recommended reading

Details of redesign contract revealed

After a public outpouring of questions and concerns about the potential $18 million price tag of a contract to redesign, the board overseeing the official stimulus-tracking site's overhaul late Friday revealed some details on the agreement.

The Recovery Accountability and Transparency Board, which maintains, posted for the first time a June 15 request for proposals and an update stating that Hollywood, Md.-based Web services company Smartronix "won the contract over two other bidders, according to the General Services Administration, which made the award."

The notice on adds that Smartronix is teaming with three subcontractors: Washington-based Synteractive Corp.; TMP Government of McLean, Va., and New York-based KPMG.

Transparency activists and project management specialists criticized GSA for announcing on Wednesday it had awarded Smartronix a contract to redesign the site, without providing more information about the deal. The announcement stated the project would cost $9.5 million through January 2010 and up to $18 million if all options were exercised until January 2014. It did not describe what the money would cover, or how many other vendors competed for the award.

Board spokesman Ed Pound last week had said it was not the board's job to publish the contract and the number of bids; it is GSA's responsibility to deal with the disclosure of contract information, he added. GSA spokesman Robert Lesino on Friday afternoon said, "procurement sensitivity and acquisition regulation" restrict the agency from divulging details, including the names of bidders and copies of proposals.

Now, some details of the contract requirements are listed on According to this new information, Smartronix and its subcontractors must:

-- Develop the next generation of, which will be visually pleasing, user friendly and highly interactive.

-- Create a mapping capacity that will allow users to search for spending down to the neighborhood level.

-- Provide the capacity to store and easily download massive amounts of data.

-- Build a state-of-the-art security platform that will protect the integrity and availability of the data and a back-up system in the event of a major catastrophe such as a terrorist attack or large-scale power outage.

-- Provide contract support to perform an array of hosting, maintenance and operational services.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.