The GSA Polaris Performance Areas and Emerging Technologies Defined With ExamplesApr 20, 2021
Don't forget to register for our webinar series on how to become a prime on the Polaris GWAC IDIQ. [Register HERE!]
No need to sift through the draft RFP, use this post to see if you're company or team has the projects needed to win a seat on GSA Polaris.
The Polaris Governmentwide Acquisition Contract (GWAC) is currently planned to be a set of three Multiple Award, Indefinite-Delivery, Indefinite-Quantity (IDIQ) contracts to provide customized Information Technology (IT) services and IT services-based solutions. Bidders must produce proof of experience in IT-related "performance areas" and "emerging technologies".
Similar to OASIS and other GSA GWACs, the "proof" comes in the form of a "project" on a contract over 1 Million in value.
If you'd like to learn more about what makes a "project" Download Trident's Project Evaluation Form to learn the details of what makes a project work for GSA Polaris.
The draft RFP has 88 pages of information but none of it matters if you don't have the core past performance "projects" necessary to be a credible bidder.
Instead of searching through the draft RFP (Found on sam.gov here), print this handy list of GSA Polaris performance areas and emerging technologies and download LINK: Trident's Project Evaluation Form, and start gathering information on all your applicable projects.
Better yet, you can hire us to do that work for you to set you up for a winning bid. Learn more about this service here.
Let's start with the GSA Polaris Performance Areas:
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Examples of Cloud services include, but are not limited to:
● Application Integration
● Cloud Backup Solutions
● Cloud Governance, Security and Compliance
● Cloud Migration
● Cloud Strategy and Planning
● Cloud Storage and Hosting
● Cloud Risk Management
● Infrastructure as a Service (IaaS)
● Platform as a Service (PaaS)
● Software as a Service (SaaS)
Cybersecurity is the body of technologies, processes and practices designed to identify, detect, protect, respond to and recover from attack, damage or unauthorized access to networks, devices, programs and data.
Examples of Cybersecurity services include, but are not limited to:
● Continuous Diagnostics and Mitigation
● Continuous Security Monitoring
● Identity Management and Access Management
● Information Assurance
● Intrusion Detection
● IT Disaster Recovery
● IT Security Incident Response
● Mobile Threat Protection
● Network Security Monitoring
● Security Assessment Services/Vulnerability Analysis Services
● Threat HuntingDraft RFP – Polaris GWAC
● Zero Trust Architecture
Information and Communications Technologies
Information and Communications Technology refers to the technology used to manage telecommunications, broadcast media, intelligent building management systems, audiovisual processing and transmission systems, and network-based control and monitoring functions.
Examples of Information and Communications Technology services include, but are not limited to:
● Collaboration Technology
● IPv6 Implementation and Support
● Network as a Service (NaaS)
● Software-Defined Wide Area Networking Implementation (SD/WAN)
● Telepresence and Video
● Virtual Private Network (VPN) and other Remote Network Access
● Voice over IP (VoIP)
● Wireless Services
● 5G services and applications
● Mobility as a Service
● Mobile Backend as a Service
IT Operations and Maintenance
IT Operations and Maintenance include the operation and management of technology infrastructure.
Examples of IT Operations and Maintenance services include, but are not limited to:
● Bring Your Own Device (BYOD) Support Services Draft RFP – Polaris GWAC
● Data Center Management
● Email and File Server Management
● IT Helpdesk / IT Support
● IT Training
● Mobile Device Management
● PC Provisioning
● Server and Device Management
Software Development is the process of developing software through successive phases in an orderly way. This process includes not only the actual writing of code but also the preparation of requirements and objectives, the design of what is to be coded, and confirmation that what is developed has met objectives. All software development methodologies, including Agile and DevSecOps, are supported.
Examples of Software Development services include, but are not limited to:
● Mobile Application Development Services
● Software Design
● Software Maintenance
● Software Programming
● Software Testing
● Web Development
System Design includes the planning and designing of computer systems that integrate computer hardware, software, and communication technologies. The hardware and software components of the system may be provided as part of a customized IT solution. These establishments often install the system and train and support users of the system.
Examples of Systems Design services include, but are not limited to:
● Computer Systems Integration Design Consulting
● Configuration Management
● Information Management Computer Systems Integration Design
● IT Specifications Development
● Network Infrastructure Design
● Office Automation Computer Systems Integration Design
● Smart Buildings Systems Integration
ANCILLARY SUPPORT: SERVICES, SUPPLIES, AND CONSTRUCTION
The Contractor may provide ancillary support as necessary to offer an IT services-based solution. The ancillary support described here may only be included in a task order when it is integral to and necessary for the IT services-based effort.
Ancillary support may include, but is not limited to:
● Clerical support
● Data entry
● IT products
● Minor construction, alteration, and repair to real property
● Server racks
● Software licenses
As referenced in C.3, contractors are encouraged to propose innovative solutions when responding to Task Order requests. This includes utilization of the emerging technologies referenced below, which can be provided as standalone concepts or applied to the performance areas addressed in C.4. Technologies that are currently developing, or developed in the future, are considered in scope.
Examples of Emerging Technology services include, but are not limited to the following:
Advanced and Quantum Computing
Advanced and quantum computing refers to technical capabilities that support compute and data-intensive modeling and simulation. This includes the use of quantum mechanics and information theory to enable faster speeds, better precision, and optimum functionality.
Examples of Advanced and Quantum Computing services include, but are not limited to:
● Secure communications
● Design of high-performance computers, computer clusters, and networks
● Quantum Machine Learning
Artificial Intelligence (AI)
AI, also known as machine intelligence, is a branch of computer science that aims to imbue software with the ability to analyze its environment using either predetermined rules and search algorithms, or pattern recognizing machine learning models, and then make decisions based on those analyses.
Examples of Artificial Intelligence services include, but are not limited to:
● Computer Vision
● Deep Learning
● Machine Learning
● Natural Language Processing (NLP)
● Spatial Computing
● Speech RecognitionDraft RFP – Polaris GWAC
Automation is the creation and application of technologies to produce and deliver goods and services with minimal human intervention. The implementation of automation technologies, techniques and processes improve the efficiency, reliability, and/or speed of many tasks that were previously performed by humans.
Examples of Automation Technology services include, but are not limited to:
● Robotic Process Automation (RPA)
● Automated Messaging Services
● Data Cleaning Scripts
● Interactive Voice Response (IVR)
● Smart Notification
Distributed Ledger Technology
Distributed Ledger Technology (DLT) is a type of ledger that is shared, replicated, and synchronized in a distributed and decentralized manner. DLT can be used to decentralize and automate processes in a large number of sectors. The attributes of a distributed ledger technology allow for large numbers of entities or nodes, whether collaborators or competitors, to come to a consensus on information and immutably store it.
Examples of DLT services include, but are not limited to:
● Blockchain Implementation Solutions
● DLT Network Design Services
● Smart Contract Programming Services
Edge Computing brings computation and data storage closer to the devices where it’s being gathered, rather than relying on a central location that can be thousands of miles away. This is done so that data, especially real-time data, does not suffer latency issues that can affect an application’s performance. Processing is done locally, reducing the amount of data that needs to be processed in a centralized or cloud-based location.
Examples of Edge Computing services include, but are not limited to:
● 5G Implementation Services
● Edge Analytics
● Edge Application Services
● Edge Computing Architecture Design Services
● Internet of Things (IoT) Services
Immersive technology refers to technology that attempts to emulate a physical world through the means of a digital or simulated world by creating a surrounding sensory feeling, thereby creating a sense of immersion.
Examples of Immersive Technology services include, but are not limited to:
● Virtual Reality
● Augmented Reality