Blog
July 8, 2024
Insights from a Decade of CPARS Data at TCG
By Lisa Alferieff, TCG COO
Companies that contract with the Federal government know that positive Contractor Performance Assessment Reporting System (CPARS) ratings are gold and serve as a report card, of sorts, to help the government with future source selection. The government…
August 8, 2016
TCG on Path to Transcendence
Named to WBJ top “Small Technology Companies” for seventh time
For the seventh time, TCG is ranked on the Washington Business Journal’s list of DC’s top “Small Technology Companies,” coming in at number 18.
Over the years we’ve gratefully won…
September 28, 2009
Interior chooses PRISM-Grants
I see today that the Department of the Interior has selected Compusearch’s PRISM-Grants product for their end-to-end grant lifecycle. From the Compusearch press release:
“At the conclusion of a comprehensive analysis of all of the available options, one of which was…
January 25, 2012
TCG Executive Team Wins 2012 SmartCXO Award
TCG’s executive management team has been named one of the best senior leadership teams in Washington, DC, by the 2012 SmartCXO Awards. The awards are sponsored by SmartCEO magazine. Hats off to our team—they truly deserve this recognition! To read…
December 2, 2009
GPC webcast set for 12/10/09 at 2pm EST
As we reported earlier, the Grants Policy Committee webcast is set for December 10th at 2pm. Here’s the latest agenda:
Introduction
American Recovery and Reinvestment Act (ARRA) Reporting Overview, Lessons Learned, and Question and Answer (Q & A)
Government Accountability Office…
May 22, 2024
Trends from the 2024 RSA Security Conference
By Dr. Robert Buccigrossi, TCG CTO
The 2024 RSA Security Conference was a lavish demonstration of marketing dollars at work. With flashy booths and gobs of “swag” (free T‑shirts, charging pads, batteries and toys), it was a challenge to cut through the jargon…
July 18, 2006
Grants.gov to use E‑Authentication
GCN reports on Grants.gov’s plans to expand the number of credential providers servicing their user authentication requirements, thereby aligning with the E‑Authentication initiative. User authentication is different to user validation. The latter is simply an exchange of username and password.…
December 1, 2011
Elegant Code’s Wonderful Blog Series on JavaScript
Up until this point, JavaScript was something I held my nose and used to get dynamic and Ajax interactions working on my websites. jQuery made it more tollerable with its mysterious “$” syntax and its ability to zip through the DOM…
December 18, 2020
Best Practices for ICAM Shared Service Providers
Way back in 1993—a lot of time in internet years—a New Yorker cartoonist created what became one of the most oft-cited memes about cybersecurity. A dog sits at a desktop computer saying to a fellow canine, “On the internet, no one knows you’re…
December 29, 2011
Audio Effects for HTML5 Based Mobile Apps
I’ve been experimenting a bit with HTML5 mobile applications. One of the funny little corners I’ve found is how to reliably use audio effects across platforms. The HTML5 spec includes an <audio> tag. Unfortunately I found it to be a little quirky, especially…