Feeds

Computacenter loses GCAT monopoly

Ecommerce for the masses

  • alert
  • submit to reddit

Computacenter loses Govt. GCAT monopoly published on: The government has removed Computacenter's monopoly for supplying products through its GCAT ecommerce procurement system, CW360.com reports.

Computacenter will instead be just one of 26 resellers with supply rights. Colin Brown, Computacenter's government sector director, criticised the move. It would increase pressure on the customers by providing 26 points of entry rather than one. And the change failed to address the government's stated aim to open up the system to SME resellers, he says.

"The 25 new suppliers have only won a ticket to the match, they are not guaranteed any success or any business," Brown told CW360.com. "It will take time for this new framework to bed in and, quite frankly, many of the companies will just be making up the numbers. We are not afraid. Customers will stick with us." ®

Blast from the Past

Computacenter seized control of the GCAT business from Technology, the ICL-owned reseller in 1997. Here's two stories we wrote at the time.

EDS junks Tplc for Computacenter
Computacenter in tin man shock horror

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.