DHS Issues RFI for FirstSource II IT Contract

March 2011
TR2: Terror Response Technology Report;3/30/2011, Vol. 7 Issue 7, p20
Trade Publication
The article reports on a Request for Information issued by the U.S. Department of Homeland Security (DHS) to aid it develop an acquisition approach for the FirstSource II program, which is the DHS enterprise-wide vehicle for a series of information technology commodities.


Related Articles

  • DHS Embraces the Cloud.  // Information Management Journal;Jan/Feb2011, Vol. 45 Issue 1, p8 

    The article reports on the move of the Department of Homeland Security (DHS) in enforcing a private cloud infrastructure to better streamline and supervise its information technology (IT) infrastructure in the U.S.

  • DHS S&T Issues FRI for IT Security Compliance Testing.  // TR2: Terror Response Technology Report;12/7/2011, Vol. 7 Issue 25, p14 

    The article reports that the U.S. Department of Homeland Security Science and Technology Directorate was seeking information connected to proposals that manage the current information technology security standards of the directorate.

  • DHS revamp on tap. Carlson, Caron // eWeek;5/26/2003, Vol. 20 Issue 21, p33 

    After months of criticism from the information technology industry that the U.S. administration is devoting insufficient resources and attention to cyber-security, the Department of Homeland Security is already restructuring to give network safety a higher profile. Federal research officials...

  • DHS Awards 11 Small Firms Potential $3 Billion For IT Commodities.  // Defense Daily;2/14/2007, Vol. 233 Issue 29, p8 

    The article reports that the U.S. Department of Homeland Security (DHS) awarded small businesses indefinite delivery/indefinite quantity contracts under the potential FirstSource program. The program aimed at providing the department and its various agencies the competitive base from which to...

  • Departures cast doubt on IT security at DHS . Carlson, Caron // eWeek;4/28/2003, Vol. 20 Issue 17, p9 

    Focuses on the doubt about security and safety of information technology networks of the U.S. Department of Homeland Security after resignation of two cyber security experts of U.S. President George W. Bush's administration. Chances of Robert Liscouski, former director of Coca-Cola Co. to be...

  • Study: Government spending more on IT. Taft, Darryl K. // eWeek;4/28/2003, Vol. 20 Issue 17, p32 

    Reports the U.S. government has been spending more on information technology (IT) despite of economic downturn. Total federal spendings expected in years 2003 and 2008; Opportunities for IT contractors due to spendings in Department of Homeland Security; Effect of consolidation of IT agencies...

  • Information Technology: DHS Needs to Fully Define and Implement Policies and Procedures for Effectively Managing Investments: GAO-07-424. Byrd, Robert C.; Cochran, Thad; Price, David E.; Rogers, Harold // GAO Reports;4/27/2007, p1 

    The Department of Homeland Security (DHS) relies extensively on information technology (IT) to carry out its mission. For fiscal year 2008, DHS requested about $4 billion--the third largest planned IT expenditure among federal departments. Given the size and significance of DHS's IT...

  • DHS Issues Draft RFP for EAGLE II Acquisition.  // TR2: Terror Response Technology Report;5/26/2010, Vol. 6 Issue 11, p24 

    The article reports on draft Request for Proposals (RFP) issued by the U.S. Department of Homeland Security (DHS) for the Enterprise Acquisition Gateway for Leading Edge Solutions (EAGLE) II procurement, which aims to provide information technology (IT) support services.

  • Homeland Security: DHS Enterprise Architecture Continues to Evolve but Improvements Needed: GAO-07-564.  // GAO Reports;5/9/2007, p1 

    GAO designated the transformation of the Department of Homeland Security (DHS) as high risk in 2003, and it continues to do so today. One essential tool for facilitating organizational transformation is an enterprise architecture (EA)--a corporate blueprint that serves as an authoritative frame...


Read the Article


Sign out of this library

Other Topics