Reps. Will Hurd, R-Texas, Robin Kelly, D-Ill., and Jerry McNerney, D-Calif., said they believe the federal government will play a key role in pushing the development of artificial intelligence by ensuring access to
MoreArmy Research Laboratory has invested $8M in the University of Illinois Chicago for research that would explore recharging technologies for unmanned air vehicles. The cooperative agreement, issued in August, would support the
MoreThe U.S. Air Force wrapped up a $243 million modernization project that sought to augment energy efficiency and resiliency at Tinker AF Base in Oklahoma. "The ISO 50001 Energy Management System certification
MoreThe Department of Homeland Security (DHS) has launched a software security tool that works to monitor, detect and eliminate attacks to internet of things devices without modifying source codes.
MoreThe Department of Energy has agreed to invest $3 million in research and development of tools and methods that support energy and maritime cybersecurity. DOE said Monday its Office of Cybersecurity, Energy
MoreThe U.S. Navy is fielding an MQ-8C Fire Scout unmanned helicopter to support squadron operations ahead of its deployment with a littoral combat ship (LCS) next year. The Navy's Helicopter Sea Combat
MoreNASA has licensed a search-and-rescue technology built by Concentric Real Time to transmit location data. The receiver works with a new high-resolution signal to enhance the accuracy of location results, NASA said
MoreLt. Gen. John Thompson, commander of the U.S. Space Force’s Space and Missile Systems Center (SMC), said the service is modifying its contracts to ensure that companies implement advanced cybersecurity measures in
MoreRed Hat has launched its enterprise customer advocacy program, Red Hat Accelerators, to advance the company’s customer-focused approach to its open source and enterprise product portfolio. "I’ve found that substantial innovation comes
More by Sarah Sybert
The Department of Homeland Security (DHS) has released a final rule exempting parts of the Insider Threat Program System of Records from several provisions of the Privacy Act. Under the final rule,
More by Jane Edwards