July 8, 2024

Insights from a Decade of CPARS Data at TCG

By Lisa Alferieff, TCG COO Companies that contract with the Federal government know that positive Contractor Performance Assessment Reporting System (CPARS) ratings are gold and serve as a report card, of sorts, to help the government with future source selection. The government…
August 8, 2016

TCG on Path to Transcendence

Named to WBJ top “Small Technology Companies” for seventh time For the seventh time, TCG is ranked on the Washington Business Journal’s list of DC’s top “Small Technology Companies,” coming in at number 18. Over the years we’ve gratefully won…
September 28, 2009

Interior chooses PRISM-Grants

I see today that the Department of the Interior has selected Compusearch’s PRISM-Grants product for their end-to-end grant lifecycle. From the Compusearch press release: “At the conclusion of a comprehensive analysis of all of the available options, one of which was…
January 25, 2012

TCG Executive Team Wins 2012 SmartCXO Award

TCG’s executive management team has been named one of the best senior leadership teams in Washington, DC, by the 2012 SmartCXO Awards. The awards are sponsored by SmartCEO magazine. Hats off to our team—they truly deserve this recognition! To read…
December 2, 2009

GPC webcast set for 12/10/09 at 2pm EST

As we reported earlier, the Grants Policy Committee webcast is set for December 10th at 2pm. Here’s the latest agenda: Introduction American Recovery and Reinvestment Act (ARRA) Reporting Overview, Lessons Learned, and Question and Answer (Q & A)  Government Accountability Office…
May 22, 2024

Trends from the 2024 RSA Security Conference

By Dr. Robert Buccigrossi, TCG CTO The 2024 RSA Security Conference was a lavish demonstration of marketing dollars at work. With flashy booths and gobs of “swag” (free T‑shirts, charging pads, batteries and toys), it was a challenge to cut through the jargon…
July 18, 2006

Grants.gov to use E‑Authentication

GCN reports on Grants.gov’s plans to expand the number of credential providers servicing their user authentication requirements, thereby aligning with the E‑Authentication initiative. User authentication is different to user validation. The latter is simply an exchange of username and password.…
December 1, 2011

Elegant Code’s Wonderful Blog Series on JavaScript

Up until this point, JavaScript was something I held my nose and used to get dynamic and Ajax interactions working on my websites.  jQuery made it more tollerable with its mysterious “$” syntax and its ability to zip through the DOM…
December 18, 2020

Best Practices for ICAM Shared Service Providers

Way back in 1993—a lot of time in internet years—a New Yorker cartoonist created what became one of the most oft-cited memes about cybersecurity. A dog sits at a desktop computer saying to a fellow canine, “On the internet, no one knows you’re…
December 29, 2011

Audio Effects for HTML5 Based Mobile Apps

I’ve been experimenting a bit with HTML5 mobile applications.  One of the funny little corners I’ve found is how to reliably use audio effects across platforms.  The HTML5 spec includes an <audio> tag.  Unfortunately I found it to be a little quirky, especially…