Frank Kendall, secretary of the Air Force and a three-time Wash100 winner, said he believes the service should improve its engineering capacity and strengthen its analysis capability to make informed decisions on
MoreLaura Stanton, assistant commissioner for the office of information technology category at the General Services Administration’s (GSA) Federal Acquisition Service (FAS), said GSA plans to introduce a cloud marketplace that could be
MoreSunnyvale, California-based security company Illumio has secured a contract from the Air Force Research Laboratory to help the service branch implement a tool to gain visibility into digital assets and prevent threats
MoreThe first F-5N aircraft has been delivered to Naval Air Station Patuxent River in Maryland to kick off flight and ground tests of the redesigned F-5 tactical fighter jet as part of
MoreThe Government Accountability Office (GAO) has found that the Department of Defense (DOD) fielded the MHS GENESIS electronic health record system in six of the 24 planned deployment sites and those actual
MorePrecise Systems, a Lexington Park, Maryland-based professional services delivery company for U.S. defense agencies, has appointed Angela Rothwell as the company’s new chief financial officer.Rothwell has been with Precise Systems for 10
MoreSenture, a leading national contact center service support company, has named Michael Bryant as the company’s new vice president of business development. Bryant has been with Senture since 2012 and will oversee
MoreNaval Air Systems Command has received its 100th delivery of the AH-1Z Viper attack helicopter, which Is intended for use by the U.S. Marine Corps. AH-1Z is designed to perform armed reconnaissance, close
MoreU.S. Army Europe and Africa has activated the 2nd Multi-Domain Task Force, a group tasked to stop adversary anti-access/area-denial networks in land, air, water, space and other environments. The 2nd MDTF will
MoreProfessor Binoy Ravindran leads a U.S. Navy-supported team of students studying how to address cyber vulnerabilities in ways that do not interfere with a system's functions. The team from Virginia Tech is
More