GSA names leading edge technologies

The 10 technologies that will drive public-sector IT

The General Services Administration has whittled down its list of leading-edge technologies for the Alliant 2 governmentwide acquisition contract. The initial list issued in December 2014 was consolidated and refined after extensive discussions with industry and released in a request for information on July 14.

These 10 technologies define what GSA believes will be central agencies' IT service needs in the coming years:

  1. Artificial intelligence describes the intelligence exhibited by computers or software to perceive the environment and take actions that maximize success.

  2. Autonomic computing controls the functioning of applications and systems without input from the user.

  3. Big data management ensures that voluminous amounts of structured, semi-structured and unstructured data can be mined for information.

  4. Biometrics technologies measure and analyze human body characteristics often for authentication.

  5. Cloud computing, which includes infrastructure-as-a-service, platform-as-a-service and software-as-a-service.

  6. Cybersecurity technologies that protect networks, computers, programs and data from attack, damage or unauthorized access.

  7. Health information technology covering the storage, retrieval, sharing and use of health care information.

  8. The Internet of Things describes a scenario in which objects with unique identifiers transmit data over a network.

  9. Mobile IT refers to IT services delivery to employees working on mobile devices.

  10. Virtual networking technology facilitates the control of one or more remotely located computers or servers over the Internet.

Comments, suggestions or questions concerning the definitions of the revised leading-edge technologies should be sent via [email protected] no later than July 28, 2015.

About the Author

Connect with the GCN staff on Twitter @GCNtech.


  • automated processes (Nikolay Klimenko/

    How the Army’s DORA bot cuts manual work for contracting professionals

    Thanks to robotic process automation, the time it takes Army contracting professionals to determine whether prospective vendors should receive a contract has been cut from an hour to just five minutes.

  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

Stay Connected