NIH picks 54 winners for major IT deal

When the Office of Management and Budget agreed in 2010 to let the National Institutes of Health go forward with its Chief Information Officers-Solutions and Partners 3 governmentwide acquisition contract, it let NIH remain one of a very few agencies allowed to host a GWAC. GWACs require new approval from the Office of Federal Procurement Policy each time they come due for renewal, and there had been some question about whether CIO-SP3 would come to be.

Now the NIH Information Technology Acquisition and Assessment Center (NITAAC) has awarded the contract to 54 companies. It carries a ceiling of $20 billion. Its predecessor, CIO-SP2i, had a ceiling of $19.5 billion.

The 10-year indefinite-delivery/indefinite-quantity contract offers IT support for Federal Enterprise Architecture, the Federal Health Architecture and the Defense Department Enterprise Architecture.

The GWAC also provides services, including data center consolidation, cloud computing, health IT, mobility and cybersecurity.  The winners will compete for task orders.

The companies on the contract are:

  • AAC, Inc.
  • Accenture Federal Services, LLC
  • ACS Federal Solutions LLC
  • Advanced Technology Systems Inc.
  • Aquilent, Inc.
  • A-TEK Inc.
  • BAE Systems Information Solutions Inc.
  • Booz Allen Hamilton Inc.
  • CACI Enterprise Solutions Inc.
  • Catapult Health Technology Group LLC
  • CGI Federal Inc.
  • Ciber Inc.
  • Computer Sciences Corp.
  • Creative Computing Solutions Inc.
  • Creative Information Technology Inc.
  • Dell Services Federal Government Inc.
  • Deloitte Consulting LLP
  • Delta Solutions & Technologies Inc.
  • Dynamics Research Corp.
  • Electronic Consulting Services Inc.
  • Evolvent Technologies Inc.
  • General Dynamics Information Technology Inc.
  • GTSI Corp.
  • Harris IT Services Corp.
  • HP Enterprise Services LLC
  • Hygeia Solution Partners LLC
  • IBM
  • ICF Incorporated LLC
  • INDUS Corp.
  • Jacobs Technology Inc.
  • L-3 Services Inc.
  • LGS Innovations LLC
  • Lockheed Martin Services Inc.
  • NCI Information Systems Inc.
  • Northrop Grumman Systems Corp.
  • OMNITEC Solutions Inc.
  • Onpoint Consulting Inc.
  • Pragmatics Inc.
  • PricewaterhouseCoopers LLP
  • Project Performance Corp.
  • Quality Software Inc.
  • Raytheon Co.
  • SAIC
  • Serco Inc.
  • SGT Inc.
  • Smartronix Inc.
  • Sotera Defense Solutions Inc.
  • STG Inc.
  • Systems Research and Applications Corp.
  • Unisys Corp.
  • Universal Hi-Tech Development Inc.
  • Vistronix Inc.
  • VSE Corp.
  • Wyle Information Systems, LLC

 

About the Author

Matthew Weigelt is a freelance journalist who writes about acquisition and procurement.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group