From Idea to Implementation: Starting the Process To Amend the FAR
In the administration’s first 100 days in office, multiple executive orders (EO) were signed to update federal procurement. Several initiatives released across the federal market include the OneGov Strategy, procurement consolidation and the Army Transformation Initiative.
Member Spotlight: Susanna Patten, Senior Manager, Market Intelligence
While some people may view curiosity as a personality trait, Susanna Patten sees it as an important strategic asset. In her role as Senior Manager, Market Intelligence at TD SYNNEX Public Sector, she goes beyond analyzing numbers; she uncovers the narrative behind them. By approaching data with a storytelling mindset, she is able to turn information into insight, and insight into impact.
Forging the Future: The Army Transformation Initiative
On Thursday April 30th, Defense Secretary Pete Hegseth released a memo for the U.S. Army to undergo a “comprehensive transformation”.
ICYMI: NASCIO’s 2025 Midyear Conference Rundown
The 2025 National Association of State Chief Information Officers (NASCIO) Midyear Conference took place in Philadelphia, PA where state technology leaders shared insights into their top technology priorities for this year. Some of the key focus areas included AI with emphasis on generative AI, data management, governance and quality and cybersecurity and risk management.
GSA’s New OneGov Strategy
In the last week, the General Services Administration (GSA) officially launched the OneGov Strategy — a bold, long-term initiative to modernize the way agencies purchase goods and services, starting with IT.
In simple terms: GSA wants to move away from agencies buying software in silos and instead act like one large, coordinated customer. That means better pricing, stronger security and a more efficient process, according to the agency.
So what’s changing, and what does it mean for IT resellers and vendors in the public sector?
Federal IT Procurement Centralization: GSA’s Role
The White House recently introduced a major change in how the federal government plans to procure goods and services in its ongoing effort to eliminate waste, fraud and abuse. In an Executive Order published on March 20, 2025, it calls for all federal procurement to consolidate under General Services Administration (GSA) management. This essentially centralizes all federal agencies’ purchasing of technology products and services to one agency.
IT’s Role in the 2025 Student Experience
This year, higher education is undergoing a transformative shift and education institutions must now keep pace with the expectations of the modern world. Emerging and innovative technology is at the forefront of this transformation, with a focus on boosting flexibility, expanding access to student services and enhancing the individualized student experience with more personalized learning options.
The Federal Contractor Cybersecurity Act and What You Should Know
To enhance federal cybersecurity, Rep. Nancy Mace, R-S. Carolina, introduced the Federal Contractor Cybersecurity Vulnerability Reduction Act of 2025 (H.R. 872) on January 31, 2025. A similar bill introduced the previous year stalled in the Senate. This bill aims to close a critical gap in federal cybersecurity standards by ensuring that all federal contractors implement a vulnerability disclosure policy consistent with the National Institute of Standards and Technology (NIST) guidelines. Shontel Brown, D-Ohio, cosponsors the bill.
Two New Federal Memos Embrace Emerging Tech and Efficiency in AI
In the first week of his administration, President Trump issued the “Removing Barriers to American Leadership in Artificial Intelligence” executive order (EO).
Fast Flux
On April 3, 2025, the Cybersecurity Infrastructure Security Agency released a joint cybersecurity advisory alongside the National Security Agency, Federal Bureau of Investigations, Australian Signals Directorate’s Australian Cyber Security Centre, Canadian Centre for Cyber Security and New Zealand National Cyber Security Centre on a cyberattack technique known as “fast flux.” In a cyberattack using fast flux, cyber attackers rapidly change Domain Name System (DNS) records to obscure the locations of malicious servers and create resilient command and control (C2) infrastructure, thereb