|By Business Wire||
|November 13, 2012 02:00 PM EST||
SRA International, Inc., a leading provider of technology and strategic consulting services and solutions to government organizations, today announced it was selected by the U.S. Department of Justice (DOJ) to continue supporting the agency’s Joint Biometric Data Exchange Hosting Environment (JBDEHE) operations and maintenance infrastructure. The Information Technology Support Services 4 (ITSS-4) contract is valued at $21.4 million if all options are exercised. Under the contract, SRA will continue managing, operating and maintaining the entire JBDEHE infrastructure.
Under DOJ JBDEHE, SRA will provide system operations, maintenance and help desk support, system development, government furnished equipment inventory/distribution management and system security.
“SRA is proud of our partnership with the DOJ and our long history of supporting the law enforcement community,” said SRA Senior Vice President Pat Burke for the Intelligence, Homeland Security and Special Operations group. “We are eager to continue applying our innovative infrastructure support methodology and management expertise to ensure this real-time, mission-critical law enforcement program is always ready for 24x7 operations.”
JBDEHE consists of two primary components. The Joint Automated Booking System (JABS) facilitates data dissemination and real-time information sharing between federal law enforcement agencies located in more than 1,100 sites across the nation. It interfaces with the Federal Bureau of Investigation’s (FBI) Integrated Automated Fingerprint Identification System and enables law enforcement to effectively identify individuals in federal custody based on their fingerprints. The second component, the Civilian Applicant System (CAS), enables users to capture civilian application fingerprints and biographical data electronically and transmit them to the FBI as part of the background investigation process for current and new employees, political appointees and contractor personnel.
About SRA International, Inc.
For more than 30 years, SRA International has been dedicated to solving complex mission and efficiency challenges for the U.S. government. From our headquarters in Fairfax, Va., and from offices and locations around the globe, our approximately 5,800 employees support government clients in civilian, defense, health, intelligence, law enforcement and homeland security agencies by delivering IT solutions and professional services in such areas as information technology lifecycle services; cloud and mobile computing; cyber security; solutions development and integration; and, strategy development and organizational change management. We also provide mission-specific domain expertise in areas such as energy and environmental consulting; intelligence analysis; advanced research; and bioinformatics. Our employees’ deep commitment to offering real value to our clients and serving our communities is rooted in our ethic of Honesty and Service®.
For more information on SRA International, please visit us at www.sra.com.
Any statements in this press release about future expectations, plans, and prospects for SRA, including statements about the estimated value of the contract and work to be performed, and other statements containing the words “estimates,” “believes,” “anticipates,” “plans,” “expects,” “will,” “could,” “intend,” “may,” “potential,” “should,” “would” and similar expressions, constitute forward-looking statements within the meaning of The Private Securities Litigation Reform Act of 1995. You should read statements that contain these words carefully because they discuss our future expectations, contain projections of our future results of operations or of our financial position, or state other forward-looking information. Factors or risks that could cause our actual results to differ materially from the results we anticipate include, but are not limited to: (i) reduced spending levels and changing budget priorities of our largest customer, the United States federal government, which accounts for more than 98% of our revenue; (ii) failure of the customer to fund a contract or exercise options to extend contracts, or our inability to successfully execute awarded contracts; (iii) the failure of congressional leaders to agree upon further budget reductions as required by the debt ceiling compromise triggering automatic across-the-board cuts beginning in 2013 to civil and defense programs; (iv) failure to comply with complex U.S. government procurement-related laws and other regulations, including but not limited to, punitive damage liabilities under the False Claims Act and other laws, and financial incentives under so-called “whistleblower” statutes, awarding the whistleblower with a percentage of the recovery if the claims are successfully waged; (v) possible delays or overturning of our government contract awards due to bid protests by competitors or loss of contract revenue or diminished opportunities based on the existence of organizational conflicts of interest; (vi) failure to comply with laws such as the Foreign Corrupt Practices Act or regulations on government gratuities; (vii) failure to comply with Federal Acquisition Regulations and Cost Accounting Standards or the Fair Labor Standards Act; (viii) security threats, attacks or other disruptions on our information infrastructure, and failure to comply with complex network security and data privacy legal and contractual obligations or to protect sensitive information; (ix) any violation of third party intellectual rights; (x) adverse changes in federal government practices; (xi) delays in the U.S. government adopting appropriations necessary for program funding and future appropriation uncertainties adversely impacting customer spending plans; (xii) intense competition to win U.S. government contracts or recompetes and commoditization of services we offer; (xiii) failure to obtain option awards, task orders or funding under contracts, or inability to successfully execute awarded contracts; (xiv) any adverse results of audits and investigations conducted by the Defense Contract Audit Agency or any of the Inspectors General for various agencies with which we contract, including, without limitation, any determination that our contractor business systems or contractor internal control systems are deficient; and (xv) difficulties accurately estimating contract costs and contract performance requirements; (xvi) challenges in attracting and retaining key personnel or high-quality employees, particularly those with security clearances.
Although we believe that the expectations reflected in the forward-looking statements are reasonable, we cannot guarantee future results, levels of activity, performance or achievements. You should not place undue reliance on these forward-looking statements. In addition, the forward-looking statements included in this press release represent our views as of Nov. 13, 2012. We anticipate that subsequent events and developments will cause our views to change. While we may elect to update these forward-looking statements at some point in the future, we specifically disclaim any obligation to do so. These forward-looking statements should not be relied upon as representing our views as of any date subsequent to Nov. 13, 2012.
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band-aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It does...
Dec. 5, 2016 07:30 AM EST Reads: 958
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Dec. 5, 2016 07:30 AM EST Reads: 7,030
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web ...
Dec. 5, 2016 07:15 AM EST Reads: 1,250
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Dec. 5, 2016 06:45 AM EST Reads: 1,790
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Dec. 5, 2016 06:45 AM EST Reads: 1,591
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Phil Hombledal, Solution Architect at CollabNet, discussed how customers are able to achieve a level of transparency that e...
Dec. 5, 2016 06:45 AM EST Reads: 973
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 5, 2016 06:30 AM EST Reads: 692
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Dec. 5, 2016 06:15 AM EST Reads: 859
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Dec. 5, 2016 06:00 AM EST Reads: 1,678
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
Dec. 5, 2016 04:30 AM EST Reads: 5,214
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
Dec. 5, 2016 04:15 AM EST Reads: 1,614
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Dec. 5, 2016 04:00 AM EST Reads: 4,701
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Dec. 5, 2016 04:00 AM EST Reads: 5,406
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Dec. 5, 2016 04:00 AM EST Reads: 5,115
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 5, 2016 03:30 AM EST Reads: 652