Feeds

Bigger, longer deals dangled at G-Cloud 2.0 launch

UK.gov buffs incentives in revamped tech bazaar

  • alert
  • submit to reddit

Security for virtualized datacentres

The UK government has launched the second version of G-Cloud, its tech shopping catalogue for the public sector, with reworked conditions to entice suppliers.

Among the changes, the length of some IT contracts up for grabs has been doubled to 24 months under “exceptional” circumstances.

There’d been some concern from civil servants and suppliers that the initial 12-month contract cap would act as disincentive because it wouldn’t be worth the time or investment involved in setting up projects.

As an added incentive, the size of contracts that can be awarded through a G-Cloud framework agreement has gone up £40m to £100m in value.

There have also been changes to improve the terms and conditions, including the removal of the data protection element in the framework “as it did not apply between supplier and GPS [Government Procurement Services]”.

To attract more SMEs, there’s no longer a lengthy pre-qualification questionnaire and there are “less stringent requirements of financial history” among other changes.

G-Cloud emerged in February with the objective of opening up government and public IT contracts to new suppliers large and small, as well as reducing costs and increasing reuse.

That attracted 260 tech suppliers offering around 1,700 services.

The second G-Cloud was due to float at the end of April or first week of May but programme supremo Denise McDonagh warned on 16 May it was now slated to arrive end of May or start of June.

A Cabinet Office spokesperson told The Reg the procurement process on the second version of G-Cloud would take three months.

The government received 562 expressions of interest from suppliers to sign up to G-Cloud version 1.0. Their sign-up cutoff date was 19 December, 2011, and it took until February this year for the suppliers to be approved. The government admitted it had been unprepared for the level of demand the first time around. ®

Security for virtualized datacentres

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Why Oracle CEO Larry Ellison had to go ... Except he hasn't
Silicon Valley's veteran seadog in piratical Putin impression
Big Content Australia just blew a big hole in its credibility
AHEDA's research on average content prices did not expose methodology, so appears less than rigourous
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.