Welcome Login

For current information from GSA about COVID19 please click HERE

You are here


Hope this post finds everyone well (or at least tolerating) and would ask that you consider our next area of research required to form the Alliant 2 family of contracts.

This post will address the emerging trends associated with information technology and contract inclusions required to ensure the new Alliant family is market focused and capable of offering solutions to agencies for many years to come. 

Frankly we are limiting our research to those buzz trends we all hear about at happy hour and  expect there are other IT trends we should consider.   At present, we have reviewed (or are reviewing) and are considering language to address:

  • Cyber and Information Security
  • Mobility and Managed Mobility
  • The “New Cloud” shift and all the “as a service” offers emerging as a result
  • Cloud brokerage
  • Big Data
  • Supply chain management
  • Display technologies
  • Battery and power solutions
  • Predictive analytics
  • Advancements in Health IT and nano technology


  1. How critical do you think any of these trends will be over the next 10-15 years?
  2. Which are your top three?
  3. Are we missing emerging trends that you are tracking?
  4. Which of the above should we ignore for now?

As always – thank you. 


Views: 11785


<p>I&#39;d add Asset Management to your list. &nbsp;Not glamorous, but seems to get neglected. &nbsp;There are a lot of information resource and facilities and equipment cost savings possible at the agency and department levels if there were more of a focus on consolidation and management of information and other types of resources - equipment, facilities, vehicles, software, hardware, infrastructure, personnel. &nbsp;Some of that is happening with data center consolidations. &nbsp;But we see a lot of duplication of custom asset tracking and management systems within different offices within the regions and within the agencies, and between the agency and department levels. &nbsp;Perhaps with falls within the purview of big data or supply chain management. &nbsp;Seems like a great opportunity to establish Centers of Excellence for these purposes.</p>
Mark Youman
<p>Thanks for the opportunity to weigh in on this.</p><p style="margin-left:.25in;">1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Most critical trends related to Federal IT professional services:</p><p style="margin-left:.75in;">a.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cyber and Information Security &ndash; often seen as a separate discipline, this area will come to permeate everything in IT.</p><p style="margin-left:.75in;">b.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Mobile &ndash; over the course of Alliant II, the Federal IT world will be adapting en masse to mobile device usage by constituents and Federal employees.</p><p style="margin-left:.75in;">c.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Predictive Analytics &ndash; the Federal government has more data than probably anyone else, this area will change the way we use it.</p><p style="margin-left:.75in;">d.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Health IT &ndash; IT is increasingly seen as a way to get more out of Federal health spending.&nbsp; It is important to note that this includes both public health IT (e.g. NIH, CDC, CMS) as well as IT related to direct health care provision (DHA, VA).</p><p style="margin-left:.25in;">&nbsp;</p><p style="margin-left:.25in;">2.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Top 3, related to Federal IT professional services:</p><p style="margin-left:.75in;">a.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cyber and Information Security</p><p style="margin-left:.75in;">b.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Mobile</p><p style="margin-left:.75in;">c.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Health IT</p><p style="margin-left:.75in;">&nbsp;</p><p style="margin-left:.25in;">3.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; What may be missing from the list:</p><p style="margin-left:.75in;">a.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Agile and Agile Program Management &ndash; over the course of Alliant II we&rsquo;ll see a major shift to Agile development methodologies.&nbsp; This impacts not only the actual development process, but all the related Federal IT management processes such as IT acquisitions, IT project management, CPIC, and cybersecurity.</p><p style="margin-left:.75in;">&nbsp;</p><p style="margin-left:.25in;">4.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Which should we ignore?</p><p style="margin-left: 80px;">There are several on the list that are important IT trends in general, but are less related to a Federal professional services contract like Alliant II.&nbsp; Display technologies, batteries, 3D printers, and nano-technology are much more related to hardware manufacturing and are most likely to appear on Alliant II task orders as ODCs for hardware.&nbsp; &nbsp;Federal customers would normally be procuring such technologies through hardware contracts.&nbsp; To the extent the Federal government would procure services related to hardware manufacturing it would be in the engineering R&amp;D space, probably related to weapons systems, and might better fall under GSA OASIS.</p><p>--Mark Youman</p><p>ICF International</p>
<p>How critical do you think any of these trends will be over the next 10-15 years?</p><p>&nbsp;</p><p>As the Government continues moving towards a business model of efficiency, responsiveness, accessibility, and transparency, many of these trends will continue to be important and will most likely evolve and spinoff into new trends.&nbsp; It is important that GSA build flexibility into the contracting strategy to not only support these trends as they exist now but also as they evolve and transform.&nbsp; Some methods to consider are allowing additional labor categories at the task order level or as an update after 5-10 years into the contract period of performance.&nbsp; In addition, leaving the option for an on-ramp will ensure there is sufficient competition to support future trends.</p><p>&nbsp;</p><p>2. Which are your top three?</p><p>The focus of technology should start with the needs for data, services that expose and use that data, and the users of that data and services.&nbsp; This ensures that technology investments are focused on the actual government requirements instead of technology for technology-sake.&nbsp; The top trends (we have more than 3) we see in the Government right now are Cloud &ldquo;as a service&rdquo; models, Cloud brokerage, Mobility and Managed Mobility, Cyber Security, and Big Data.&nbsp; These trends support Government&rsquo;s initiatives to become more efficient, responsive, accessible, and transparent.&nbsp;</p><ul><li>Cloud &ldquo;as a service&rdquo; models provide the most efficient and secure mechanisms for providing government data and services.&nbsp; Cloud-based environments can be architected to be more secure than on premise environments. Additionally, &ldquo;as a service&rdquo; models enable government to procure the services they need, and only when they need them - as opposed to investing in large on premise datacenters scaled to meet peak demand, or overly burdensome license agreements.</li><li>The government needs expert Full-Service Cloud Solution Providers (sometimes referred to as Cloud Brokers) to ensure that their needs are being met in the most efficient and secure manners.&nbsp; Cloud brokers are expert at knowing how each of the Cloud Service Providers (CSPs) meet different needs, as new CSPs become FedRAMP authorized, and as existing CSPs continuously enhance their capabilities while their reducing costs.</li><li>An increasing percentage of citizens&rsquo; only access to government data will be exclusively through mobile devices.&nbsp; Commensurate with the increase in mobile device use throughout the country, the government should also ensure that government content, data and services, are accessible via mobile devices.</li><li>It is well accepted that we are suffering from information overload.&nbsp; If you can&rsquo;t obtain meaningful value out of the mass of data that is being collected, you may as well not collect it.&nbsp; Perhaps more importantly, the relationships between seemingly disparate data sources can result in new insights and improvements to services.&nbsp; Big data is an essential trend that must be followed to effectively handle the data overload and increasing number of potentially related data sets that threatens to bury important information.</li><li>All of these technology trends will place an even greater onus on the government to apply the latest advancements in cyber security.&nbsp; The Government will need to work with industry to protect applications, information, and networks from the quickly evolving security risks.&nbsp;</li></ul><p>&nbsp;</p><p>3. Are we missing emerging trends that you are tracking?</p><p>One trend that isn&rsquo;t directly identified in your list but could be indirectly supported by items on your list is Open Data.&nbsp; This may be something you want to directly call out.&nbsp; The emergence of this trend increases the need to improve government data and content in significant ways.&nbsp; All government data and content:</p><ul><li>Must be accessible via machine-readable APIs and formats to be useful and actionable for devices that have not even been considered today</li><li>Must be enriched and effectively managed so that the most contextual relevant information is available when needed and leveraged with disparate data sources to significantly enhance value</li></ul><p>This includes traditional data, as well as content, and needs to include mechanisms for sifting through the data, filtering it, and easily relating the data.</p><p>&nbsp;</p><p>4. Which of the above should we ignore for now?</p><p>We don&rsquo;t have any recommendations regarding trends you should ignore</p>
<p>By far cyber , mobility and healthcare IT are the biggest trends that will continue. Outside of those three, I wouldn&rsquo;t necessarily specify detailed language about a particular tech in the contract that might limit GSA&#39;s ability to rapidly expand and adapt to new trends. Guaranteed 10 years from now there will be a new trend that nobody is focused on now and the ability to have a broad emerging technologies scope with open language that accounts for change will be extremely beneficial.</p><p>&nbsp;Following OASIS&rsquo; example &ldquo;Emerging Technology&rdquo; should be a subset of a Core Discipline service area or multiple Core Discipline areas. It&rsquo;s too dynamic of an environment to justify an entire core discipline.</p><p>&nbsp;</p><p>&nbsp;</p>
Chris Waychoff
<p>&nbsp;</p><div>TASC, Inc. welcomes the opportunity to collaborate with GSA on Alliant II pre-planning. Open Government and industry community exchanges on OASIS led to a more effective and smooth acquisition process.</div><div>&nbsp;</div><div><em><strong>1. How critical do you think any of these trends will be over the next 10-15 years?</strong></em></div><div>All of the listed technology trends will be critical during the life cycle of the Alliant II GWAC, but to different communities at different times.</div><div>&nbsp;</div><div><strong><em>2. Which are your top three?</em></strong></div><div>The most critical today to the IT community are: 1) Cyber and Information Security, 2) The &quot;New Cloud&quot; Shift, and 3) Cloud brokerage. The most critical to IT users today is Mobility and Managed Mobility. The other listed technology trends currently have more narrow communities of users, are less visible to users, or are early in their deployment, but all will have major impacts over the life of Alliant II.</div><div>&nbsp;</div><div><em><strong>3. Are we missing emerging trends that you are tracking?</strong></em></div><div>The rise of the Internet of Things, 3D printing, and robotics are among the many future trends that GSA should consider including in the Alliant II scope.</div><div>&nbsp;</div><div><em><strong>4. Which of the above should we ignore for now?</strong></em></div><div>TASC recommends that the scope of Alliant II be broad or flexible enough to encompass all of these and other emerging technologies.</div>
<p><strong>1) CRITICAL IT TRENDS:</strong></p><p>&nbsp;When creating Government-wide Acquisition Contract (GWAC) vehicles for intricate information technology (IT) solutions, it is essential to focus in on the key issues that are most critical to advancing the healthcare industry over the next 10-15 years. Top trends include health IT advancements, information security, and predictive analytics.</p><p>&nbsp;</p><h2>Cyber and Information Security</h2><p>Cyber and information security has, and will continue to be, a topic of high importance in our technological health world. With highly confidential patient data traveling in cyberspace, the risk for compromised or stolen data is one of the main obstacles facing forward progress within the Healthcare IT industry. According to Beth Israel Deaconess Medical Center&#39;s Chief Information Officer&nbsp;John Halamka, MD, the ultimate goal is to &ldquo;reduce risk to the point where government regulators and, more importantly, patients will say &lsquo;What you have done is reasonable.&rsquo;&rdquo; While this sounds like an easy task, it is precisely the opposite. In order to adequately protect a large health institution, a complex risk analysis must be done in order to identify reputational, patient privacy breech and data integrity risks in order to launch a full scale, &ldquo;multilayer defense.&rdquo;</p><p>&nbsp;</p><p>The next step involves encrypting all desktop computers, laptops, smartphones, and servers. According to data from the Office for Civil Rights, 60% of HIPAA privacy and security breaches arise from theft and loss of unencrypted devices. The hacking of accounts and unauthorized disclosure accounts only accounted for 23% of incidents. So much emphasis seems to be given to protection from virtual attack that the encryption of devices tends to be discredited or overlooked. Encryption, although expensive to implement, is an effective way to prevent the majority of privacy and security attacks.</p><p>&nbsp;</p><p>In order to successfully implement security measures, time must be invested in educating healthcare employees. Mayo Clinic&#39;s Mark Parkulo, MD emphasizes that &ldquo;encryption is very much necessary, but an organization also has to concern itself with the policies and procedures portion of privacy and security &ndash; the employee education piece of the puzzle.&rdquo; At Mayo Clinic, employees are frequently reminded of privacy and security policies throughout the year in addition to their initial orientation process. This can help cut down on unnecessary breaches.</p><p>&nbsp;</p><p>The challenge with cyber security in the Health IT space is staying one step ahead of constantly changing compliance vulnerabilities, threats, and updates.</p><p><a href="http://www.healthcareitnews.com/news/security-tips-health-it-pros?single-page=true">http://www.healthcareitnews.com/news/security-tips-health-it-pros?single-page=true</a></p><p><u>Mobility &amp; Managed Mobility</u></p><p>The mobility of health information is an imperative piece of the efficient healthcare model. A mobile trends report was released by Athenahealth and Epocrates indicating that, &ldquo;nurse practitioners, physician assistants, and pharmacists are emerging as the most engaged users of mobile technology.&rdquo; At first glance this is great news! This means that health professionals are taking advantage of mobile technologies, thus increasing the availability and speed with which information is transferred.</p><p>&nbsp;</p><p>With a closer look, however, the study also indicated that only &ldquo;one-third of clinicians claim their EHR is optimized for tablet or smartphone use.&rdquo;&nbsp; With an increasing need to manage mobile devices, health institutions are starting to hire out these services to companies that specialize in &ldquo;managing mobility.&rdquo; The advantage of having an outside entity perform this service is verified compatibility between smartphones, tablets, and computers, as well as pre-established security measures.</p><p><a href="http://www.healthcareitnews.com/news/ehr-adoption-disrupts-mobile-growth">http://www.healthcareitnews.com/news/ehr-adoption-disrupts-mobile-growth</a></p><p>&nbsp;</p><h2>Predictive Analytics</h2><p>One of the best ways to reduce costs in our healthcare system is to have fewer sick patients. Recently, preventative medicine has become more and more popular as technology progresses to fulfill this need. Predictive Analytics is a new technology that is being developed to help pool Electronic Health Records (EHRs) in order to identify and predict which people are most likely to have a certain disease or health issue.</p><p>&nbsp;</p><p>At times when hospitals are spending millions of dollars to implement electronic health records, they need some way to reap a financial benefit from their investment. A pilot project launched by Carilion Clinic in October, 2013 involved the use of natural language processing technology found in IBM&rsquo;s &ldquo;Watson&rdquo; combined with Epic&rsquo;s database of electronic health records. This study was able to identify 8,500 patients at risk of developing congestive heart failure within one year.</p><p>&nbsp;</p><p>Making the prediction is only the first half of the battle, now researchers must track these patients, and test whether intervention improves health outcomes. It is easy to get caught up in the excitement of predictive technology, but it is important to recognize that these methods are completely useless if nothing is done with the data being collected. Predictive data must be identified, used, and acted upon in order to benefit the population&rsquo;s health.</p><p><a href="http://www.forbes.com/sites/zinamoukheiber/2014/02/19/ibm-and-epic-apply-predictive-analytics-to-electronic-health-records/">http://www.forbes.com/sites/zinamoukheiber/2014/02/19/ibm-and-epic-apply-predictive-analytics-to-electronic-health-records/</a></p><p>&nbsp;</p><p><strong>2) EMERGING TRENDS IN TECHNOLOGY:</strong></p><p><u>Healthcare Device Interoperability Planning</u></p><p>Medical device interoperability is the ability of medical devices and health care systems to seamlessly communicate and exchange information. West Health predicts, &ldquo;Improved interoperability between medical devices and EHRs would save the healthcare system $30 billion a year.&rdquo;</p><p>&nbsp;</p><p>Just as Health IT runs across many difficulties when trying to establish interoperability, so does the medical device community. Hospitals are often stuck in their purchasing methods, which may only allow the purchase of new capital every ten years. Interoperability requires new device purchases to be made now, and such an investment may not be possible. Many healthcare facility systems do not have the adaptability to connect with competing manufacturer technologies, so they are forced to replace equipment just to achieve compatibility. Establishing industry standards could easily solve this problem. So far there has not been much cooperation from manufacturers in light of agreeing on standards because inevitably, some would be forced to update or develop new capabilities for their existing products.</p><p>&nbsp;</p><p>A step in the right direction occurred this year when the Food and Drug Administration announced that they would release draft guidance for manufacturers who are planning on making interoperable medical devices. So far, the FDA has identified 25 voluntary standards. While mandatory manufacturer standards would help push this technology into everyday use, at least the FDA is realizing the importance of interoperability, and manufacturers and hospitals have one place to look for compatibility guidelines.</p><p><a href="http://www.modernhealthcare.com/article/20140206/NEWS/302069934">http://www.modernhealthcare.com/article/20140206/NEWS/302069934</a></p><p>&nbsp;</p><h2>Patient Portals</h2><p>A patient portal is a web-based application that is designed to help patients and doctors communicate outside of regularly scheduled appointments. It creates an extra point of contact that can be used to view medical records, ask small medical questions with the chat function, schedule an appointment, or pay medical bills online. Doctor and nurse response times to inquiries from the portals have greatly increased as compared to phone messages.</p><p>&nbsp;</p><p>Portals are designed to &ldquo;boost patient involvement in care&rdquo; by encouraging an ongoing dialogue with the doctor and an easy application to review health documentation and results. In addition, they save time and money by addressing smaller issues online instead of in-person.&nbsp; As with any new technology, there are challenges that arise. Doctor&rsquo;s need to make it clear to patients that portals are not to be used in emergency situations or for problems that are too complicated.</p><p>Meaningful Use, the Federal mandate to increase healthcare IT efficiency, is not possible to achieve without at least 5% of an institution&rsquo;s patients using online patient portals. This further incentivizes their use, so the trend is likely to increase within the healthcare industry as both patients and health institutions benefit.</p><p><a href="http://health.usnews.com/health-news/patient-advice/articles/2014/06/30/how-patient-portals-are-changing-health-care">http://health.usnews.com/health-news/patient-advice/articles/2014/06/30/how-patient-portals-are-changing-health-care</a></p><p><a href="http://www.healthcareitnews.com/directory/patient-portals">http://www.healthcareitnews.com/directory/patient-portals</a></p><p>&nbsp;</p><h2>Real Time Location Systems (RTLS)</h2><p>Real-time location systems are wireless transmitter tags that are able to track the precise location of people or objects within a designated area. RTLS has many functions within a health institution. They are able to locate equipment or personnel during particularly busy times, optimize the flow of patients to increase room assignment efficiency, and log off secure devices with personal health information (PHI) when they leave secure locations. This new technology also has the potential to save hospitals money by decreasing the percentage of devices that are lost or misplaced.</p><p><a href="http://www.healthcareitnews.com/directory/real-time-location-systems-rtls">http://www.healthcareitnews.com/directory/real-time-location-systems-rtls</a></p><p>&nbsp;</p><p><strong>3) IT TRENDS TO IGNORE FOR NOW:</strong></p><p><u>3D Display Technologies </u></p><p>3D display technologies include the Amazon Fire Phone 3D display screen, 3D gaming interfaces, movies, printers, and Internet. Within the healthcare space, 3D technology, especially 3D printing, can save institutions substantial amounts of money. Printers can print sensor prototypes to cut production costs, saving medical agencies around $250,000 per year and consumers anywhere from $300 to $2,000 per year.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>However, 3D printing will not be able to replace the work done by traditional manufactures. This technology is used to help designers and engineers test ideas and speed the development process, but it is not able to produce customized products in bulk like larger manufacturers.</p><p>&nbsp;</p><p>On the consumer side, with patients, 3D printing and other 3D technology is unlikely to be a mainstream technological product in the near future. 3D printing is hard to adopt because it involves a much more complex process than normal printing. Saving consumers $300 to $2,000 per year still does not compensate for the higher cost of overhead.</p><p>&nbsp;&nbsp;&nbsp;</p><p>For the healthcare industry, 3D&rsquo;s accuracy is questionable and medical agencies are not willing to take the risk with the industry&rsquo;s strict safety requirements in place.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;</p><p>3D technology is not as useful as it seems for the health care industry. It cannot replace the traditional production or manufacture and at the same time is not safe enough to use in the healthcare industry. 3D technology, as it stands now, is not a field that holds much value in the next 10 years within the healthcare industry.</p><p><a href="http://www.healthcareitnews.com/news/3-d-printing-healthcares-new-edge">http://www.healthcareitnews.com/news/3-d-printing-healthcares-new-edge</a></p><p><a href="http://heizerrenderom.wordpress.com/2014/06/13/om-in-the-news-3-d-printings-promise-and-limits/">http://heizerrenderom.wordpress.com/2014/06/13/om-in-the-news-3-d-printings-promise-and-limits/</a></p><p><a href="http://www.cio.com.au/article/532461/3d_printing_new_challenges_opportunities_enterprises/">http://www.cio.com.au/article/532461/3d_printing_new_challenges_opportunities_enterprises/</a></p><p><a href="http://www.forbes.com/sites/bigbangdisruption/2014/01/10/the-five-most-disruptive-innovations-at-ces-2014/">http://www.forbes.com/sites/bigbangdisruption/2014/01/10/the-five-most-disruptive-innovations-at-ces-2014/</a></p><p>&nbsp;</p><h2>Cloud Related Technology and Cloud Brokerage</h2><p>As a risk-averse industry, healthcare is finally beginning to trust the cloud for the storage of protected health information. Cloud computing is a low cost technology and that satisfies organizations&rsquo; need to share information. However, the journey to complete trust of the cloud in healthcare space is long and just beginning.</p><p>&nbsp;</p><p>It is doubtful if the government should pay a third party broker to purchase cloud services when it can buy them directly from a pre-approved vendor. The GSA even forces the government to buy cloud services from a private sector middleman. A cloud broker may add no value, but drive up government costs and increase service delays.</p><p>&nbsp;</p><p>Adding a third-party broker would create a costly and unnecessary barrier between public cloud customers and private cloud providers. A cloud broker plays the role of &quot;translator&quot; when no such role is needed because the cloud providers normally offer continuous consultative discussions and brainstorming sessions to their customers, usually at no additional cost. What&rsquo;s more, cloud services require a trusted partnership between an agency and its cloud service provider.</p><p>&nbsp;</p><p>Therefore, it needs to be tested whether cloud broker really adds value to cloud consumers or incidentally puts burden on both sides. Cloud technology is continuing to develop, but a cloud broker is discouraged in the future.</p><p><a href="http://www.cio.com/article/2380823/healthcare/healthcare-finally-warming-to-cloud-technology.html">http://www.cio.com/article/2380823/healthcare/healthcare-finally-warming-to-cloud-technology.html</a></p><p><a href="http://fcw.com/articles/2013/04/29/comment-cloud-broker-bad-idea.aspx?m=1">http://fcw.com/articles/2013/04/29/comment-cloud-broker-bad-idea.aspx?m=1</a></p><p><a href="http://www.computerworld.com/s/article/9244848/10_Cloud_Computing_Predictions_for_2014?taxonomyId=158">http://www.computerworld.com/s/article/9244848/10_Cloud_Computing_Predictions_for_2014?taxonomyId=158</a></p><p>&nbsp;</p><h2>Nanotechnology</h2><p>Nanotechnology is beneficial to the healthcare agencies and patients because of its diverse functionalities. It has the capacity to diagnose a disease early, and better localize the necessary treatment. As we all know, the earlier a disease or medical condition is diagnosed, the easier it is to cure and the lower the medical cost will be.</p><p>&nbsp;</p><p>However, because elements at the nano-cale behave differently than they do in their bulk form, there is a concern that some nanoparticles may be toxic. Some doctors worry that nanoparticles are so small, that they could easily cross the blood-brain barrier, a membrane that protects the <a href="http://health.howstuffworks.com/brain.htm">brain</a>from harmful chemicals in the bloodstream. In this case, the toxic particles could harm the body. For this reason, the FDA hesitates to get it certified.</p><p>&nbsp;</p><p>The commercialization of nanotechnology has the potential to cause businesses to care less about its safety and effectiveness, and more about its profitability. In this case, the quality of Nano would be compromised and further questioned by healthcare professionals.</p><p>&nbsp;</p><p>The many social, economic, and ethical concerns that surround the nanotechnology debate have slowed down its development process and ability to become a mainstream trend. The consequences of commercialization also threaten its continued success.</p><p>&nbsp;</p><h1>Links</h1><p>&nbsp;</p><p><a href="http://www.emdt.co.uk/article/unlocking-potential-medical-nanotechnology">http://www.emdt.co.uk/article/unlocking-potential-medical-nanotechnology</a></p><p><a href="http://www.sciencedaily.com/releases/2012/04/120428000220.htm">http://www.sciencedaily.com/releases/2012/04/120428000220.htm</a></p><p><a href="http://science.howstuffworks.com/nanotechnology5.htm">http://science.howstuffworks.com/nanotechnology5.htm</a></p><p><a href="http://www.slideshare.net/jasslideshare/an-overview-of-nanotechnology-in-medicine-3610272">http://www.slideshare.net/jasslideshare/an-overview-of-nanotechnology-in-medicine-3610272</a></p><p>&nbsp;</p>
<p><strong>EMERGING TECHNOLOGY</strong></p><p>Questions?</p><p style="margin-left: 40px;"><strong>&nbsp; &nbsp;How critical do you think any of these trends will be over the next 10-15 years?</strong></p><p style="margin-left:.5in;">Over the next ten to fifteen years these technologies will be the mainstay and integral part of any successful environment.</p><p style="margin-left:.5in;"><strong>Which are your top three?</strong></p><p style="margin-left:.5in;">Through conversations, various mass media, and research, it is our opinion that the top three trends would be; Cyber and Information Security, Display Technologies and Advancements in Health IT and nano technology</p><p style="margin-left:.5in;"><strong>&nbsp;Are we missing emerging trends that you are tracking?</strong></p><p style="margin-left:.5in;">The missing emerging trends that we are tracking are; Augmented Reality, Interactive Simulations, Stereoscopic 3D Displays and, Virtual Reality. All of the mentioned technologies are currently used for presentations, classroom training, to field on-site training.</p><p style="margin-left:.5in;">We have found that each of these technologies are in high demand for training and education and are currently being used in educational and medical institutions. It is our teams&rsquo; belief that each of these technologies would be instrumental in the development, expansion and enhancement of training programs.</p><p style="margin-left:.5in;">Several articles have been written which support our belief and first hand experiences.</p><p style="margin-left:.5in;">Augmented Reality &ndash; We can already see the advantages of Augmented Reality in many professional fields. From the&nbsp;<nobr>airline mechanics&nbsp;in Metz&rsquo;s piece to the Stanford surgeon who recently used Google Glass on an anatomical </nobr></p><p style="margin-left:.5in;"><nobr>human model&nbsp;to demonstrate&nbsp;how an augmented visual layer could guide surgeons though certain procedures. </nobr></p><p style="margin-left:.5in;"><nobr>&ndash; Insight &amp; Innovations <strong>(</strong><strong>Scott Schneider)</strong></nobr></p><p style="margin-left:.5in;">The use of augmented reality technology is steadily growing. Previously it was only used for entertainment or gaming purpose. But now, it is also used in various sectors like medicine, education, military, etc. Another important area where this technology can be really helpful is in the workplace. The features of&nbsp;augmented reality&nbsp;can increase the productivity of a workplace significantly. According to Gartner, a leading IT research and advisory firm, the use of AR will be prevalent in offices in the future.&nbsp; &ndash; Augmented Reality Trends (Christopher Jackson)</p><p style="margin-left:.5in;">Interactive Simulations &ndash; Technology-Based Learning (TBL) can be self-paced and matched to the learner&rsquo;s needs, and, building on pedagogy that emphasizes the merits of discovery learning, it offers the prospect of promoting greater comprehension and retention, particularly for complex materials, because of its clear opportunities for the hands-on manipulation of course materials and the use of simulations and game-playing. Perhaps for these reasons, TBL has witnessed marked growth in the training marketplace in government, industry, and education. &ndash; Social Policy Research Associates (Vinz Koller, Sandra Harvey, Micheline Magnotta)</p><p style="margin-left:.5in;">Stereoscopic 3D Displays &ndash; Three dimensional (3D) technology advancements have developed to the extent that it is being used in multiple applications, specifically (3D) printing, scanning, glasses, cameras and displays, with continued steady growth trends in industry, entertainment healthcare, government and defense, aerospace, industrial and manufacturing and architecture forecasted. &ndash; Allied Market Research</p><p style="margin-left:.5in;">Virtual Reality &ndash; In ten years, workplaces may feature many virtual-reality elements as display screens, tablets, and other devices which include depth cameras as standard.</p><p style="margin-left:.5in;">Potentially, every meeting rooms may have become comparable to the environments that were once available to certain oil-exploration or military workers only. &ndash; Strategic Business Insights (Rob Edmonds)</p><p style="margin-left:.5in;"><nobr>The military already commonly use virtual reality in&nbsp;</nobr><nobr>training.Forward-thinking high-tech manufacturers of spacecraft, </nobr></p><p style="margin-left:.5in;"><nobr>airplanes and cars have been testing product design for years using virtual reality, Forbes (Mark Little)</nobr></p><p style="margin-left:.5in;">&nbsp; Which of the above should we ignore for now?&nbsp;</p><p style="margin-left:.5in;">At this time, it is not believed that any of the above should be ignored now.</p>
<p align="right">&nbsp;</p><p>Reference: Emerging IT Trends related to the ALLIANT II GWAC</p><p>We have reviewed potential emerging trends and believe the following trends should be associated with the ALLIANT 2 Scope of Work.</p><p>IT Trends:</p><p style="margin-left:.25in;">&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong><u>Cyber and Information Security:</u></strong>Cyber security/information technology security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.&nbsp; It is critically important given the great deal of confidential information on computers and the transmission of data across the multitude of networks.&nbsp; Given the growing volume and sophistication of cyber attacks, this trend is one of the most important and ongoing attention will be required to protect sensitive business/personal information as well as safeguard national/international security.&nbsp; We anticipate cyber and information security to be an on-going federal IT requirement over the next 10 years.&nbsp; We can anticipate government clients will be procuring cyber and information security requirements of increasing complexity over the coming decades.</p><p style="margin-left:.25in;">&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong><u>Mobility and Managed Mobility:</u></strong>&nbsp; &nbsp;Information Technology has ushered in a new wave of mobility trends.&nbsp; In particular, the &ldquo;BYOD&rdquo;, known as &ldquo;Bring Your Own Device&rdquo;, has more organizations interested in creating a mobile environment.&nbsp; With this trend, organizations will require an environment that can support myriad employee devices and platforms across a wide spectrum of technologies.&nbsp; This requirement will also need to address security risks to agencies. The mobility trend also has perceived productivity gains and cost savings given the proliferation of devices like tablets and smartphones.&nbsp; With this trend, agencies will need to better define expectations for employee-owned hardware to balance flexibility with confidentiality and privacy requirements. We anticipate that managed mobility requirements will be in demand in the federal market space over the next decade and the out years.</p><p style="margin-left:.25in;">&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong><u>The &ldquo;New Cloud&rdquo; shift and all the &ldquo;as a service&rdquo; offers emerging as a result: </u></strong>Cloud services means services made available to users on demand via the Internet from a&nbsp;<a href="http://www.webopedia.com/TERM/C/cloud_computing.html">cloud computing </a>&nbsp;provider&#39;s servers as opposed to being provided by an on-premise server.&nbsp;&nbsp; The new cloud shift and all the &ldquo;as a service&rdquo; offerings are designed to provide easy, scalable access to applications, resources and services.&nbsp; A cloud service can dynamically scale to meet the needs of its users, and because the service provider supplies the hardware and software necessary for the service, there&rsquo;s no need for a federal agencies to provision or deploy its own resources or allocate IT staff to manage the service.&nbsp; Some emerging cloud service trends include online data storage and backup solutions, web-based e-mail services, hosted office suites, document collaboration services, database processing, managed technical support services and much more.&nbsp;&nbsp; Cloud and mobile, along with smarter physical infrastructures and security, are driving fundamental transformation in IT.&nbsp; Agencies will need to take the next steps beyond virtualized data centers and expand their cloud capacity to keep pace with the rapid evolution.&nbsp; We predict that cloud models will expand and be adopted by many agencies in the future, making it one of the top trends in IT over the next 10-15 years.</p><p style="margin-left:.25in;">&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong><u>Cloud brokerage</u></strong>A cloud services brokerage is a third party that adds value to cloud services on behalf of cloud service customers/consumers.&nbsp; The goal of a cloud brokerage is to make the service more specific to an agency, or to integrate or aggregate services, to enhance their security, or to do anything which adds a significant layer of value to the original cloud services being offered. Cloud brokerage does not have a track record in the current IT market.&nbsp; It does not merit the kind of scope attention that mobility, cloud or cyber security requires.</p><p style="margin-left:.25in;">&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong><u>Big Data: </u></strong>&nbsp;Big Data is a blanket term for any collection of&nbsp;<a href="http://en.wikipedia.org/wiki/Data_set" title="Data set">data sets</a>&nbsp;so large and complex that it becomes difficult to process using on-hand database management tools or traditional data processing applications.&nbsp; The challenges include capture, curation, storage, search, sharing, transfer, analysis and visualization. The trend to larger data sets is due to the additional information derivable from analysis of a single large set of related data, as compared to separate smaller sets with the same total amount of data, allowing correlations to be found to &quot;spot business trends, determine quality of research, prevent diseases,&nbsp;<a href="http://en.wikipedia.org/wiki/Legal_citation_analysis" title="Legal citation analysis">link legal citations</a>, combat crime, and determine real-time roadway traffic conditions. We predicts that as new tools are provided with the analytics to assess and determine data relationships, big data will be a significant requirement for the government over the next 10-15 years.</p><p style="margin-left:.25in;">&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong><u>Supply chain management</u></strong>Information Technology continues to have significant impact on supply chain strategies. On the coordination side, the Web provides a virtually free platform for enhancing transparency, eliminating information delays and distortions, and significantly reducing transaction costs.&nbsp;&nbsp; As the flow of information has accelerated considerably, the flow of material has not gained as much speed. This phenomenon makes the coordination of material, information, and cash flows even more crucial for effective supply chain coordination.&nbsp; We assume the question over the next 10-15 years will be: Is the supply chain design keeping up with the changes in technology and the business environment? &nbsp;The Alliant II contract will need to address supply chain technologies and services as government agencies seek to improve this function over the next decade.</p><p style="margin-left:.25in;">&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong><u>Display technologies:</u></strong>&nbsp;&nbsp; A&nbsp;displaydevice&nbsp;is an&nbsp;<a href="http://en.wikipedia.org/wiki/Output_device" title="Output device">output device</a>&nbsp;for presentation of&nbsp;<a href="http://en.wikipedia.org/wiki/Information" title="Information">information</a>&nbsp;in&nbsp;<a href="http://en.wikipedia.org/wiki/Visual" title="Visual">visual</a>&nbsp; or&nbsp;tactile&nbsp;form.&nbsp;&nbsp; When the input information is supplied as an electrical signal, the display is called an&nbsp;electronic display.&nbsp; Common applications for&nbsp;<a href="http://en.wikipedia.org/wiki/Electronic_visual_display" title="Electronic visual display">electronic visual displays</a>&nbsp;are&nbsp;<a href="http://en.wikipedia.org/wiki/Television" title="Television">televisions</a>&nbsp;or&nbsp;<a href="http://en.wikipedia.org/wiki/Computer_monitor" title="Computer monitor">computer monitors</a>.&nbsp;A body-borne computer (mini-electronic devices) that can be worn by the individual under, with or on top of clothing, are already in high demand by the consumer.&nbsp; A new display technology that We predicts will change the future IT landscape is Google Glass.&nbsp; This technology is a wearable computer that mounts on an individual&rsquo;s head anddisplays information in a&nbsp;<a href="http://en.wikipedia.org/wiki/Smartphone" title="Smartphone">smartphone</a>-like hands-free format.&nbsp;&nbsp; Wearers communicate with the Internet via&nbsp;<a href="http://en.wikipedia.org/wiki/Natural_language_processing" title="Natural language processing">natural language</a>&nbsp;voice commands.&nbsp; We believe technology like wearable miniature electronic devices will have many different applications going forward for federal government agencies.&nbsp; Being able to procure these devices as part of total solutions under the Alliant II contract is highly desirable.</p><p style="margin-left:.25in;">&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong><u>Battery and power solutions: </u></strong>Battery and alternative power sources should be an increasing market over the next decade.&nbsp; These power solutions may also include smart-grid technologies and other capabilities that improve efficiency in utility management.&nbsp; The convergence of information technology and &ldquo;hard-wired products&rdquo; is already appearing in a significant amount of agency RFPs.&nbsp; The Alliant II contract will need to be structured to allow these types of solutions so that it can address emerging requirements in this field over the next 10-15 years.&nbsp;</p><p style="margin-left:.25in;">&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong><u>Predictive analytics</u></strong>&nbsp;Predictive analytics encompass a variety of statistical techniques from&nbsp;<a href="http://en.wikipedia.org/wiki/Predictive_modelling" title="Predictive modelling">modeling</a>,&nbsp;<a href="http://en.wikipedia.org/wiki/Machine_learning" title="Machine learning">machine learning</a>, and&nbsp;<a href="http://en.wikipedia.org/wiki/Data_mining" title="Data mining">data mining</a>&nbsp;that analyze current and historical facts to make <a href="http://en.wikipedia.org/wiki/Prediction" title="Prediction">predictions</a>&nbsp;about future, or otherwise unknown, events.&nbsp; In business, predictive models exploit&nbsp;<a href="http://en.wikipedia.org/wiki/Pattern_detection" title="Pattern detection">patterns</a>&nbsp;found in historical and transactional data to identify risks and opportunities. Models capture relationships among many factors to allow assessment or potential of risk associated with a particular set of conditions, guiding&nbsp;<a href="http://en.wikipedia.org/wiki/Decision_making" title="Decision making">decision making</a>&nbsp;for candidate transactions. &nbsp;An example of predictive analytics is what Microsoft is taking main stream in its &ldquo;Microsoft Azure Learning Service&rdquo;, which will bring machine learning and the power of predictive analytics to the masses without the requirement of an expert data scientist to engineer the system.&nbsp;&nbsp;&nbsp; &quot;Soon machine learning will help to drastically reduce wait times in emergency rooms, predict disease outbreaks and predict and prevent crime,&quot; says Joseph Sirosh, corporate vice present for machine learning at Microsoft. &quot;To realize that future we need to make machine learning more accessible &mdash; to every enterprise and, over time, every one.&rdquo;&nbsp; This tool is intended to democratize machine learning and make it simpler and easier for everyone to use the concept of predictive analytics.</p><p style="margin-left:.25in;">&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong><u>Advancements in Health IT and </u></strong><strong><u>N</u></strong><strong><u>anotechnology</u></strong>: Nanotechnology is the manipulation of matter on an&nbsp;<a href="http://en.wikipedia.org/wiki/Atom" title="Atom">atomic</a>,&nbsp;<a href="http://en.wikipedia.org/wiki/Molecular" title="Molecular">molecular</a>, and&nbsp;<a href="http://en.wikipedia.org/wiki/Supramolecular_complex" title="Supramolecular complex">supramolecular</a> scale.&nbsp; Nanotechnology may be able to create many new materials and devices with a vast range of&nbsp;<a href="http://en.wikipedia.org/wiki/List_of_nanotechnology_applications" title="List of nanotechnology applications">applications</a>, including medicine,&nbsp;<a href="http://en.wikipedia.org/wiki/Nanoelectronics" title="Nanoelectronics">electronics</a>,&nbsp;<a href="http://en.wikipedia.org/wiki/Biomaterials" title="Biomaterials">biomaterials</a>&nbsp;and energy production.&nbsp;&nbsp; The government is investing billions of dollars in nanotechnology research, but the products derived from this research are difficult to capture at this point in time.&nbsp;&nbsp; The Alliant II contract will need to be flexible to allow emerging technologies as they are developed and proven in the marketplace.&nbsp; The advancements in Health IT are important to watch--there already are plenty of gadgets and apps out there that track your steps, your sleep and your calorie consumption and generally let you know how you&#39;re doing. But the next wave of wearable health tech will focus on gathering personal data more meaningful to a doctor, and send it directly to his or her office--such as&nbsp;<a href="http://www.hindustantimes.com/india-news/smartphone-clinic-your-health-is-in-your-hands/article1-1165221.aspx" target="_blank">a remote stethoscope</a>&nbsp;that can transmit a person&#39;s heart rhythm to a physician.&nbsp; Also, devices that monitor our personal behavior will be getting more and more sophisticated. There&#39;s the&nbsp;<a href="http://www.livescience.com/40756-can-new-wristband-sense-what-you-re-eating.html" target="_blank">AIRO wristband</a>&mdash;hitting the market later this year&mdash;that will use a built-in spectrometer to detect nutrients released into your bloodstream as they are broken down during and after your meals. A device being developed by&nbsp;<a href="http://singularityhub.com/2013/12/15/handheld-device-tellspec-can-detect-allergens-chemicals-and-nutrients-in-food/" target="_blank">TellSpec</a>&nbsp;will supposedly be able to analyze the chemical composition of food in real time and let you know on your smartphone just what it is you&#39;re about to eat.</p><p align="center"><strong><u>Questions?</u></strong></p><p>&nbsp;</p><p><strong><u>How critical do you think any of these trends will be over the next 10-15 years?</u></strong></p><p>The trends listed above are very critical, in addition to 3-D printing as this will affect every aspect of our lives in the coming years.&nbsp; For example,medical researchers have already turned to 3D printing to create human body parts. It won&rsquo;t be long before we are making our own shoes and kids are printing their own toys.</p><p>&nbsp;</p><p><strong><u>Which are your top three?</u></strong></p><p>We believe that cyber-security, cloud, and MDM are the top three in terms of government requirements over the next 3-5 years.&nbsp; The Alliant II contract will need to be structured to allow total solutions that will address emerging technologies/products such as 3-D printing.</p><p>&nbsp;</p><p><strong><u>Are we missing emerging trends that you are tracking?</u></strong></p><p><strong><u>(1) 3-D Printing</u></strong>:&nbsp; The growth of 3-D printers is projected to be 75 percent in the coming year, and 200 percent in 2015. Gartner suggests that &ldquo;the consumer market hype has made organizations aware of the fact 3-D printing is a real, viable and cost-effective means to reduce costs through improved designs, streamlined prototyping and short-run manufacturing.&rdquo;</p><p>&nbsp;</p><p><strong><u>(2)</u></strong><strong><u>Sensor Technology:</u></strong>&nbsp; There is a great deal of sensor technology that is being developed to address requirements across a wide spectrum of industries/markets.&nbsp; For example, sensor technologies are being used in building management, automotive, defense, homeland security and a host of other applications.&nbsp;</p><p><strong><u>(3)</u></strong><strong><u>Cognitive Computing</u></strong><u>:</u>Tomorrow&#39;s cognitive systems will use natural language processing and machine learning technologies to communicate naturally with humans through voice commands and gestures.&nbsp; Cognitive systems will provide expert assistance to scientists, engineers, lawyers, and other professionals in a fraction of the time it now takes. Recent developments by foreign countries served as a wakeup call about the importance of investing in national competitiveness. &ldquo;American national security and competitiveness depends on the US not falling behind in this critical area of science and technology,&rdquo; said Congressman Randy Hultgren. Congressmen are crafting the American Supercomputing Leadership Act, a bill aimed at funding research in high performance computing at the national laboratories. Yet it was clear from remarks made by scientists and government officials at the event, &ldquo;<a href="http://www.research.ibm.com/cognitive-computing/index.shtml">Cognitive Computing</a>: A New Way of Thinking,&rdquo; that for the United States to retain its leadership in computing, a collaborative effort involving not just government but academia and industry will be required.</p><p>&nbsp;</p><p><strong><u>(4) D</u></strong><strong><u>ata center consolidation (DCC),</u></strong>In February 2010, the Federal Data Center Consolidation Initiative (FDCCI) was created to reverse the historic growth of Federal data centers.The FDCCI seeks to curb this unsustainable increase by reducing the cost of data center hardware, software, and operations; shifting IT investments to more efficient computing platforms; promoting the use of Green IT by reducing the overall energy and real estate footprint of government data centers; and increasing the IT security posture of the government.</p><p>To drive this effort, the CIO Council launched the Federal Data Center Consolidation Task Force that serves as a forum for best practices and lessons learned. It has led ongoing inventory validation and verification mechanisms to ensure the accuracy of this data and monitor the execution of agency consolidation plans. The Task Force is addressing topics such as, but not limited to, cost modeling, the government-wide marketplace detailed in the IT Reform Plan, technical approaches to consolidation, acquisition modalities, and the coordination of the FDCCI with Federal real property and sustainability efforts.</p><p>By shutting down and consolidating under-performing data centers and optimizing the data centers in our Federal inventory, the government stands to save taxpayers billions of dollars and curb spending on underutilized infrastructure.&nbsp; This means a shift from a model that risks procuring duplicative and wasteful infrastructure that utilizes only a fraction of the computing power purchased to a newer model, where that risk is reduced as the government purchases IT infrastructure as a service, deployed in a scalable and rapid fashion.&nbsp; DCC has been in process across the federal government for the past 5 years and we anticipate it will continue to be a high-volume acquisition candidate for the next 5 years.</p><p><strong><u>Which of the above should we ignore for now?</u></strong></p><p>Cloud Brokerage</p><div><p>&nbsp;</p></div><p>&nbsp;</p>
<div style="color: rgb(0, 0, 0); font-family: helvetica, arial; font-size: 13px;"><div style="font-family: Verdana;"><span style="letter-spacing: 0px;"><i><font size="4"><u>Are we missing emerging trends that you are tracking?</u>&nbsp;</font></i></span></div><div style="font-family: Verdana;">&nbsp;</div><div style="font-family: Verdana;"><span style="font-size: 10pt; letter-spacing: 0px;"><i>Yes, the emerging issue of False Claims Act violations. No small thing, the Justice Department False Claims Act recoveries in 2013 totaled&nbsp; $3.8B and $17B since 2009, a</i></span><span style="font-size: 10pt; letter-spacing: 0px; color: rgb(56, 56, 56);"><i>&nbsp;majority filed under the whistleblower or qui tam provisions.</i></span><span style="font-size: 10pt; letter-spacing: 0px;"><i>&nbsp;</i></span><i style="font-size: 10pt; letter-spacing: 0px;">The discussion below frames the issue as yet another dimension of Software and Supply Chain Risk Management assurance.</i></div><div style="font-size: 12px; font-family: Verdana; min-height: 15px;">&nbsp;</div><div style="font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">With 80% of government software procured as commercial off the shelf (COTS) and accorded limited or restricted rights, government acquisition managers need to be alert when it comes to intellectual property considerations. When modified and extended through government funding, COTS software becomes government off the shelf (GOTS) software entitled to Government Purpose Rights. Unless the government acquisition manager insists on it, a contractor may engage in false claims practice by&nbsp; improperly marketing and selling GOTS software products as COTS. So instead of receiving the benefits of Government Purpose Rights, the government may be charged a commercial product licensing fee and accorded only limited or restricted rights. Neglecting intellectual property rights can be costly!</span></div><div style="font-size: 12px; font-family: Verdana; min-height: 15px;">&nbsp;</div><div style="font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">Government acquisition managers sometimes overlook intellectual property considerations. Government off the Shelf (GOTS) products are often the result of Commercial off the Shelf (COTS) products extended, expanded, and upgraded under government funding to operate in new and changing environments. The GOTS products may even be entered into a company&rsquo;s Parts Number Data Base. As a result, these GOTS products may contain proprietary information, copyrighted material, and trade secrets that may serve to limit or restrict the future use of the GOTS products. In effect, proprietary information, not unlike malware, may serve to taint a software product.</span></div><div style="font-size: 12px; font-family: Verdana; min-height: 15px;">&nbsp;</div><div style="font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">Why is this a problem? The originating commercial organization may attempt to restrict use of the proprietary-based COTS product and even an enhanced GOTS product in order to assert a competitive advantage in a down stream procurement with the objective and intended outcome being to lock-in a sole source contract. Two software assurance challenges present themselves. The first challenge is how to detect proprietary information, copyrighted material, or trade secrets. The second challenge is how to convincingly assure the clean provenance of GOTS products in such an environment.</span></div><div style="font-size: 12px; font-family: Verdana; min-height: 15px;">&nbsp;</div><div style="font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">Government systems and components may contain proprietary information, copyrighted information, or trade secrets. Proprietary data rights are managed or not. Managed, these serve to enable use or reuse of GOTS systems and components. Not managed, these may limit or impede use or reuse. Not managed, these may serve to lock-in a contractor solution for future acquisitions. Not managed, these may release government funded proprietary information uncontrolled into the global commercial market. Specifically:</span></div><ul style="font-size: 10pt;"><li style="margin: 0px; font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">Government systems and components may contain proprietary information, copyrighted material, or trade secrets that serve to limit or impede use or reuse.</span></li><li style="margin: 0px; font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">A contractor may unintentionally drift into the use of such tactics inadvertently only to find that it can exploit and leverage its proprietary information in later procurements and attempt to do so.</span></li><li style="margin: 0px; font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">Beyond that perhaps less likely, a contractor may intentionally and stealthily seed proprietary information in systems and components only to reveal the proprietary presence later for the purpose of locking-in its solution for future work.</span></li><li style="margin: 0px; font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">Government-funded systems and components also yield government-owned proprietary systems and components which a contractor may attempt to package and resell as its own proprietary product on the global market.</span></li><li style="margin: 0px; font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">Upon detection of a dirty system, a contractor may choose to shed the restriction by redeveloping the dirty GOTS software into a clean system. This can be done by employing a rigorously defined Clean Room method to transform a proprietary-laden Dirty System&nbsp; into a proprietary-free Clean System, one devoid of reliance on proprietary information, copyrighted material, or trade secrets and not considered a derived work. Such a method employs both a Chinese Wall protocol of separation and the Clean Room Software Engineering technology and process.</span></li></ul><div style="font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">Questions a government acquisition organization needs to ask and answer to begin to focus on its Intellectual property practices:</span></div><ul style="font-size: 10pt;"><li style="margin: 0px; font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">To what extent are COTS products enhanced with government funds resulting in GOTS products?&nbsp;</span></li><li style="margin: 0px; font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">When COTS products are enhanced with government funds resulting in GOTS products, is it the contractor practice to enter the GOTS product into the Parts Number Data Base?&nbsp;</span></li><li style="margin: 0px; font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">When COTS products are enhanced with government funds resulting in GOTS products, is it the contractor practice to append its own copyright? To what extent does this practice go undetected?</span></li><li style="margin: 0px; font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">To what extent are systems and components trusted with respect to contractor proprietary information, copyrighted information, or trade secrets that could limit or impede use or reuse?&nbsp;</span></li><li style="margin: 0px; font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">To what extent are systems and components trusted with respect to government-funded proprietary information that could result in unauthorized release of GOTS as contractor-proprietary products?&nbsp;</span></li><li style="margin: 0px; font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">To what extent do systems or components thought to be GOTS have restrictions on downstream use or reuse?&nbsp;</span></li><li style="margin: 0px; font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">To what extent should proprietary information concerns be included in the approach to trusted systems and networks and their Supply Chain Risk Management Assurance?&nbsp;</span></li><li style="margin: 0px; font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">To what extent should the NIST SP-161 SCRM Plan address the identification and risk mitigation of government systems and components that may contain proprietary information, copyrighted material, or trade secrets that limit or impede use or reuse, lock-in contractor solutions for future work, or facilitate the packaging and reselling of GOTS as contractor-proprietary products?</span></li></ul><div style="font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">An organization may be crossing the line and be guilty of false claims violations when it markets, sells, deploys, or delivers a version of its product produced by mixed funding, company investment and government funding, as a commercial software with limited or restricted rights, thereby, depriving the government agency of the Government Purpose Rights it may have purchased and deserves. In an environment of ascending demand for a software product, a company may commit numerous false claims violations during rollout when it improperly markets, sells, deploys, or delivers such a software product as a commercial&nbsp; product with limited or restricted rights rather than properly as a noncommercial software product with Government Purpose Rights.</span></div><div style="font-size: 12px; font-family: Verdana; min-height: 15px;">&nbsp;</div><div style="font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">Faced with a mixed funding history in a software product, a company may elect to produce a commercial version by reengineering the software product in question using the Clean Room method and process. Once a Clean Room Project has been undertaken, the object of marketing and selling shifts to the Clean Room version of the product under development with a future delivery date, not subject to charges of false claims violations. In effect, the company is insulated from charges of false claims violations during the window of &ldquo;<i>under development&rdquo;.&nbsp;</i>Since Clean Room reengineering is challenging and difficult, the Clean Room Project&nbsp; schedule may slip and become extended exceeding the original estimate and plan, thereby, setting up a dilemma for the company facing firm delivery commitment deadlines to customers performing in mission critical operations. A company that has made a commitment to deliver a commercial product with limited and restricted rights and is faced with an incomplete Clean Room may decide that it has no alternative but to deliver the Dirty System, the product of mixed funding, and may elect to do so without reverting back to Government Purpose Rights, a false claims violation. Of course, it takes two to Tango... the company intent and the government acquisition contract officer and program manager neglect whose responsibility is to exercise due diligence in accepting and relinquishing data rights asserted by the contractor.</span></div><div style="font-size: 12px; font-family: Verdana; min-height: 15px;">&nbsp;</div><div style="font-size: 12px; font-family: Verdana;"><span style="letter-spacing: 0px;">In order for the Clean Room window&nbsp;<i>&ldquo;under development</i>&rdquo; to insulate the company from numerous charges of&nbsp; false claims violations, the Clean Room method and process must be bonafide and legitimate, that is, the Clean Room method and process must assure an environment and operation devoid of any use or knowledge of proprietary means or methods used in a predecessor implementation.</span></div><div style="font-size: 12px; font-family: Verdana; min-height: 15px;">&nbsp;</div><div style="font-size: 10pt; font-family: Arial;">&nbsp;</div><table cellpadding="0" cellspacing="0" style="font-size: 10pt; border-collapse: collapse;"><tbody><tr><td style="width: 230px; height: 42px; border-style: solid; border-color: rgb(0, 0, 0); padding: 5px;" valign="top"><div style="font-size: 12px; font-family: Helvetica;"><span style="letter-spacing: 0px;">A Defined Software Clean Room Method for Transforming a Dirty System into a Clean System</span></div></td><td style="width: 169.3px; height: 42px; border-style: solid; border-color: rgb(0, 0, 0); padding: 5px;" valign="top"><div style="font-size: 11px; font-family: Arial; color: rgb(7, 38, 167);"><span style="text-decoration: underline; letter-spacing: 0px;"><a href="http://youtu.be/UTfHD1ORjOs" style="color: blue; cursor: pointer;" target="_blank">http://youtu.be/UTfHD1ORjOs</a></span></div><div style="font-size: 12px; font-family: Helvetica; min-height: 14px;">&nbsp;</div></td><td style="width: 34.6px; height: 42px; border-style: solid; border-color: rgb(0, 0, 0); padding: 5px;" valign="top"><div style="font-size: 11px; font-family: Arial; color: rgb(102, 102, 102);"><span style="letter-spacing: 0px;">17:03</span></div></td></tr></tbody></table></div><div style="color: rgb(0, 0, 0); font-family: helvetica, arial; font-size: 10pt;"><font color="black" face="Arial, Helvetica, sans-serif">Don O&#39;Neill</font></div><div style="color: rgb(0, 0, 0); font-family: helvetica, arial; font-size: 10pt;"><font color="black" face="Arial, Helvetica, sans-serif">Independent Consultant</font></div>
<p>With the ever increasingly threats to both the Corporate World and the Government Infrastructure&#39;s, Security will always be a top critical player in within IT and all related areas such as&nbsp;Cyber and Infromation Security, Supply Chain Management, Risk Management, etc...&nbsp;</p><p>With budgets decreasing and IT needs increasing, using fore thought, Service Providers have been able to restructure pricing models to accomodate service offering at a Firm Fixed Price on services such as As-A-Service,&nbsp;Mobility and Managed Mobility, Cloud, Display Technologies, Big Data, Battery/Power Solutions, etc...&nbsp; Thus, allowing for budgets in both the Corporate World and the Government to be more predictable and projectable for out lying years.</p><p>With the&nbsp;needs for Technology Advancement in Security, Healthcare being more important daily on&nbsp;how we do business, services such&nbsp;as Predictive Analytics and&nbsp;Health IT/Nano Technology, etc...,&nbsp;will also continue to be watched, tracked and invested into.</p><p>So, as you see, you&#39;ve picked very solid buzz trends that will most likely be around for awhile.&nbsp; Now, we in Industry will change the words but leave the meanings just to show a freshness in the air, but the bottom line is security, providing services in a smarter/cheaper&nbsp;manner and being on the cutting edge of advanced technology is and will be where Industry operates from.</p>
Peter Cholakis
<article class="gs-post gs-article"><div class="gs-postcontent gs-postcontent-0 clearfix"><div class="gs-article dasda"><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="comment comment-new clearfix"><p>The fundamental challenge/issue remains that better decision making leading to optimization of available resources requires is impossible within the current GSA framework. &nbsp; Accurate, timely infomation, collaboration among stakeholders, and transparent efficient decision support mechanisms are all lacking.</p><p>I can only address one particular market segment, the efficient life-cycle management of the built environment in an level of granularity. &nbsp; That said,&nbsp; buildings and infrastructure are critically linked to our economic and environment well being, thus not a bad place to start.</p><p>The GSA must adopt a strategic life-cycle approach across all its GSA regions and adopt collaborative construction delivery methods, a robust ontology, and standardized data architectures for costing, etc.&nbsp; Until it does this, it will not reach any measurable level of improvement in this domain.</p><p>Items critical to any significant short term progress include:</p><ul><li>Collaborative construction delivery methods such as Integrated Project Delivery (IPD), and Job Order Contracting (JOC)</li><li>Cloud Computing</li><li>Big data and associated analytics</li><li>Clearly defined robust processes and associated metrics</li></ul><p>Here&#39;s just a taste...</p><p>http://buildinginformationmanagement.wordpress.com/2014/04/08/bim-blm-onology-building-information-modeling-built-environment-life-cycle-management-2014/</p><p>&nbsp;</p></div></div></div></div></div></article>
<p>We believe the trends you referenced will play an important role in the next 10 to 15 years. We would also like for you to consider specifying capabilities that enable the &lsquo;Internet of Things&rsquo; ecosystem. &nbsp;As DoD continues to grow its unmanned systems (UUV, UAS, etc), the capabilities that enable everything from system control to remote sensing to big data processing and visualization will become increasingly important. &nbsp;We would be happy to discuss this further if you need more clarification.&nbsp;</p>
Sandy Kumar
<p>Our team feels that all three trending aspects are critical and remain firmly entwined. With Data and User Behavior providing the fundamental framework for efficient understanding of customers needs, both the following factors are key.&nbsp;</p><ol style="margin: 0.5em 0px 0.5em 13px; padding: 0px; list-style-position: inside; color: rgb(76, 76, 76); font-family: Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 14px; line-height: 21px;"><li style="margin: 3px 0px 0px; padding: 0px; text-align: left; overflow: visible;">Big Data/Predictive Analytics</li><li style="margin: 3px 0px 0px; padding: 0px; text-align: left; overflow: visible;">Mobility and Managed Mobility</li></ol><p style="margin: 3px 0px 0px; padding: 0px; text-align: left; overflow: visible;">Cloud provides a cost efficient platform, however, cyber/&nbsp;<span style="color: rgb(76, 76, 76); font-family: Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 14px; line-height: 21px;">Information security applies to every context and continue to remain in the forefront.</span></p><p style="margin: 3px 0px 0px; padding: 0px; text-align: left; overflow: visible;">&nbsp;</p>
<p>Ten to fifteen years? Who could know? I think making reference the Federal Enterprise Architecture as in Alliant I was a smart way to predict the future of technology, since doing so with specificity might just be a fool&#39;s errand.</p>
<ol><li><strong>How critical do you think any of these trends will be over the next 10-15 years?</strong></li></ol><p><strong>Highly critical</strong></p><ul><li><strong><u>Cyber and Information Security</u></strong>. New technologies and ever-more interconnected devices will face increasingly sophisticated threats.</li><li><strong><u>Big Data.</u></strong>Increased power, depth of decision-making and the cost-effective use of scarce resourceswill require advances in big data coupled with predictive analytics.</li><li><strong><u>The New &ldquo;Cloud&rdquo; Shift.</u></strong>Cloud and &rdquo;as-a-service&rdquo; technologies and architecture will support high-bandwidth, dynamic applications, such as BYOD, Big Data, and geographically-distributed databases and servers.</li><li><strong><u>Mobility and Managed Mobility.</u></strong>Agencies will need advanced mobile capabilities to keep pace with technologies and applications used by geographically-dispersed employees and the general public that they service.</li></ul><p><strong>Critical</strong></p><ul><li><strong><u>Cloud Brokerage.</u></strong>Short-term brokerage services will continue to help agencies leverage the cloud and meet mandates, while evolving to the next generation of IT Service Delivery.</li><li><strong><u>Battery and Power Solutions</u></strong>will need more capacity and efficiency to handle advanced capabilities and offset the high cost of rare materials and dwindling energy resources.&nbsp;</li><li><strong><u>Health IT/Nanotechnology</u></strong><strong>.</strong>Nanotechnology will make it possible to predict, diagnose and treat individuals without the need for intrusive surgical techniques and expensive medications.</li></ul><p><strong>Somewhat Critical</strong></p><ul><li><strong><u>Display Technology Advances</u></strong>. Resource-intensive applications, such as imaging, geospatial and weather, will benefit from more interactive, flexible screens with higher resolutions and immersive (i.e., virtual reality) capabilities.</li><li><strong><u>Supply Chain Management Solutions</u></strong>will provide better/easier tracking of scarce resources (especially in military and healthcare settings) while enabling on-demand services.</li></ul><ol start="2"><li><strong>Which are your top three?</strong><ol><li>Cyber and Information Security(by far the most important due to the growing and pervasive interconnectivity of devices, the growing use of BYOD, and the continuing evolution of more sophisticated threats)</li><li>Big Data/Predictive Analytics</li><li>Mobility and Managed Mobility</li></ol></li><li><strong>Are we missing emerging trends that you are tracking?</strong><ul><li><strong>On-demand services </strong>will involve a combination of a <strong>cloud infrastructure</strong> and <strong>mobile/app development</strong> to enable easy and quick access to services from a mobile device, such as physician consults that require data sharing across personal clouds to coordinate care from multiple providers.</li><li>The <strong>&ldquo;internet of everything&rdquo;</strong> will use connected devices/sensors to automatically provide and receive information (e.g., a veteran wearing a heart rate/blood pressure monitor that automatically sends an alert to her doctor&rsquo;s office who then sends an electronic notification to her pharmacy for a new prescription.) &nbsp;</li><li><strong>3D printing and fabrication</strong>will change the way industries operate with the ability to &ldquo;print&rdquo; new parts on the spot, such as airplane mechanics printing a replacement part on the runway, or soldiers printing new ammunition on the battlefield.</li></ul></li><li><strong>Which of the above should we ignore for now?</strong></li></ol><p style="margin-left: 40px;">We believe that the GSA should consider each of the trends listed above, since it is beneficial for the solicitation to remain flexible to allow current and future emerging trends and technologies.</p><p>Information Innovators Inc (Triple-i)</p>
Our input to your questions about the tech trends. This is from Teledon Solutions’ employees’ perspective: How critical do you think any of these trends will be over the next 10-15 years? • We feel it is critical to stay current with the trends o To have efficient business practices. o Financial gains and growth are benefits to staying current with the trends of industry. o Customers will gravitate to what is currently trending. Current trends will dictate sales. o By keeping up with the trends you show that you have a wide array of knowledge. o Keeping up with the current trends your core capabilities are stronger than if you don’t. Which are your top three? • To pick a top three is impossible. There are many top trends. Some of those trends tie together making them dependent on the other for success. o Cloud services are a key trend at the moment.  Everyone is moving their stored data to a cloud configuration by doing that people need increased Mobility and Managed Mobility. At the same time while moving their large amounts of data to a cloud configuration they are requiring Bigger Data but always looking for the most secure way. Thus tying in the need for Cyber Information and Security. Also the company managing that cloud is always looking for ways to grow and manage what they can service their customer. Always offering bigger and better packages to their customers.  Cloud Services are dependent upon: Mobility and Managed Mobility, Big Data, Cyber Information and Security, and Cloud Brokerage. o Another trending element that stood out was the Battery and Power Solutions.  We have all heard about the new power packs or the quick battery backup options that are coming out for Cellphones and Tablets. Everyone is looking for a better and more compact battery option from everyday consumers to telecom data consumers.  We have also found that renewable energy has become a very big topic in today’s world. • LEED certified building opportunities. • More Solar Energy Options. • Less environmentally invasive ways of living. o Advancements in Health IT and Nano Technology  Everyone is looking for a better, less invasive way of conducting medical procedures.  Epic has created a software network that is in almost every hospital and clinic and that software is ever evolving and becoming more efficient.  Genetic testing is taking a trend. People are being tested to see if they carry the genetic trait for cancer or disease. Are we missing emerging trends that you are tracking? o One trend that stood out was the effects of social media on everyday life.  Everyone is going to social media. From Teenagers, Parents and Elderly people to Small and Big Businesses.  Businesses are all encouraging their employees to use and report about their jobs on Twitter and Facebook.  Businesses are even using social media to dictate their hiring. o Also within the Telecom industry we have found that the dying TDM service requests are making an increase.  This being DS3 and T1 Requests from Mobil Carriers. o Another trend that we touch upon in the top three trends that is being over looked to a degree as well as being noticed is the LEED certification.  LEED Certification touches many areas of industry • Building Design and Construction. o Applies to buildings that are being newly constructed or going through a major renovation. • Interior Design and Construction. o Applies to projects that are complete interior fit-out • Building Operations and Maintenance. o Applies to existing buildings that are undergoing improvement work or little to no construction. • Neighborhood Development. o Applies to new land development projects or redevelopment projects containing residential uses, nonresidential uses or a mix. • Homes. o Applies to single family homes, low-rise multi-family (one to three stories), or mid-rise multi-family (four to six stories). Which of these should we ignore for now? o To us there are some things that are not trending and instead are more day to day operations.  Supply Chain Management • This is a day to day situation. That is used in everyday business.  Predictive Analytics • Every company with good business practices is looking at predictive analytics. They are always looking at the big picture and how to improve it.  Display Technologies • Is not exactly trending. However everyone is looking for a clearer, bigger better visual and that is something that will never change.
<p>Network Security Systems Plus, Inc. - comment</p><p>Our three focus areas are:</p><ul><li>Cyber Security and Information Security</li><li>Predictive Analytics (as a key element of Cyber security)</li><li>The &ldquo;New Cloud&rdquo; shift and all the &ldquo;as a service&rdquo; offers emerging as a result</li></ul><p>Another area that should be included in the vehicle is Critical Infrastructure Protection relating to the energy sector</p><p>&nbsp;</p>
<p><u>DSD Laboratories, Inc. Comment</u></p><p>&nbsp;</p><ol><li>While your trend list is not described as being in any sort of ranked order, we feel that Cyber and Information Security will remain at the forefront of most CIO concerns for the next 10-15 years.&nbsp; The federal agencies are getting better but there are several areas that have not been focused on including new and emerging cyber threats - especially massive and persistent cyber-attacks that are state sponsored.</li><li>Cyber and Information Security (Information Assurance),Cloud Brokerage,Big Data</li><li>LPTA Trends in Government Contracting</li><li>Supply Chain Management</li></ol>
Welcome! Thank you for visiting the GSA Alliant 2 (A2) & Alliant 2 Small Business (A2SB) GWACs Community. The purpose of this site is to... More

To stay informed on the group's latest updates, subscribe here.

  • ggroskreutz's picture
  • MWatters2's picture
  • oraiosward's picture