Show Roles
{{model['LoggedInUser'][0].LogoTitle}}
{{model['LoggedInUser'][0].ApplicationTitle}}
version {{model['LoggedInUser'][0].ApplicationVersion}}
DEMO USER
You are logged on as {{model['LoggedInUser'][0].ScreenName | lowercase}} ( {{model['LoggedInUser'][0].Roles}} ) HQ. Manager.
 Change  
{{model['LoggedInUser'][0].ApplicationTitle}} version 2.3.103.150
{{model['LoggedInUser'][0].ApplicationTitle}}  
 You are logged on as {{model['LoggedInUser'][0].ScreenName}}
{{model['AlertMessage']}}
Faster Results
Endrerit id porttitor odio rhoncus. Donec quam nunc, rhoncus id velit eu, auctor suscipit nisi. Nunc iaculis, massa non maximus condimentum, lectus velit pretium sem, non imperdiet arcu quam vitae tellus.
Systematic Approach
Endrerit id porttitor odio rhoncus. Donec quam nunc, rhoncus id velit eu, auctor suscipit nisi. Nunc iaculis, massa non maximus condimentum, lectus velit pretium sem, non imperdiet arcu quam vitae tellus.
Data Quality Faster
Endrerit id porttitor odio rhoncus. Donec quam nunc, rhoncus id velit eu, auctor suscipit nisi. Nunc iaculis, massa non maximus condimentum, lectus velit pretium sem, non imperdiet arcu quam vitae tellus.
Data Visuals
Endrerit id porttitor odio rhoncus. Donec quam nunc, rhoncus id velit eu, auctor suscipit nisi. Nunc iaculis, massa non maximus condimentum, lectus velit pretium sem, non imperdiet arcu quam vitae tellus.
Automobile Use Tracking On-Line System
(AUTOS, version 2.3.103.150)
  This is a secure web application.
Training Window 2

here: {{(model['TipInformationTraining'] | filter:{CategoryID:x.TipCategoryID}).length}}
{{x.Category}}
{{y.TipName}}
No {{x.Category}} Tips

Training

No Training Tips
{{x.TipName}}

Information

No Info Tips
{{x.TipName}}
 {{displayCrumb()}} {{crumb2}}
SIGN-ON
If you have an active account, you may loin by clicking on the "Sign-On" button below. Welcome back!
REGISTER
Don't have an account yet? Not a problem. Sign up by clicking on the "Register" button below.
SUPPORT
We are here to help if you are having difficulties or have questions! Click “Contact Support” below.
PRIVACY NOTICE
By logging in you thereby accept the following terms. Violations to system or network security are prohibited, and can result in criminal and civil liability. Continuous attempts to infiltrate or damage network security and systems may be treated as violations. Examples of system or network security violations are as listed, but not limited to: (1) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of administrators. (3) Unauthorized monitoring of data or traffic on any network or system without express authorization SESA administrators. (4) Interference with service to any user, host or network including, without limitation, mail spam, flooding, deliberate attempts to overload a system and broadcast attacks. (5) Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. You are responsible for Your own communications and their consequences.
SIGN-ON
If you have an active account, you may loin by clicking on the "Sign-On" button below. Welcome back!
REGISTER
Don't have an account yet? Not a problem. Sign up by clicking on the "Register" button below.
SUPPORT
We are here to help if you are having difficulties or have questions! Click “Contact Support” below.
PRIVACY NOTICE
By logging in you thereby accept the following terms. Violations to system or network security are prohibited, and can result in criminal and civil liability. Continuous attempts to infiltrate or damage network security and systems may be treated as violations. Examples of system or network security violations are as listed, but not limited to: (1) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of administrators. (3) Unauthorized monitoring of data or traffic on any network or system without express authorization SESA administrators. (4) Interference with service to any user, host or network including, without limitation, mail spam, flooding, deliberate attempts to overload a system and broadcast attacks. (5) Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. You are responsible for Your own communications and their consequences.
USPS RunFAST Evaluation Tool
SIGN-ON
If you have an active account, you may login by clicking on the "Sign-On" button below. Welcome back!
REGISTER
Don't have an account yet? Not a problem. Sign up by clicking on the "Register" button below.
SUPPORT
We are here to help if you are having difficulties or have questions! Click “Contact Support” below.
PRIVACY NOTICE
By logging in you thereby accept the following terms. Violations to system or network security are prohibited, and can result in criminal and civil liability. Continuous attempts to infiltrate or damage network security and systems may be treated as violations. Examples of system or network security violations are as listed, but not limited to: (1) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of administrators. (3) Unauthorized monitoring of data or traffic on any network or system without express authorization SESA administrators. (4) Interference with service to any user, host or network including, without limitation, mail spam, flooding, deliberate attempts to overload a system and broadcast attacks. (5) Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. You are responsible for Your own communications and their consequences.
Microsoft is ending support for Internet Explorer. Please, use one of the following browsers: Chrome, Edge, Firefox, Safari or other chromium-based browsers.
# Systems: {{model['supportedsystems'].length}}

High Priority

{{x.Name}}

{{x.RunDate | date:'medium'}}

Medium Priority

{{x.Name}}

{{x.RunDate | date:'medium'}}
Welcome to the U.S. Department of Labor, Office of Assistant Secretary for Administration and Management (OASAM), Business Operations Center (BOC), Office of Support Services Internal Operations Management Tracker (BOCOM). Here you'll find information regarding the BOC’s Contract Operations and Financial Management. We are committed to streamlining programs based upon a rigorous analysis of available data and careful examination of all BOC programs. This BOCOM tool has been established to create, update, monitor and maintain all BOC contracts and financial management operations as well as allow management visibility of all programs and financials.
WHAT WOULD YOU LIKE TO DO?

PRIVACY NOTICE
By logging in you thereby accept the following terms. Violations to system or network security are prohibited, and can result in criminal and civil liability. Continuous attempts to infiltrate or damage network security and systems may be treated as violations. Examples of system or network security violations are as listed, but not limited to: (1) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of SESA administrators. (3) Unauthorized monitoring of data or traffic on any network or system without express authorization SESA administrators. (4) Interference with service to any user, host or network including, without limitation, mail spam, flooding, deliberate attempts to overload a system and broadcast attacks. (5) Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. You are responsible for Your own communications and their consequences.
WELCOME to GPC!
GPC is your source for tracking your government purchase card. GPC gives you the power and ease to manage your SMART PAY certifications, transactions, and purchases. GPC is your one-stop management system for both cardholders and AOPCs.
WELCOME to the FPB PARKING System!
Net Digital Solutions is authorized to sell FPB Parking Permits through March 31, 2021.
For questions/comments please contact Bruce Brown at Parking.Mgt.Office@dol.gov or (202) 693-7178.
FPB Parking allows permit holders to pay for his/her permit online! See Permit Pricing below.
Permit Type Cost
Month - Regular $39.60
Month - Temp $39.60
2 Day/Week - Temp $15.84
3 Day/Week - Temp $23.76
4 Day/Week - Temp $31.68
Weekends/Overnight - Temp $20.00
WELCOME to the FPB PARKING System!
FPB Parking allows permit holders to pay for his/her permit online!
WELCOME to the DOL Mail System!
WELCOME to the GSAXcess Digital Solution (GDS)!
GDS was developed to assist DOL agencies with managing the transfer or disposal of agency owned vehicles and accountable assets. GDS will assist agencies by providing additional analytical support to manage your current inventory and any surplus assets reported to GSAXcess for processing. GDS has the capability to utilize multiple datasets to audit and track previously reported agency owned assets. It is PPMO’s goal to develop a tool that is both user friendly and easy to navigate. If you have any questions about gaining access or navigating GDS, please contact PPMO at 202-693-7181 or ZZDOL-OASAM-PersonalProperty@dol.gov.
PRIVACY NOTICE
By logging in you thereby accept the following terms. Violations to system or network security are prohibited, and can result in criminal and civil liability. Continuous attempts to infiltrate or damage network security and systems may be treated as violations. Examples of system or network security violations are as listed, but not limited to: (1) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of {{model['LoggedInUser'][0].ApplicationName}} administrators. (3) Unauthorized monitoring of data or traffic on any network or system without express authorization {{model['LoggedInUser'][0].ApplicationName}} administrators. (4) Interference with service to any user, host or network including, without limitation, mail spam, flooding, deliberate attempts to overload a system and broadcast attacks. (5) Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. You are responsible for Your own communications and their consequences.
WELCOME to Integrated Logistics Management System (ILMS)!

Ø  If you were forwarded this VAM Survey, your account may not be established yet. Please follow the directions below:

Ø  ALL LOCAL POC’s that are new to the system, click on Register.

 

ILMS was developed to assist DOT agencies with managing DOT's fleet of vehicles including GSA Leased, Agency Owned and Commercially Leased. ILMS assists the department by providing additional analytical support to manage current/planned/prior year inventory. ILMS has the capability to utilize multiple datasets to audit and track previously reported vehicles. It is ILMS’s goal to provide a tool that is both user friendly and easy to navigate.

If you have any questions about gaining access or navigating ILMS, please contact Eugene Tumblin at eugene.tumblin@dot.gov.
WELCOME to the Automobile Use Tracking On-Line System (AUTOS)!
AUTOS will be placed in read only mode beginning December 1st to support DOL’s annual FAST submission. Any required changes after this date must be completed by a AUTOS System Administrator. Local vehicle POCs should contact their agency Fleet Managers for support, if any changes are required to support your FY22 FAST Submission.
AUTOS was developed to assist DOL agencies with managing DOL's fleet of vehicles including GSA Leased, Agency Owned and Commercially Leased. AUTOS assists the department by providing additional analytical support to manage current/planned/prior year inventory. AUTOS has the capability to utilize multiple datasets to audit and track previously reported vehicles. It is AUTOS’s goal to provide a tool that is both user friendly and easy to navigate.

To create a new AUTOS account, please contact your Agency Fleet Manager for access.

If you have any questions regarding access or require assistance with navigating AUTOS, please contact AUTOS Customer Support at support@netdigitalsolutions.com.

If you have any questions regarding DOL’s Fleet Management Program or associated vehicle requirements, please email zzPPMO-FleetManagement@dol.gov or the DOL Fleet Manager at rogers.ron@dol.gov.
PRIVACY NOTICE
By logging in you thereby accept the following terms. Violations to system or network security are prohibited, and can result in criminal and civil liability. Continuous attempts to infiltrate or damage network security and systems may be treated as violations. Examples of system or network security violations are as listed, but not limited to: (1) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of {{model['LoggedInUser'][0].ApplicationName}} administrators. (3) Unauthorized monitoring of data or traffic on any network or system without express authorization {{model['LoggedInUser'][0].ApplicationName}} administrators. (4) Interference with service to any user, host or network including, without limitation, mail spam, flooding, deliberate attempts to overload a system and broadcast attacks. (5) Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. You are responsible for Your own communications and their consequences.
WELCOME to the Demo Automobile Use Tracking On-Line System (AUTOS)!
Successfuly uploaded the following files. Do whatever the heck you want with them! :)
AUTOS is a Fleet Management Software System that will give you the required tools to manage and analyze your fleet data.
  • AUTOS is a premier Fleet Management Software System developed by qualified and proven experts in the industry.
  • Utilized and trusted! Developed and deployed into a production environment for Department of Labor (DOL) and Department of Transportation (DOT) for over 9 years!
  • AUTOS assists departments like yours by providing additional analytical support to manage current, planned, and prior year inventories.
  • AUTOS has the capability to utilize multiple datasets to audit and track previously reported vehicles.
  • Autos provides you with intuitive, easy-to-use screens & online training guides to get you going quickly!
LET'S GET STARTED!
To walkthrough AUTOS at your own pace, select register for immediate access. With our online training guides and pop-up tips you will not be alone on your experience!
If you would like a 15-minute virtual demo, please contact us via our Contact Us form or email/phone us directly. We can be reached at support@netdigitalsolutions.com or 877.496.8435 EXT 103, 8am to 5pm EST Mon-Fri.
{{model['Vehicle1'][0].VIN}} {{model['Vehicle1'][0].Make}} {{model['Vehicle1'][0].Model}} Selected!
PRIVACY NOTICE
By logging in you thereby accept the following terms. Violations to system or network security are prohibited, and can result in criminal and civil liability. Continuous attempts to infiltrate or damage network security and systems may be treated as violations. Examples of system or network security violations are as listed, but not limited to: (1) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of {{model['LoggedInUser'][0].ApplicationName}} administrators. (3) Unauthorized monitoring of data or traffic on any network or system without express authorization {{model['LoggedInUser'][0].ApplicationName}} administrators. (4) Interference with service to any user, host or network including, without limitation, mail spam, flooding, deliberate attempts to overload a system and broadcast attacks. (5) Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. You are responsible for Your own communications and their consequences.
TEST !!!!! WELCOME to the GSAXcess Digital Solution (GDS)!
GDS was developed to assist DOL agencies with managing the transfer or disposal of agency owned vehicles and accountable assets. GDS will assist agencies by providing additional analytical support to manage your current inventory and any surplus assets reported to GSAXcess for processing. GDS has the capability to utilize multiple datasets to audit and track previously reported agency owned assets. It is PPMO’s goal to develop a tool that is both user friendly and easy to navigate. If you have any questions about gaining access or navigating GDS, please contact PPMO at 202-693-7181 or Net Digital Solutions at support@netdigitalsolutions.
WELCOME to the Executive SMS
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Praesent metus est, efficitur sit amet finibus eu, maximus interdum risus. Aliquam aliquam sagittis urna eu tempus. Quisque ac turpis id magna pellentesque luctus eu vel velit. Curabitur ultricies tempus cursus. Maecenas rutrum bibendum gravida. Duis eleifend orci ante, non vehicula felis tincidunt eu. Morbi at vehicula risus. Nulla non tempus purus. Nam in consequat ipsum. Suspendisse egestas vulputate mauris, at venenatis elit ornare eget. Sed sagittis arcu id tincidunt semper. Cras at enim quis tellus congue blandit nec vitae augue.

Nteger interdum rutrum lacinia. Aenean venenatis magna eget lectus lacinia, fringilla consectetur ex hendrerit. Duis lacus justo, interdum a dolor quis, rutrum tristique purus. Proin ut sapien nunc. Mauris tempor, mauris eget malesuada pellentesque, lacus enim euismod enim, ultrices condimentum sapien mi nec odio. Curabitur eget neque diam. Sed malesuada id velit ac commodo. Aliquam tristique augue a nisi laoreet, blandit lobortis dui elementum. Phasellus at arcu at neque porttitor ultrices.
WELCOME to Integrated Logistics Management System (ILMS)!
Developed and Powered by Bones version 2.3.103.150  from Net Digital Solutions
{{dialogTitle[0]}}
{{dialogTitle[1]}}
{{model['Tip'].Tip}}