD agencies recently awarded a $404 million order through VETS 2 to provide Enterprise IT Support Service for their Combat Capabilities Development Command Aviation and Missile Center (AvMC). Through these IT support services, the SDVOSB will fill the agency’s need to provide the personnel, services, and supplies necessary to enable the full lifecycle of IT support requirements across AvMC.
  • Another DoD agency also awarded a $24M task order award for extensive cybersecurity services. Our VETS 2 industry partners provided the defense agency with a service that is essential to protecting our nation’s security. Cybersecurity has become a fundamental IT service needed to keep our country safe and secure and VETS 2 can deliver these mission-critical national security services.

Veterans, looking to the future

Our commitment doesn’t stop with our existing contracts. Our next small business GWAC, Polaris, will have an SDVOSB pool as well. Polaris is being designed to assist agencies in acquiring customized IT services and IT services-based solutions while expanding opportunities for SDVOSB firms. Stay tuned to our Small Business Community of Practice Interact page for updates.

I’m grateful for the meaningful partnership we have with our SDVOSBs and for their continued hard work and dedication to helping agencies achieve their missions every day. I’m really excited for what the future holds.

Visit our website to learn more about VETS 2, MAS-IT, and Polaris or use our IT Solutions Navigator to find the vehicle that’s right for you.

Follow ITC on LinkedIn and subscribe for blog updates.

Find cybersecurity solutions in IT Services GWACs

In a post earlier this month, I talked about the Cybersecurity Battle Ground with various Administration strategies, executive orders, and some of the resources that we’ve developed to help you navigate this guidance. If you haven’t read that post yet, I suggest you check it out.

Today, I thought I’d talk about some of the acquisition contracts that we’ve developed to help you get on-the-ground support with your cybersecurity efforts.

MAS and beyond

When you think cybersecurity, and you think GSA, the Multiple Award Schedule (MAS) for Information Technology (IT) probably comes to mind. We have a lot of great cybersecurity solutions there, including the Highly Adaptive Cybersecurity Solutions (HACS) Special Item Number (SIN), a variety of Continuous Diagnostics and Mitigation (CDM) tools, and Zero Trust Architecture (ZTA) solutions.

True, MAS-IT is a great place to cover your cybersecurity needs, but it’s not the only place. Depending on your overall acquisition goals, GSA’s Governmentwide Acquisition Contracts (GWACs) are a great path as well. These IT Services-first contracts are considered by the Office of Management and Budget to be Best-in-Class and have a host of capabilities to meet cybersecurity needs; from ZTA to IPv6, to insider threat detection and mitigation services.

I thought it would be interesting to analyze the data in our GWAC Dashboard to see what I could find by simply pulling the data by contract and searching for ‘Cyber’*. This is definitely not a comprehensive review of our cybersecurity offerings on the GWACs, but this gives a great sense of the work that’s happening.

* This can be done by going to the “DATA Feed” tab, clicking on the “Choose a format to download” icon at the bottom right, and selecting “Crosstab.” This will result in an Excel file with more information than can be easily displayed in the web dashboard.

8(a) STARS III

Federal agencies have leveraged the 8(a) STARS III GWAC, for example, to protect against cyber threats. 8(a) STARS III industry partners have supported America’s government by creating cyber risk assessments, performing enterprise penetration testing, and establishing security assessment reports. 8(a) STARS III has 23 task orders with an estimated value of more than $141.8 million for cyber-related activities. The Department of Treasury and the Department of Homeland Security are among the biggest users of 8(a) STARS III for cybersecurity services.

VETS 2

The VETS 2 GWAC is another great example. This Service-Disabled Veteran-Owned Small Business GWAC currently has more than $118 million in estimated value from 10 task orders ranging from IT Security Risk Management Framework (RMF) and Assessment and Authorization (A&A) Services to cybersecurity architecture and engineering services. Some of VETS 2’s biggest cybersecurity customers are the Department of Treasury, the Department of Homeland Security, and the Army.

Alliant 2

Alliant 2 data shows a similar story. There, we find 25 task orders for a total estimated value of $2.2 billion. These task orders relate to Federal Public Key Infrastructure (FPKI) support services to cybersecurity – supply chain risk management (C-SCRM) support services and beyond.

Again, these are just task orders with the term ‘cyber’ in the description field. Even more come through when we add the term ‘IT security’.

The right cybersecurity solutions

As we continue to observe Cybersecurity Awareness Month, I wanted to bring attention to the ‘where’ of conveniently getting the cybersecurity solutions agencies need to protect their systems as agencies move to create a safer and more secure digital future.

Visit our website to learn more about cybersecurity or use our IT Solutions Navigator to find the vehicle that’s right for you.

Follow ITC on LinkedIn and subscribe for blog updates.

The Cybersecurity Battleground

Reflecting on the past, envisioning the future

This month marks the 20th anniversary of Cybersecurity Awareness Month, as well as the beginning of a new government fiscal year. I’d like to take this milestone opportunity to delve into some recent notable cybersecurity events, the broader implications for government agencies, and my vision as GSA continues to play a pivotal role in positioning agencies to create a safer and more secure digital future.

The 2023 Verizon Data Breach Investigations Report shows external actors were responsible for 83% of breaches. Continued cyber breaches, such as Volt Typhoon and the MOVEit application exploit not only cause disruption and pose a serious threat to our national security, but lay the groundwork for more sophisticated cyber attacks. Hackers will leverage any flaw in the cyber environment to gain access to sensitive information. Our adversaries are not resting, and neither can we.

In March 2023, the White House released an updated National Cybersecurity Strategy with ongoing initiatives aimed at enhancing the nation’s cybersecurity capabilities and comprehensive approach. It aligns numerous strategic objectives under five pillars:

  1. Defend Critical Infrastructure
  2. Disrupt and Dismantle Threat Actors
  3. Shape Market Forces to Drive Security and Resilience
  4. Invest in a Resilient Future
  5. Forge International Partnerships to Pursue Shared Goals

The White House later published its National Cybersecurity Strategy Implementation Plan which includes specific guidance for agencies as they implement the strategy’s requirements and key objectives.

The Department of Defense completed its Cyber Strategy in May 2023. The strategy underscores the ongoing advancement of Zero Trust Architecture (ZTA) and the technological solutions and services to fortify critical infrastructure, ensuring vital systems and assets are safeguarded. In August 2023, the Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) released a Cybersecurity Strategic Plan that aligns with the National Cybersecurity Strategy and lays out how agencies can fulfill their cybersecurity mission over the next three years. As plans are implemented, GSA is prepared to incorporate updated frameworks and standards into our solutions to meet agencies’ needs and requirements.

As we move forward into the new fiscal year, the Office of Management and Budget (OMB) continues to emphasize cybersecurity priorities for civilian agencies to consider when developing FY24 and FY25 budget requests. These include continued implementation of ZTA, investment in Cybersecurity Supply Chain Risk Management (C-SCRM) practices, and most recently Post-Quantum Cryptography (PQC). Details can be found in the OMB Memorandum M-22-16, M-23-18, and the Quantum-Readiness: Migration to Post-Quantum Cryptography fact sheet. Additionally, OMB outlined Research and Development Priorities for the FY25 budget which include addressing cybersecurity risks through resilient architectures. As the cybersecurity landscape is in a constant state of evolution, adapting to new guidance is imperative to Improving the Nation’s Cybersecurity.

How GSA supports agencies

GSA recognizes that every agency has unique needs, but the overarching goals remain. That is why GSA works diligently to support the modernization of security to enhance cyber resilience, protect important information, and maintain systems access and function.

To help agencies meet their goals, GSA developed a suite of resources on cybersecurity topics, such as ZTA and C-SCRM. Buyer’s guides and informational videos are available to help identify which solutions best fit agency IT security needs. In addition, our acquisition templates make procuring the products and services that modernize security and strengthen cyber resilience easy and efficient. Find the guides and more at www.gsa.gov/itsecurity.

Our commitment

At GSA we understand collaboration with other agencies, and our industry partners, is crucial for addressing the evolving and global nature of cybersecurity threats. We are committed to continue our efforts to provide comprehensive and impactful government-centric cybersecurity solutions that address the need for modernization today and protect assets from the cyber threats of tomorrow.

Stay up to date

We are available to agencies throughout the entire acquisition lifecycle. The GSA IT Category team offers subject matter expertise and is available to answer questions related to purchasing a full range of IT products and services. Please contact the IT Customer Service Center at 855-ITaid4U/855-482-4348 or itcsc@gsa.gov.

Follow ITC on LinkedIn and subscribe for blog updates.

Working on a critical acquisition? Start with GSA’s Market Research as a Service

Before making a mission-critical acquisition, agencies can save time and resources in finding compliant suppliers, capabilities, competition levels and more to understand the market landscape. GSA’s Market Research as a Service (MRAS) conveniently delivers meaningful market data at no cost to federal, state, and local agencies.

How does MRAS work with agencies?

Through FAR Part 10-compliant Requests for Information (RFIs), sources sought, industry days, and advanced product research, MRAS collects data to help customers understand where their need fits within the GSA governmentwide marketplace.

MRAS experts partner with federal, state, and local agencies to create customized RFIs and help agencies shape their overall acquisition strategy with a thorough, tailored market research report. These services are available at no cost and can be completed typically in two weeks or less.

Record of success with MRAS

In three years, MRAS has conducted over 3,000 RFIs for customers, including more than 25% specifically for IT Category Special Item Numbers (SIN) on the GSA Multiple Award Schedule (MAS).

Top customers served:

  • U.S. Air Force
  • U.S. Army
  • U.S. Navy

Better techniques, better results, Best in Class

The MRAS team uses extensive technology tools and the latest research techniques to generate the best information for customers, and generates a list of vetted, Best in Class GSA industry partners who can fulfill a customer’s unique requirements. The team also works closely with GSA’s talented Customer Service Directors (CSD) to research and review the category, SIN, or contract that best meets the customer’s requirements while following applicable compliance guidelines and maximizing resources.

Customers can review the results of their MRAS request with a member of GSA’s CSD team to answer questions and consider next steps.

Recently, the MRAS team produced a market research report for a multimillion-dollar Department of Defense (DOD) project at Nellis Air Force Base, Nev. and Fort Irwin, Calif. In less than two weeks, the team identified more than 40 potential sources. DOD ultimately found a winning match on the MAS IT professional services SIN.

GSA’s MRAS – Your free resource to start your agency’s successful acquisition journey

GSA’s MRAS offers customers invaluable help through a key component of the acquisition process. MRAS helps agencies make informed acquisition decisions precisely and efficiently. Contact MRAS to learn more and get started today.

Follow ITC on LinkedIn and Twitter, and subscribe for blog updates.

Celebrating two years of 8(a) STARS III

8(a) STARS III officially launched two years ago this month, and it’s worth celebrating this important anniversary milestone. This governmentwide contract has really hit the ground running, and I couldn’t be more proud of its success in helping agencies achieve their missions. I’d like to share why we are so happy with this program.

Supporting the mission of government

8(a) STARS III is a competitively awarded, multiple-award, indefinite-delivery/indefinite-quantity governmentwide acquisition contract (GWAC) set aside for participants in the Small Business Administration’s 8(a) program. 8(a) STARS III is GSA’s fourth-generation 8(a) GWAC and continues the legacy of creating opportunities for small disadvantaged businesses while helping federal agencies meet their socioeconomic goals and mission-critical IT requirements. 

STARS III delivers opportunities to more than a thousand 8(a) businesses and drives progress on important public policy objectives, including the President’s Executive Order on Advancing Racial Equity and Support for Underserved Communities Through the Federal Government as we work to improve diversity, equity, inclusion, and accessibility.

Phased award approach

We awarded cohort one of 8(a) STARS III in June 2021 to 448 industry partners. Then awards for cohort two were announced in February 2022 to nearly 600 additional awardees. The third and final cohort award happened in June 2022 for an additional 65 awardees – just one year ago.

Traditionally, we made awards in one batch, but with 8(a) STARS III, we reinvented the award process. Using an innovative cohort approach, we gave 8(a) firms additional opportunities by allowing initially unsuccessful offerors a second and third chance. 145 of these cohort two and three industry partners have received task order awards proving that they can be successful if given an opportunity.

Major success

In just two years, 8(a) STARS III secured $1 billion in obligations through 600 task order awards to 309 small disadvantaged businesses. Notability, 177 of them have never had a task order award through GSA before. That’s incredible and really shows how 8(a) STARS III is building opportunities for the community. 

Agencies adopting 8(a) STARS III

37 federal agencies have already put their faith in the contract with an award, and more than 2,656 acquisition professionals from 54 agencies have signed up and received their delegation of procurement authority training. 

Those agencies are leveraging the contract for a variety of IT Services to meet their mission, including help desk support, database administration, emerging technologies, custom software and applications development, systems integration, and cybersecurity solutions to secure the enterprise.

Hand-in-hand with industry

This doesn’t happen all by itself. We’ve worked hard to build meaningful relationships with these small businesses through one-on-one engagement, monthly snapshot newsletters for awardees, video tutorials, and even through our new GSA Does That podcast. We’ve also created an 8(a) STARS III Resource Center where our industry partners can find just about everything that they need to be successful.

Empowering small businesses

Again, I couldn’t be more proud of 8(a) STARS III as we empower disadvantaged small businesses to deliver mission-critical IT services to the government. Visit our website to learn more about www.gsa.gov/stars3.

Follow ITC on LinkedIn and Twitter, and subscribe for blog updates.

Alliant 2 GWAC: Empowering businesses, large and small

We recently announced that we exercised the option on the Alliant 2 Governmentwide Acquisition Contract. This is important because it will allow Alliant 2 to continue delivering cutting-edge technology solutions for federal agencies. What’s equally important is how Alliant 2 has demonstrated its unwavering commitment to small businesses. I’d like to take a moment to highlight the outstanding performance of Alliant 2 in exceeding small business subcontracting goals, fostering diversity, and propelling economic growth.

Committed to small business

Alliant 2 has set new benchmarks by surpassing our small business subcontracting goals. The contract achieved an impressive overall small business subcontracting goals rate of 55.5 percent in option year five. This noteworthy accomplishment not only exceeds the target goal of 50 percent, but also showcases the program’s dedication to supporting small businesses.

The commitment to small business subcontracting through Alliant 2 has resulted in a substantial economic impact. Cumulatively to date, the contract has facilitated an impressive $2.67 billion for overall small business subcontracting. This remarkable figure highlights the significant role played by small businesses in delivering innovative IT solutions to federal agencies.

Further, Alliant 2 has promoted diversity, equity, and inclusion within the federal marketplace. It exceeded the goals in Small Disadvantaged Business (SDB) and Women-Owned Small Business (WOSB) categories, achieving rates of 25 percent and 26 percent, respectively. Additionally, Alliant 2 has made notable progress in the HUBZone, Veteran-Owned Small Business (VOSB), and Service-Disabled Veteran-Owned Small Business (SDVOSB) categories. HUBZone achieved 10 percent, VOSB achieved an impressive 20 percent, and SDVOSB reached 13 percent – each individually exceeding their respective 3 percent goal.

Empowering small businesses

The success of Alliant 2 in meeting and exceeding subcontracting goals demonstrates its commitment to empowering small businesses. By providing subcontracting opportunities, the program enables small businesses to contribute their expertise, gain valuable experience, and thrive within the federal marketplace. Through Alliant 2, small businesses have the chance to showcase their capabilities and play a vital role in delivering innovative IT solutions to federal agencies.

Alliant 2’s support of small businesses demonstrates our dedication to fostering economic growth and promoting diversity within the federal marketplace. By empowering small businesses, the program paves the way for innovation, collaboration, and increased efficiency.

For more information, visit gsa.gov/alliant2.

Follow ITC on LinkedIn and Twitter, and subscribe for blog updates.

Drive success in the modern workplace with GSA’s Training Courses SIN

In today’s fast-paced world, continuous learning and development are essential for individuals and organizations to stay competitive. With this in mind, we developed the comprehensive Training Courses Special Item Number (SIN) on the GSA Multiple Award Schedule, which provides government agencies with access to a broad range of training courses to enhance the knowledge, skills, and abilities of their employees.

This blog post is part of a series where we’re discussing each of GSA’s key IT Services SINs on the GSA Multiple Award Schedule. Each blog will discuss the benefits for agencies in using the solution, take a look at who is using it, and share an example of how an agency successfully used the SIN to achieve its mission.

Benefits of using the Training Courses SIN:

  1. Improved employee performance: Provides access to courses designed to improve employee performance, enhance skills, and build knowledge in a variety of IT areas.
  2. Staying ahead of the curve: Provides agencies with training on hardware, software, cloud, and other IT systems.
  3. Flexible learning: Offers flexible learning options, including in-person, online, and blended learning formats. 
  4. Cost-effective: Helps agencies save time and money by providing access to pre-negotiated pricing with qualified vendors. 
  5. Compliance: Offers compliance-related courses that help agencies meet regulatory requirements, such as cybersecurity training, ethics, and anti-harassment training.

Top agencies

Agencies invested more than $46 million through the Training SIN last year. Here are some of our biggest users:

  • Social Security Administration
  • General Services Administration
  • Department of the Navy
  • Department of the Air Force
  • Department of the Army
  • Department of Veterans Affairs
  • Department of Agriculture
  • Department of Defense

Use Case: How the IT Training SIN helped agencies quickly and easily install learning options during the COVID-19 pandemic

An agency needed to quickly install distance learning options for their employees during the COVID-19 pandemic. Using the IT Training SIN, they were able to contract with multiple vendors to provide virtual training, both customized training as well as commercial off-the-shelf solutions for employees.

The solution also facilitated the award of completion certificates for employees, and the agency was able to easily track which courses were most popular to then increase the availability of training in those subjects.

In another example, during the COVID-19 outbreak, a military base had to quickly deploy virtual courses for officers and enlisted personnel. They used the IT Training SIN for detailed leadership training by leveraging commercial off-the-shelf courses in leadership and program management.

This meant that even during an almost two-year pandemic, more than 75 critical employees received training through one thousand hours of CLP-accredited courses. It also allowed the base to track certificates of completion in real-time.

Additionally, they used small businesses for training. As a result, over 300 employees were trained virtually.

Driving government workforce success

Agencies are modernizing their operations to better accomplish their missions. These changes impact the IT implemented at agencies, and employees need training on how to effectively use those IT products. The Training Courses SIN provides access to IT training courses to support any IT training need by allowing centralized access to pre-approved training courses, thereby saving federal, state, local, and tribal agencies time and resources.

Follow ITC on LinkedIn and Twitter, and subscribe for blog updates.