Welcome!

News Feed Item

SRA Schedules FY13 Second Quarter Conference Call

SRA International, Inc., a leading provider of technology and strategic consulting services and solutions to government organizations, today announced it will discuss its fiscal year 2013 second quarter operating results in a conference call beginning at 9 a.m. ET on Tuesday, Feb. 19. The company’s quarterly report on Form 10-Q will be filed with the Securities and Exchange Commission prior to the call.

Interested parties may listen to the conference call by dialing 800-779-7680 (U.S.) or 212-547-0205 (other), using passcode 4518270. A replay of the call will be available from approximately 11 a.m. ET on Tuesday, Feb. 19, through Monday, Mar. 4. Interested parties may listen to the replay by dialing 800-839-1170 (toll-free) or 402-998-0559 (toll), using passcode 1798.

About SRA International, Inc.

For more than 30 years, SRA International has been dedicated to solving complex mission and efficiency challenges for the U.S. government. From our headquarters in Fairfax, Va., and from offices and locations around the globe, our approximately 6,000 employees support government clients in civilian, defense, health, intelligence, law enforcement and homeland security agencies by delivering IT solutions and professional services in such areas as information technology lifecycle services; cloud and mobile computing; cyber security; solutions development and integration; and, strategy development and organizational change management. We also provide mission-specific domain expertise in areas such as energy and environmental consulting; intelligence analysis; advanced research; and bioinformatics. Our employees’ deep commitment to offering real value to our clients and serving our communities is rooted in our ethic of Honesty and Service®.

For more information on SRA International, please visit us at www.sra.com.

Any statements in this press release about future expectations, plans, and prospects for SRA, including statements about the estimated value of the contract and work to be performed, and other statements containing the words “estimates,” “believes,” “anticipates,” “plans,” “expects,” “will,” “could,” “intend,” “may,” “potential,” “should,” “would” and similar expressions, constitute forward-looking statements within the meaning of The Private Securities Litigation Reform Act of 1995. You should read statements that contain these words carefully because they discuss our future expectations, contain projections of our future results of operations or of our financial position, or state other forward-looking information. Factors or risks that could cause our actual results to differ materially from the results we anticipate include, but are not limited to: (i) reduced spending levels and changing budget priorities of our largest customer, the United States federal government, which accounts for more than 98% of our revenue; (ii) failure of the customer to fund a contract or exercise options to extend contracts, or our inability to successfully execute awarded contracts; (iii) the failure of congressional leaders to agree upon further budget reductions as required by the debt ceiling compromise triggering automatic across-the-board cuts beginning in 2013 to civil and defense programs; (iv) failure to comply with complex U.S. government procurement-related laws and other regulations, including but not limited to, punitive damage liabilities under the False Claims Act and other laws, and financial incentives under so-called “whistleblower” statutes, awarding the whistleblower with a percentage of the recovery if the claims are successfully waged; (v) possible delays or overturning of our government contract awards due to bid protests by competitors or loss of contract revenue or diminished opportunities based on the existence of organizational conflicts of interest; (vi) failure to comply with laws such as the Foreign Corrupt Practices Act or regulations on government gratuities; (vii) failure to comply with Federal Acquisition Regulations and Cost Accounting Standards or the Fair Labor Standards Act; (viii) security threats, attacks or other disruptions on our information infrastructure, and failure to comply with complex network security and data privacy legal and contractual obligations or to protect sensitive information; (ix) any violation of third party intellectual rights; (x) adverse changes in federal government practices; (xi) delays in the U.S. government adopting appropriations necessary for program funding and future appropriation uncertainties adversely impacting customer spending plans; (xii) intense competition to win U.S. government contracts or recompetes and commoditization of services we offer; (xiii) failure to obtain option awards, task orders or funding under contracts, or inability to successfully execute awarded contracts; (xiv) any adverse results of audits and investigations conducted by the Defense Contract Audit Agency or any of the Inspectors General for various agencies with which we contract, including, without limitation, any determination that our contractor business systems or contractor internal control systems are deficient; and (xv) difficulties accurately estimating contract costs and contract performance requirements; (xvi) challenges in attracting and retaining key personnel or high-quality employees, particularly those with security clearances.

Although we believe that the expectations reflected in the forward-looking statements are reasonable, we cannot guarantee future results, levels of activity, performance or achievements. You should not place undue reliance on these forward-looking statements. In addition, the forward-looking statements included in this press release represent our views as of Feb. 1, 2013. We anticipate that subsequent events and developments will cause our views to change. While we may elect to update these forward-looking statements at some point in the future, we specifically disclaim any obligation to do so. These forward-looking statements should not be relied upon as representing our views as of any date subsequent to Feb. 1, 2013.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The need for greater agility and scalability necessitated the digital transformation in the form of following equation: monolithic to microservices to serverless architecture (FaaS). To keep up with the cut-throat competition, the organisations need to update their technology stack to make software development their differentiating factor. Thus microservices architecture emerged as a potential method to provide development teams with greater flexibility and other advantages, such as the abili...
Product connectivity goes hand and hand these days with increased use of personal data. New IoT devices are becoming more personalized than ever before. In his session at 22nd Cloud Expo | DXWorld Expo, Nicolas Fierro, CEO of MIMIR Blockchain Solutions, will discuss how in order to protect your data and privacy, IoT applications need to embrace Blockchain technology for a new level of product security never before seen - or needed.
Blockchain. A day doesn’t seem to go by without seeing articles and discussions about the technology. According to PwC executive Seamus Cushley, approximately $1.4B has been invested in blockchain just last year. In Gartner’s recent hype cycle for emerging technologies, blockchain is approaching the peak. It is considered by Gartner as one of the ‘Key platform-enabling technologies to track.’ While there is a lot of ‘hype vs reality’ discussions going on, there is no arguing that blockchain is b...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection between Coke and its customers. Digital signs pair software with high-resolution displays so that a message can be changed instantly based on what the operator wants to communicate or sell. In their Day 3 Keynote at 21st Cloud Expo, Greg Chambers, Global Group Director, Digital Innovation, Coca-Cola, and Vidya Nagarajan, a Senior Product Manager at Google, discussed how from store operations and ...
"As we've gone out into the public cloud we've seen that over time we may have lost a few things - we've lost control, we've given up cost to a certain extent, and then security, flexibility," explained Steve Conner, VP of Sales at Cloudistics,in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across business networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost as well as advance trade. Are you curious about how Blockchain is built for business? In her session at 21st Cloud Expo, René Bostic, Technical VP of the IBM Cloud Unit in North America, discussed the b...
The use of containers by developers -- and now increasingly IT operators -- has grown from infatuation to deep and abiding love. But as with any long-term affair, the honeymoon soon leads to needing to live well together ... and maybe even getting some relationship help along the way. And so it goes with container orchestration and automation solutions, which are rapidly emerging as the means to maintain the bliss between rapid container adoption and broad container use among multiple cloud host...
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Services at NetApp, described how NetApp designed a three-year program of work to migrate 25PB of a major telco's enterprise data to a new STaaS platform, and then secured a long-term contract to manage and operate the platform. This significant program blended the best of NetApp’s solutions and services capabilities to enable this telco’s successful adoption of private cloud storage and launching ...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
Imagine if you will, a retail floor so densely packed with sensors that they can pick up the movements of insects scurrying across a store aisle. Or a component of a piece of factory equipment so well-instrumented that its digital twin provides resolution down to the micrometer.
"Since we launched LinuxONE we learned a lot from our customers. More than anything what they responded to were some very unique security capabilities that we have," explained Mark Figley, Director of LinuxONE Offerings at IBM, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every real-life scenario that a Kubernetes user might encounter? How do you leverage advanced scheduling techniques to shape and describe each scenario in easy-to-use rules and configurations? In his session at @DevOpsSummit at 21st Cloud Expo, Oleg Chunikhin, CTO at Kublr, answered these questions and demonstrated techniques for implementing advanced scheduling. For example, using spot instances and co...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...