Verified Document

Computer Contracting Opportunities For A Computer Component Essay

Computer Contracting Contracting Opportunities for a Computer Component Manufacturer: Trends in Federal Spending

The pace of technological development is now faster than it ever has been at any other time in human history, and this pace has been steadily increasing for several decades. The emergence of the computer in the first half of the twentieth century could not have foretold the power and mobility that these devices would provide a few short generations later, nor the opportunities that continuing advancement and technological growth would supply to businesses. For Vigilant Technology, a manufacturer of computer components, the opportunities are virtually endless. Selecting the most profitable route forward can be made more difficult by the abundance of choices, yet an examination of the current contracts being offered by the federal government can help indicate the large-scale trends needed for long-term profits, not to mention providing immediate short-term gains in terms of the contracts themselves. The following pages will detail to area where new product lines are recommended based on researching current contracts offered by the Department of Commerce and the Department of Education.

PIV Hardware

One of the major developments that has come along with the growth of computing technology as the primary means for data storage and transmission is an enormous shift in security concerns. Many of these problems are dealt with using software, but some issues require hardware solutions. Components developed for specific security purposes could prove an increasing area of business.

The Department of Education has one very...

There is also likely to be a high private and corporate demand for such technologies, which can be embedded in both stationary and portable computer devices as a means of ensuring data security even if a device is stolen, lost, etc. The abundance of government contracts that exist in this area point to the increasing capabilities of technology in this regard, as well as its rising affordability; manufacturing the next wave of components that accomplishes Personal Identity Verification needs in a secure and reliable manner could help launch Vigilant Technology very quickly forward, to much larger profits and an increasing market share as it becomes a more familiar brand.
Components developed specifically for technology-related Personal Identity Verification projects could also be adapted for a variety of other uses, such as in home security systems that also depend on verifying individual identity, and in a number of other situations where identity is a necessary security feature. The greater the risks of information becoming compromised, the greater the need for such components of an ever-refining and effective nature will become. If Vigilant Technology can position itself as a leader in the manufacture of such components in the current market, future potential for the development and profitability of a Personal Identity Verification product line could be enormous.

Image…

Sources used in this document:
Reference fbo.gov. (2011). Accessed 23 April 2011.

https://www.fbo.gov/?s=main&mode=list&tab=list
Cite this Document:
Copy Bibliography Citation

Related Documents

Framework for Awarding Audit Contracts by US Government Departments...
Words: 15848 Length: 58 Document Type: Term Paper

awarding audit contracts by U.S. government departments and agencies Audit Management Red Rationale for and Objectives of the project main and secondary Desktop or literature search Rationale for Search Methodology LITERATURE/DESKTOP RESEARCH Authoritative sources Desktop Findings Justification for audits Evolving role of auditors Types of audit contracts Understanding the Audit Process Best practices and benchmarking Terminology Case Studies Audit management is a fundamental element in government accountability, control and performance management. Certainly there is justification within the Federal government to conduct audits of contracts for the

Computer: What Is Going to
Words: 4223 Length: 10 Document Type: Term Paper

In the same year, the founders started a new company for computer development called the Eckert-Mauchly Computer Corporation. By 1949, this company launched the BINAC or Binary Automatic computer. This computer made use of magnetic tape for the storage of data. Then this company was bought by Remington Rand Corporation and the name was changed to Univac Division of Remington Rand. This company was the organization to bring out

Computer Training Program to Enhance
Words: 6445 Length: 25 Document Type: Term Paper

Similar to the suggestions offered by Gahala (2001), Brody (1995) identified several traits to be considered when developing a comprehensive professional development program. Among those traits include the reputation of the trainer, the rewards available to the participants, both tangible and intangible, and the support of the administration. Traditional staff development models have required everyone to participate at the same time and in the same location creating problems such

Opportunities to Help Young Learners
Words: 3322 Length: 12 Document Type: Essay

An orthographic definition is one which is formalistic in the sense of being bound to the form of a word in a particular medium. It is not sensitive to distinctions of meaning or grammatical function. To this extent it is not complete" (1998, p. 4). Therefore, in an effort to help complete the definition, a reference to Webster's advises that a word is simply "something that is said" (1999,

Project Management for Computer Upgrade
Words: 1987 Length: 8 Document Type: Term Paper

IT Project Management PROJECT CHARTER Objective of this project is to upgrade the new computer system for the ACME Incorporation. The company has decided to launch the 200 desktop computers to enhance organization efficiencies. The company will also take the advantage of the new system to integrated effective security systems, which will include: Account lockout policy (SANS CSC 16-9), Password policy (SANS CSC 16-8), and Screen Lock Policy (SANS CSC 16-6). Integrated of effective security

Federal Contracting Give a Brief
Words: 1689 Length: 5 Document Type: Research Paper

Specialized labor is needed to produce a specialized product for the military. As such the cost of attracting and utilizing such talent can be very expensive to IBM. IBM's indirect costs would consist of three aspects pertaining mainly to time, fraud and unexpected occurrences. The first indirect cost of time creates large expenses with IBM. The larger each individual employee takes to complete his task, the more expensive the services

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now