Search results
Results from the WOW.Com Content Network
The Department of Defense announces contracts valued at $7 million or more each business day at 5 pm. [2] All defense contractors maintain CAGE (Commercial and Government Entity) Codes and are profiled in the System for Award Management (SAM).
The Joint Enterprise Defense Infrastructure (JEDI) contract was a large United States Department of Defense cloud computing contract which has been reported as being worth $10 billion [1] [2] over ten years. JEDI was meant to be a commercial off-the-shelf (COTS) implementation of existing technology, while providing economies of scale to DoD.
A defense contractor is a business organization or individual that provides products or services to a military or intelligence department of a government.Products typically include military or civilian aircraft, ships, vehicles, weaponry, and electronic systems, while services can include logistics, technical support and training, communications support, and engineering support in cooperation ...
Data requirements can also be identified in the contract via special contract clauses (e.g., DFARS), which define special data provisions such as rights in data, warranty, etc. SOW guidance of MIL-HDBK-245D describes the desired relationship: "Work requirements should be specified in the SOW, and all data requirements for delivery, format, and ...
The Defense Technical Information Center (DTIC, / ˈ d iː t ɪ k / [2]) is the repository for research and engineering information for the United States Department of Defense (DoD). DTIC's services are available to DoD personnel, federal government personnel, federal contractors and selected academic institutions.
Contract administration within DoD has been studied and modified for many years. In the early 1960s, a study was commissioned by the Secretary of Defense to examine the entire DoD contracting process. Known as "Project 60," the findings pointed to numerous benefits of consolidating contract administration and audit.
Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). [1] It performs automated vulnerability scanning and device configuration assessment.
The contract directed AMS to build the Standard Procurement System through an incremental process on top of the company's existing Procurement Desktop - Defense (PD 2) application. [ 1 ] SPS is one of the first DoD software acquisitions using Federal Acquisition Regulation (FAR) Part 12 - Acquisition of Commercial Items rules. [ 2 ]