Law360 Article PDF

Federal contractors can finally look forward to simplified small-business mentor-protege programs, but also must become keenly aware of wide-ranging changes affecting certain 8(a) business development and Native American-owned programs, new recertification requirements for certain multiple award contracts, or MACs, and small-business joint ventures.


Continue Reading

For several years, we have witnessed the emergence of a statutory and regulatory framework to tighten controls on the export of emerging and critical technology, as well as the review of inward foreign investment into said technology. As was evident in the listing of Huawei and other Chinese technology giants, the United States has demonstrated a willingness to use alternative punitive measures against China. Whether the desired impact of this approach has been achieved is difficult to determine. We have, nevertheless, no reason to believe that the tide will ebb in 2020.

Continue Reading

As the frequency and sophistication of existential threats to national security over the past decade have drastically increased, the United States’ reliance on software to identify threats, rapidly share information, and manage its military resources has increased. Accordingly, the federal government’s ability to timely develop, procure, and deploy software to the field has been—and continues to be—a critical component of national security. Notwithstanding the growing importance of software to national security, the Department of Defense (DoD) software-acquisition process mirrors the lengthy, inflexible process typically reserved for the acquisition of major weapon systems. As a result, the DoD’s software development and acquisition cycles are significantly longer for their commercial counterparts, thus affecting the DoD’s ability to deliver timely solutions to users and rapidly respond to urgent threats.

Continue Reading