Objective, CSC win state government deals

 

Objective has been appointed to the Queensland Government whole-of-government arrangement for electronic document and records management systems (EDRMS) while outsourcer CSC has collected two deals at West Australian Police.

The ASX-listed Objective said it is one of three vendors appointed to the EDRMS arrangement, which will run for three years.

It is already featured on both the Western and South Australian government preferred supplier panels for EDRMS.

Objective is also an approved supplier on the NSW Government information asset management (IAMS) panel.

Meanwhile, CSC Australia ended a tumultuous week with two IT contract wins at Western Australia Police.

Each has a five-year base period and five one-year options.

The first contract is for SAP applications support services (including upgrade and maintenance work) for the organisation's Resource Management Information System, an enterprise resource planning application (ERP) that manages critical business operations for the Western Australia Police.

The total estimated value of this contract is $15 million.

The second agreement sees CSC appointed as one of two companies competing to provide infrastructure, applications development, systems integration and consultancy services to the Western Australia Police under the Project Services Panel arrangement.

CSC last week made up to 170 positions redundant in Australia, an estimated 10 per cent of its workforce.


Objective, CSC win state government deals
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  2%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 736

Vote