Welcome!

@CloudExpo Authors: Liz McMillan, William Schmarzo, Pat Romanski, Mamoon Yunus, Kevin Benedict

News Feed Item

SRA Schedules FY13 Second Quarter Conference Call

SRA International, Inc., a leading provider of technology and strategic consulting services and solutions to government organizations, today announced it will discuss its fiscal year 2013 second quarter operating results in a conference call beginning at 9 a.m. ET on Tuesday, Feb. 19. The company’s quarterly report on Form 10-Q will be filed with the Securities and Exchange Commission prior to the call.

Interested parties may listen to the conference call by dialing 800-779-7680 (U.S.) or 212-547-0205 (other), using passcode 4518270. A replay of the call will be available from approximately 11 a.m. ET on Tuesday, Feb. 19, through Monday, Mar. 4. Interested parties may listen to the replay by dialing 800-839-1170 (toll-free) or 402-998-0559 (toll), using passcode 1798.

About SRA International, Inc.

For more than 30 years, SRA International has been dedicated to solving complex mission and efficiency challenges for the U.S. government. From our headquarters in Fairfax, Va., and from offices and locations around the globe, our approximately 6,000 employees support government clients in civilian, defense, health, intelligence, law enforcement and homeland security agencies by delivering IT solutions and professional services in such areas as information technology lifecycle services; cloud and mobile computing; cyber security; solutions development and integration; and, strategy development and organizational change management. We also provide mission-specific domain expertise in areas such as energy and environmental consulting; intelligence analysis; advanced research; and bioinformatics. Our employees’ deep commitment to offering real value to our clients and serving our communities is rooted in our ethic of Honesty and Service®.

For more information on SRA International, please visit us at www.sra.com.

Any statements in this press release about future expectations, plans, and prospects for SRA, including statements about the estimated value of the contract and work to be performed, and other statements containing the words “estimates,” “believes,” “anticipates,” “plans,” “expects,” “will,” “could,” “intend,” “may,” “potential,” “should,” “would” and similar expressions, constitute forward-looking statements within the meaning of The Private Securities Litigation Reform Act of 1995. You should read statements that contain these words carefully because they discuss our future expectations, contain projections of our future results of operations or of our financial position, or state other forward-looking information. Factors or risks that could cause our actual results to differ materially from the results we anticipate include, but are not limited to: (i) reduced spending levels and changing budget priorities of our largest customer, the United States federal government, which accounts for more than 98% of our revenue; (ii) failure of the customer to fund a contract or exercise options to extend contracts, or our inability to successfully execute awarded contracts; (iii) the failure of congressional leaders to agree upon further budget reductions as required by the debt ceiling compromise triggering automatic across-the-board cuts beginning in 2013 to civil and defense programs; (iv) failure to comply with complex U.S. government procurement-related laws and other regulations, including but not limited to, punitive damage liabilities under the False Claims Act and other laws, and financial incentives under so-called “whistleblower” statutes, awarding the whistleblower with a percentage of the recovery if the claims are successfully waged; (v) possible delays or overturning of our government contract awards due to bid protests by competitors or loss of contract revenue or diminished opportunities based on the existence of organizational conflicts of interest; (vi) failure to comply with laws such as the Foreign Corrupt Practices Act or regulations on government gratuities; (vii) failure to comply with Federal Acquisition Regulations and Cost Accounting Standards or the Fair Labor Standards Act; (viii) security threats, attacks or other disruptions on our information infrastructure, and failure to comply with complex network security and data privacy legal and contractual obligations or to protect sensitive information; (ix) any violation of third party intellectual rights; (x) adverse changes in federal government practices; (xi) delays in the U.S. government adopting appropriations necessary for program funding and future appropriation uncertainties adversely impacting customer spending plans; (xii) intense competition to win U.S. government contracts or recompetes and commoditization of services we offer; (xiii) failure to obtain option awards, task orders or funding under contracts, or inability to successfully execute awarded contracts; (xiv) any adverse results of audits and investigations conducted by the Defense Contract Audit Agency or any of the Inspectors General for various agencies with which we contract, including, without limitation, any determination that our contractor business systems or contractor internal control systems are deficient; and (xv) difficulties accurately estimating contract costs and contract performance requirements; (xvi) challenges in attracting and retaining key personnel or high-quality employees, particularly those with security clearances.

Although we believe that the expectations reflected in the forward-looking statements are reasonable, we cannot guarantee future results, levels of activity, performance or achievements. You should not place undue reliance on these forward-looking statements. In addition, the forward-looking statements included in this press release represent our views as of Feb. 1, 2013. We anticipate that subsequent events and developments will cause our views to change. While we may elect to update these forward-looking statements at some point in the future, we specifically disclaim any obligation to do so. These forward-looking statements should not be relied upon as representing our views as of any date subsequent to Feb. 1, 2013.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
DevOps at Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to w...
"With Digital Experience Monitoring what used to be a simple visit to a web page has exploded into app on phones, data from social media feeds, competitive benchmarking - these are all components that are only available because of some type of digital asset," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Secure Channels, a cybersecurity firm, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Secure Channels, Inc. offers several products and solutions to its many clients, helping them protect critical data from being compromised and access to computer networks from the unauthorized. The company develops comprehensive data encryption security strategie...
The question before companies today is not whether to become intelligent, it’s a question of how and how fast. The key is to adopt and deploy an intelligent application strategy while simultaneously preparing to scale that intelligence. In her session at 21st Cloud Expo, Sangeeta Chakraborty, Chief Customer Officer at Ayasdi, will provide a tactical framework to become a truly intelligent enterprise, including how to identify the right applications for AI, how to build a Center of Excellence to...
Recently, WebRTC has a lot of eyes from market. The use cases of WebRTC are expanding - video chat, online education, online health care etc. Not only for human-to-human communication, but also IoT use cases such as machine to human use cases can be seen recently. One of the typical use-case is remote camera monitoring. With WebRTC, people can have interoperability and flexibility for deploying monitoring service. However, the benefit of WebRTC for IoT is not only its convenience and interopera...
Vulnerability management is vital for large companies that need to secure containers across thousands of hosts, but many struggle to understand how exposed they are when they discover a new high security vulnerability. In his session at 21st Cloud Expo, John Morello, CTO of Twistlock, will address this pressing concern by introducing the concept of the “Vulnerability Risk Tree API,” which brings all the data together in a simple REST endpoint, allowing companies to easily grasp the severity of t...
Deep learning has been very successful in social sciences and specially areas where there is a lot of data. Trading is another field that can be viewed as social science with a lot of data. With the advent of Deep Learning and Big Data technologies for efficient computation, we are finally able to use the same methods in investment management as we would in face recognition or in making chat-bots. In his session at 20th Cloud Expo, Gaurav Chakravorty, co-founder and Head of Strategy Development ...
The goal of Continuous Testing is to shift testing left to find defects earlier and release software faster. This can be achieved by integrating a set of open source functional and performance testing tools in the early stages of your software delivery lifecycle. There is one process that binds all application delivery stages together into one well-orchestrated machine: Continuous Testing. Continuous Testing is the conveyer belt between the Software Factory and production stages. Artifacts are m...
Connecting to major cloud service providers is becoming central to doing business. But your cloud provider’s performance is only as good as your connectivity solution. Massive Networks will place you in the driver's seat by exposing how you can extend your LAN from any location to include any cloud platform through an advanced high-performance connection that is secure and dedicated to your business-critical data. In his session at 21st Cloud Expo, Paul Mako, CEO & CIO of Massive Networks, wil...
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
Cloud adoption is often driven by a desire to increase efficiency, boost agility and save money. All too often, however, the reality involves unpredictable cost spikes and lack of oversight due to resource limitations. In his session at 20th Cloud Expo, Joe Kinsella, CTO and Founder of CloudHealth Technologies, tackled the question: “How do you build a fully optimized cloud?” He will examine: Why TCO is critical to achieving cloud success – and why attendees should be thinking holistically ab...
As businesses adopt functionalities in cloud computing, it’s imperative that IT operations consistently ensure cloud systems work correctly – all of the time, and to their best capabilities. In his session at @BigDataExpo, Bernd Harzog, CEO and founder of OpsDataStore, presented an industry answer to the common question, “Are you running IT operations as efficiently and as cost effectively as you need to?” He then expounded on the industry issues he frequently came up against as an analyst, and ...
Cloud resources, although available in abundance, are inherently volatile. For transactional computing, like ERP and most enterprise software, this is a challenge as transactional integrity and data fidelity is paramount – making it a challenge to create cloud native applications while relying on RDBMS. In his session at 21st Cloud Expo, Claus Jepsen, Chief Architect and Head of Innovation Labs at Unit4, will explore that in order to create distributed and scalable solutions ensuring high availa...
SYS-CON Events announced today that App2Cloud will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. App2Cloud is an online Platform, specializing in migrating legacy applications to any Cloud Providers (AWS, Azure, Google Cloud).
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. Jack Norris reviews best practices to show how companies develop, deploy, and dynamically update these applications and how this data-first...
Intelligent Automation is now one of the key business imperatives for CIOs and CISOs impacting all areas of business today. In his session at 21st Cloud Expo, Brian Boeggeman, VP Alliances & Partnerships at Ayehu, will talk about how business value is created and delivered through intelligent automation to today’s enterprises. The open ecosystem platform approach toward Intelligent Automation that Ayehu delivers to the market is core to enabling the creation of the self-driving enterprise.
"We're here to tell the world about our cloud-scale infrastructure that we have at Juniper combined with the world-class security that we put into the cloud," explained Lisa Guess, VP of Systems Engineering at Juniper Networks, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...