The Pediatric Care Center contracted A&T Systems (A&T) to provide the procurement, installation and ongoing maintenance of the hardware necessary to support the eClinicalWorks applications for Electronic Medical Records (EMR) and Practice Management configured in an .asp environment. Scope of Work includes providing assistance with installation, configuration and ongoing maintenance…
Type: Project Summary
Primary Pediatrics contracted A&T Systems (A&T) to provide the procurement, installation and ongoing maintenance of the hardware necessary to support the eClinicalWorks applications for Electronic Medical Records (EMR) and Practice Management configured in an .asp environment. Scope of Work includes providing assistance with installation, configuration and ongoing maintenance management…
Type: Project Summary
A&T is enabling Children's National Medical Center (CNMC) to partner with community pediatric practitioners and highly rated eClinical Works, to implement an Electronic Medical Record (EMR) initiative. An integrated EMR solution will allow physician practices to immediately access patient records for improved care management, foster electronic communication between them and specialty…
Type: Project Summary
Provided molecular fingerprinting. biodefense, biosurveillance, Laboratory Response Network (LRN), and FMS sequencing
Type: Project Summary
Developed search and retrieval web applications, scientific data management, network and system management, bioinformatics, genome assembly and annotation.
Type: Project Summary
Provide database management, application business management, information security plan, system configuration and integration and development.
Type: Project Summary
Type: Whitepaper
As Congress continues to deliberate on the 2021 National Defense Authorization Act (NDAA), many small business contractors are wondering if the reforms started in 2018 will continue. The FY 2018 and 2019 NDAA both contained positive provisions for small businesses. From making it easier for small businesses to win follow-on contracts, to encouraging prompt payment of small business contractors,…
Type: Article
Rockville, MD - November 19, 2020 -, Today, the NIH Information Technology Acquisition and Assessment Center (NITAAC) announced that all three NITAAC Government-Wide Acquisition Contracts (GWACs) have maintained Best in Class (BIC) status after successful completion of the Office of Management and Budget’s (OMB) Annual Review. The status of a BIC contract is reviewed annually to ensure solution providers continue to meet the five…, About NITAAC:, The NIH Information Technology Acquisition and Assessment Center (NITAAC) is housed within the Department of Health and Human Services (HHS) at the National Institutes of Health (NIH), and is a full-service acquisition program that has been designated a federal Executive Agent, authorized by the Office of Management and Budget (OMB) to administer three Best in Class (BIC) Government-Wide…
Type: Article
Every day the federal government fends off tens of thousands of cyberattacks from adversaries. Some of these attacks are simple – phishing emails aimed at hopefully tricking an unassuming federal employee – to more sophisticated attacks targeting the nation’s most precious data assets. Protecting federal agencies from cyberattack is not an easy job, but an incredibly important one as more and…, Artificial Intelligence (AI) and Machine Learning (ML)., The newest cyber tools use behavior analytics to stop bad actors in their tracks and prevent intellectual property and sensitive data from falling into the wrong hands. These end-to-end analytics work across data environments to identify and stop threats to network traffic, files and devices, leveraging user behavior analytics that get smarter over time. AI and ML can now provide complete…, Intrusion detection and prevention systems., Known as IDS and IPS tools, these can help IT staff identify and protect their wired and wireless networks against several security threat types. These technologies, like other network security tools, have become more popular as government networks have grown in complexity. Both IDS and IPS solutions detect threat activity in the form of malware, spyware, viruses, worms and other attack types, as…, Anti-malware., Anti-malware tools help administrators identify, block and remove malware. Malware’s primary purpose is to look for network vulnerability, especially in security defenses, operating systems, browsers, applications and popular targets such as Adobe Flash, Acrobat and Reader. Best practices call for a multipronged defense that might also include IP blacklisting, data loss prevention tools, anti-…, Mobile device management., Also called MDM, these solutions allow administrators to remotely monitor and control security configurations on mobile devices. This allows employees to work remotely on agency-approved devices, but leadership can know these devices are secure since they can manage them at all times., Network access control., These products enforce security policy by granting only policy-compliant devices access to network assets. They handle authentication and authorization functions and can control the data that specific users access, ensuring that users meet a certain safety standard before they can access any information., Next-generation firewalls, . The technology beyond the traditional firewalls has expanded. Next-generation firewalls provide enhanced network security services, including application visibility and control, along with web security essentials., Authentication and authorization, . Traditional directory-based services authenticate users and grant access based on authorization rules. Newer identity-based security technology uses methods such as digital certificates and public key infrastructure solutions that provide an extra layer of security on top. The NITAAC Difference With technology constantly evolving, Cybersecurity threats become more and more of a concern. Cyber…
Type: Article