A new Federal CIO Council report provides 10 recommendations on how agencies can improve the hiring process and develop the future information technology workforce. The report titled Future of the Federal IT
MoreArmy Research Laboratory, part of the service's Combat Capabilities Development Command, has introduced a new framework that would help soldiers obtain boosted situational awareness in low-bandwidth environments. A group of ARL scientists has enhanced
MoreThe U.S. Air Force has completed the T-7A Red Hawk aircraft's critical design review at Wright-Patterson AF Base after one year and a half of work and preparations. The CDR put Red Hawk's systems
MoreA team from Dyess Air Force Base teamed up with civilian software developers to build a training facility that houses augmented and virtual reality technology capacities.
MoreBrig. Gen. Robert Collins, the U.S. Army’s program executive officer (PEO) for Command, Control and Communications – Tactical (C3T), has said the service branch’s tactical space intelligence program is a “significant focus
MoreThe Cybersecurity and Infrastructure Security Agency (CISA) has released a fact sheet on telephony denial of service attacks (TDoS) and how stakeholders can prevent these threats from disrupting public safety operations. CISA
MoreSens. Rob Portman, R-Ohio, and Tom Carper, D-Del., have issued a report stating that the Federal Communications Commission (FCC) should conduct more stringent foreign ownership reviews with a specific focus on Chinese
MoreRimini Street has announced that The Iyo Bank has switched to Rimini Street for support of its Oracle Database system to reduce cost and resources, Rimini Street reported on Wednesday.
More by Sarah Sybert
U.S. Cyber Command and the National Guard have developed a program designed to facilitate sharing of data and allow authorities to address a ransomware attack and other cyber threats posed by foreign
More by Jane Edwards
The Cybersecurity and Infrastructure Security Agency (CISA) is working to build up agencies’ trust in the underlying cyber risk data behind the new federal dashboard as part of the Continuous Diagnostics and Mitigation
More by Jane Edwards