Click here to close now.

SYS-CON MEDIA Authors: JP Morgenthal, AppDynamics Blog, John Wetherill, Harry Trott, Roger Strukhoff

News Feed Item

SRA Schedules FY13 Second Quarter Conference Call

SRA International, Inc., a leading provider of technology and strategic consulting services and solutions to government organizations, today announced it will discuss its fiscal year 2013 second quarter operating results in a conference call beginning at 9 a.m. ET on Tuesday, Feb. 19. The company’s quarterly report on Form 10-Q will be filed with the Securities and Exchange Commission prior to the call.

Interested parties may listen to the conference call by dialing 800-779-7680 (U.S.) or 212-547-0205 (other), using passcode 4518270. A replay of the call will be available from approximately 11 a.m. ET on Tuesday, Feb. 19, through Monday, Mar. 4. Interested parties may listen to the replay by dialing 800-839-1170 (toll-free) or 402-998-0559 (toll), using passcode 1798.

About SRA International, Inc.

For more than 30 years, SRA International has been dedicated to solving complex mission and efficiency challenges for the U.S. government. From our headquarters in Fairfax, Va., and from offices and locations around the globe, our approximately 6,000 employees support government clients in civilian, defense, health, intelligence, law enforcement and homeland security agencies by delivering IT solutions and professional services in such areas as information technology lifecycle services; cloud and mobile computing; cyber security; solutions development and integration; and, strategy development and organizational change management. We also provide mission-specific domain expertise in areas such as energy and environmental consulting; intelligence analysis; advanced research; and bioinformatics. Our employees’ deep commitment to offering real value to our clients and serving our communities is rooted in our ethic of Honesty and Service®.

For more information on SRA International, please visit us at www.sra.com.

Any statements in this press release about future expectations, plans, and prospects for SRA, including statements about the estimated value of the contract and work to be performed, and other statements containing the words “estimates,” “believes,” “anticipates,” “plans,” “expects,” “will,” “could,” “intend,” “may,” “potential,” “should,” “would” and similar expressions, constitute forward-looking statements within the meaning of The Private Securities Litigation Reform Act of 1995. You should read statements that contain these words carefully because they discuss our future expectations, contain projections of our future results of operations or of our financial position, or state other forward-looking information. Factors or risks that could cause our actual results to differ materially from the results we anticipate include, but are not limited to: (i) reduced spending levels and changing budget priorities of our largest customer, the United States federal government, which accounts for more than 98% of our revenue; (ii) failure of the customer to fund a contract or exercise options to extend contracts, or our inability to successfully execute awarded contracts; (iii) the failure of congressional leaders to agree upon further budget reductions as required by the debt ceiling compromise triggering automatic across-the-board cuts beginning in 2013 to civil and defense programs; (iv) failure to comply with complex U.S. government procurement-related laws and other regulations, including but not limited to, punitive damage liabilities under the False Claims Act and other laws, and financial incentives under so-called “whistleblower” statutes, awarding the whistleblower with a percentage of the recovery if the claims are successfully waged; (v) possible delays or overturning of our government contract awards due to bid protests by competitors or loss of contract revenue or diminished opportunities based on the existence of organizational conflicts of interest; (vi) failure to comply with laws such as the Foreign Corrupt Practices Act or regulations on government gratuities; (vii) failure to comply with Federal Acquisition Regulations and Cost Accounting Standards or the Fair Labor Standards Act; (viii) security threats, attacks or other disruptions on our information infrastructure, and failure to comply with complex network security and data privacy legal and contractual obligations or to protect sensitive information; (ix) any violation of third party intellectual rights; (x) adverse changes in federal government practices; (xi) delays in the U.S. government adopting appropriations necessary for program funding and future appropriation uncertainties adversely impacting customer spending plans; (xii) intense competition to win U.S. government contracts or recompetes and commoditization of services we offer; (xiii) failure to obtain option awards, task orders or funding under contracts, or inability to successfully execute awarded contracts; (xiv) any adverse results of audits and investigations conducted by the Defense Contract Audit Agency or any of the Inspectors General for various agencies with which we contract, including, without limitation, any determination that our contractor business systems or contractor internal control systems are deficient; and (xv) difficulties accurately estimating contract costs and contract performance requirements; (xvi) challenges in attracting and retaining key personnel or high-quality employees, particularly those with security clearances.

Although we believe that the expectations reflected in the forward-looking statements are reasonable, we cannot guarantee future results, levels of activity, performance or achievements. You should not place undue reliance on these forward-looking statements. In addition, the forward-looking statements included in this press release represent our views as of Feb. 1, 2013. We anticipate that subsequent events and developments will cause our views to change. While we may elect to update these forward-looking statements at some point in the future, we specifically disclaim any obligation to do so. These forward-looking statements should not be relied upon as representing our views as of any date subsequent to Feb. 1, 2013.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Cloud services are the newest tool in the arsenal of IT products in the market today. These cloud services integrate process and tools. In order to use these products effectively, organizations must have a good understanding of themselves and their business requirements. In his session at 15th Cloud Expo, Brian Lewis, Principal Architect at Verizon Cloud, outlined key areas of organizational focus, and how to formalize an actionable plan when migrating applications and internal services to the ...
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
Most companies hope for rapid growth so it's important to invest in scalable core technologies that won't demand a complete overhaul when a business goes through a growth spurt. Cloud technology enables previously difficult-to-scale solutions like phone, network infrastructure or billing systems to automatically scale based on demand. For example, with a virtual PBX service, a single-user cloud phone service can easily transition into an advanced VoIP system that supports hundreds of phones and ...
Containers Expo Blog covers the world of containers, as this lightweight alternative to virtual machines enables developers to work with identical dev environments and stacks. Containers Expo Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Bookmark Containers Expo Blog ▸ Here Follow new article posts on Twitter at @ContainersExpo
The worldwide cellular network will be the backbone of the future IoT, and the telecom industry is clamoring to get on board as more than just a data pipe. In his session at @ThingsExpo, Evan McGee, CTO of Ring Plus, Inc., discussed what service operators can offer that would benefit IoT entrepreneurs, inventors, and consumers. Evan McGee is the CTO of RingPlus, a leading innovative U.S. MVNO and wireless enabler. His focus is on combining web technologies with traditional telecom to create a ...
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize sup...
Over the last few years the healthcare ecosystem has revolved around innovations in Electronic Health Record (HER) based systems. This evolution has helped us achieve much desired interoperability. Now the focus is shifting to other equally important aspects - scalability and performance. While applying cloud computing environments to the EHR systems, a special consideration needs to be given to the cloud enablement of Veterans Health Information Systems and Technology Architecture (VistA), i.e....
SYS-CON Events announced today that MetraTech, now part of Ericsson, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Ericsson is the driving force behind the Networked Society- a world leader in communications infrastructure, software and services. Some 40% of the world’s mobile traffic runs through networks Ericsson has supplied, serving more than 2.5 billion subscribers.
From telemedicine to smart cars, digital homes and industrial monitoring, the explosive growth of IoT has created exciting new business opportunities for real time calls and messaging. In his session at @ThingsExpo, Ivelin Ivanov, CEO and Co-Founder of Telestax, shared some of the new revenue sources that IoT created for Restcomm – the open source telephony platform from Telestax. Ivelin Ivanov is a technology entrepreneur who founded Mobicents, an Open Source VoIP Platform, to help create, de...
The Internet of Things (IoT) promises to evolve the way the world does business; however, understanding how to apply it to your company can be a mystery. Most people struggle with understanding the potential business uses or tend to get caught up in the technology, resulting in solutions that fail to meet even minimum business goals. In his session at @ThingsExpo, Jesse Shiah, CEO / President / Co-Founder of AgilePoint Inc., showed what is needed to leverage the IoT to transform your business. ...
Grow your business with enterprise wearable apps using SAP Platforms and Google Glass. SAP and Google just launched the SAP and Google Glass Challenge, an opportunity for you to innovate and develop the best Enterprise Wearable App using SAP Platforms and Google Glass and gain valuable market exposure. In his session at @ThingsExpo, Brian McPhail, Senior Director of Business Development, ISVs & Digital Commerce at SAP, outlined the timeline of the SAP Google Glass Challenge and the opportunity...
As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. Enterprises must protect their data from (i) system administrators who don't need to see the data in the clear and (ii) adversaries who become system administrators from stolen credentials. In short, enterprises must take control of their data: The best way to do this is by using advanced encryption, centralized key management and...
What are the benefits of using an enterprise-grade orchestration platform? In their session at 15th Cloud Expo, Nate Gordon, Director of Technology at Appcore, and Kedar Poduri, Senior Director of Product Management at Citrix Systems, took a closer look at the architectural design factors needed to support diverse workloads and how to run these workloads efficiently as a service provider. They also discussed how to deploy private cloud environments in 15 minutes or less.
In his session at DevOps Summit, Andrei Yurkevich, CTO at Altoros, provided an overview of all the benefits and opportunities, as well as drawbacks of deploying Cloud Foundry PaaS with Juju and compared it to BOSH. Discover the features that overlap, and understand what Juju Charm is, what it is not, where you use one or the other or where you use both BOSH and Juju Charms together. Andrei Yurkevich is Cloud Foundry protagonist and CTO at Altoros. Under his supervision, the Altoros engineering ...
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water,...