Sole Source Justification Tutorial

Author: John Honovich, Published on Mar 02, 2012

The sole source justification is a very powerful yet controversial way of specifying products. Vendors love them because it eliminates competition and all but guarantees higher profits. Users often want them to simplify complex contracting procedures. However, often these justifications are abused and manipulated. In this note, we dig into sole source justifications sharing a recent practical example betwee BRS Labs and a US city.

What It Is

*********, *********** *** ***** ***** ********* *** *********** ******* ********* to ****** *******. **** ******* ** ***** ********** *** ********* requires ******* *** **** *** ** *** ****** ****, ** any ********* **********. **** ** **** ** ****** **** ********* are *** ********** ** ******* *******, ********, *******, ***.

**** ****** ************** ***** ************* ** ********* *********** ******* *** approved ******** / ********. ** ** **, ***** ************* **** justify ******* * **** ******, ****** **** * ******* ** *******, *** meet *** ************'* *****. **** ****** ************* ************ ************* ** **** ************* ********.

*********, * **** ********** *** **** ** ******* * **** source:

  • ****** ******** - * ******* ** ******* **** ** ***** organization *** ******** ******* (*.*., ******** **** ********)
  • ********* ************* - **** *** ******* *** ** **** **** works **** **** *** ************ ******* *** (*.*., * *** already *********)
  • ****** - *** ******* ** ******* ** ****** **** ******* and ****** **** *** ****** *********** **** ****** (*.*., *******, natural *********, ***.)

*** ************ **** ****** *** *************, ********* **** *** **** of *** ****** ***** *********. ** **** ** *** ****** organization ** ******* ** ******* *** *************, ** ********* ** approved. ****** *** **** ****** ************** ********** ******** ** ********. Indeed, ** ** **** ********* *****, ***** ** ** *********.

Why ******* **** ****

* *********** *********** ******* ** ******* *** *******, **** ** they *** ********* ** ******:

  • ******: * ****** *** ******* *** **** * - * months ** ******, ************* *********** *** ***** ******* *** ****** it **** ********* *** *** *******.
  • ****** ********: **** *** ****** ** *********** *********, ******* **** **** pressure ** ****** ***** *******, *** ********* ***** *******.
  • **** ** ********: ** **** ******* ********* *** **** **** * ***** vendor **** ***** ** *** ***** * **** ********* ** alternative ********.

** ********, ** * ****** *** *** *** ***** ** sole ****** ***** ********, *** ****** ** *********** ********** *** business, *** ****** * ****** ***** *** *** ******* *** business ******.

Buyer **********

***** *********** ******* ** ******** ** ******* ******, ********** ** the ******* **** *** **** ****** ************* ******** ********** ** buyers ** ****:

  • *** **** **** ****: ****** ***** **** * ********* ****** *** **** **** a *********** ******* *** ***** **** ** ** **** ** unknown ******** **** ***** *** ** * ************ *** (****: this ** ************* *** ***** **** ***** ** ****** ****).
  • ****** ****: ******* * *********** *** *** ** ********* *** **** consuming *** *** *****. ** *** ***** '*****' **** **** want, **** ******** *** ********* **** **** *** *******.

Practical ********

******* ********* **** ** ******* ***** ** ********** ** ********* compatitability:

  • **********: **********, ******* ** ******** ************ **** ******** ****** ** sole ****** ******* *** ************* ** ***** ********. ****'* ********* ** *** **** ***** **** ******* *** * $***,*** USD *******. *** ***** **** ********* **** * ****** ******* ** patent ** *** ******* ** *** ***** ** *** *************.
  • ********* *************: ******* ** ***, ****** ******* ******** *** **** **** typcially ***** **** ** *** ********* ** ** *** ***********, often ** ******** **** ********* ** **********. **** ** **** because **** **** **** ********** **** ****** ********* ****** ** the **** ****** ************* ** ***** ******** ** *** ******.

Misuse *** *****?

*** *** **** ** ******** **** ****** **************, ********** **** it ***** ** '******' *********. * **** ******** ** **** aware ** *** ***** ** ******** ***** '******' ********. *** technology *****, ** ** **** ** **** ******** **** **** one ************ ***. ****, **** *** ****** ****** ** ****** as ** **, ****** *** *** ****** ** ******* ** questionable *****. ** * ****** *** *** ** *** **** excited ***** ***** ********* *** ********* ******, ********** **** ******** as '******' ** *** ****.

** ** **** ********* *** *********** *********** *** ******* ***** justifications ** ***** ********* ** *** ******** ** '******'. *********, the ******** ***** ** ******** **** *** ***** ** *** buying ************. *******, **** ** ************** ********** *** ******* **** technological ********* **** *********** ****** ***** *** **** ** ******* niche *******. *** *******, ** *** *** **** ****, ** BRS **** ***** *** **** ******** **** *** **** *** needs ** *** ** **** ***** *******? ************** ***** ******? ***** ******* ** ******* ****** ***** ********* implementations **** *** ***** ******* ** ****? **** *** ** as ****** ******* ** ** **** *** ** ** ************ determine.

**** ****** ************** *** ******** ***** **** **** ** ** carefully ********** ***, **** *********, ******** ** **** ********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Tutorials

Batteries For Alarm Systems Tutorial on Jul 11, 2017
Alarm systems use backup batteries in order to continue working if an intruder attempts to disable the alarm by cutting power to the building. In...
H.265 / HEVC Codec Tutorial 2017 on Jun 30, 2017
For years, video surveillance professionals have talked about the potential for H.265. Now, in 2017, H.265 is starting to gain mainstream...
Selling and Valuing Security Integrators on May 12, 2017
This ia a tutorial in how to (1) determine your security integrator's value and (2) to sell your security integrator. If you own an integrator,...
Duress Codes For Alarms Systems on May 02, 2017
An alarm system can call for help in the event of an attempted break in, but only if it is armed. If an adversary forces an authorized user to...
Burglar Alarm Strobes Guide on Mar 31, 2017
Strobes provide visual notification of alarm incidents, as sirens are used to give audible notification. Using a strobe gives alarm users and alarm...
Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...
Glass Break Sensor Tutorial on Mar 21, 2017
Burglars often break glass windows to get into a house. Using glass break detectors in conjunction with alarm contacts is a good way to protect the...
Alarm Panic Switches Tutorial on Mar 16, 2017
Panic switches allow silently triggering an alarm system when it is otherwise disarmed. In this tutorial we explain and contrast the 7 most common...
Environmental Sensors For Burglar Alarm Tutorials on Mar 15, 2017
Intrusion detection systems can be used to alert users to environmental issues. By connecting sensors that monitor the heat, humidity, and...
Alarm Contacts Tutorial on Mar 07, 2017
Contacts are the devices that tell an alarm panel when an entryway is open or closed. The act of opening or closing an entryway, such as a door or...

Most Recent Industry Reports

Security Robots Are Just Entertainment on Jul 21, 2017
Great entertainment, no real security value.  That is the happy (or sad) state of security robots in 2017. Knightscope robot's drowning, the...
Wireless Burglar Alarm Sensors Guide on Jul 21, 2017
Wireless sensors for burglar alarm sensors are an increasingly common option for the historical labor intensive wired alarm systems. However,...
Competing Against ADT on Jul 20, 2017
ADT is one of the biggest players in the security industry, with ~$4 billion revenue. In 2017, they were acquired / merged with Protection...
Hikvision Launching Deep Learning Recorders on Jul 20, 2017
Hikvision has become a common choice for super low cost NVRs. Now, Hikvision is aiming to move up market, with deep learning NVRs that claim far...
PR Campaign Exploiting Manufacturer Cybersecurity on Jul 20, 2017
Manufacturers increasingly have a bulls-eye on their back. As cyber security solutions providers grow, they realize a great way to get publicity...
Axis Door Station Tested (A8105-E) on Jul 19, 2017
Axis continues their push into niche markets, especially audio, with network speakers, an IP horn, and video door stations. We bought and tested...
Manufacturer Favorability Guide on Jul 19, 2017
This 120 page PDF guide may be downloaded inside by all IPVM members. It includes our 20 manufacturer favorability rankings and 20 manufacturer...
$8 Billion Utility Georgia Power Enters Surveillance Business Offering Avigilon And Genetec on Jul 19, 2017
Utilities are typically considered major customers of surveillance integrators but one utility, Georgia Power, with $8+ billion in annual revenue...
Knightscope Laughs off Robot Drowning on Jul 18, 2017
A day after a Knightscope robot drowned, Knightscope has issued an 'official statement' making fun of the issue: The implied message is that...
Microsoft Video AI Cloud Services Examined on Jul 18, 2017
Microsoft has released one of the most amazing video analytics marketing videos ever. In it, they detect oil spills, track individual people giving...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact