The Department of Defense (DoD) and its U.K. counterpart will host an International Space Pitch Day on November 16 and 17 in a move to promote allied efforts in the space community.
MoreThe National Institute of Standards and Technology (NIST) has selected 15 algorithm submissions for the third phase of a research competition focused on quantum computing-based cryptography.
MorePresident Trump intends to nominate Greg Autry, an assistant professor on clinical entrepreneurship at the University of Southern California (USC), to serve as chief financial officer at NASA. Autry currently leads the Pacific
MoreQTS Realty Trust has published its GRI compliant 2019 Environmental, Social and Governance (ESG) Initiatives Report to provide a comprehensive summary and progress report on QTS' approach to sustainable business practices, the
MoreAmazon Web Services (AWS) has announced the general availability of Contact Lens, a set of capabilities for Amazon Connect enabled by machine learning, that will enable contact centers to understand the sentiment,
MoreCACI International has partnered with RigNet to add new capabilities to CACI’s SteelBox, a secure mobile communications application for government agencies, CACI reported on Thursday.
MoreThe Department of Veterans Affairs (VA) has appointed Todd Simpson as deputy assistant secretary for DevSecOps to enhance cybersecurity within the department’s application development lifecycle, FedScoop reported on Thursday.
MoreThe U.S. Space Force has unveiled its new logo and motto as part of effort to establish its cultural identity and branding. The service adopted the motto “Semper Supra,” which means “always
MoreThe Cybersecurity and Infrastructure Security Agency (CISA) has hired cybersecurity professionals Josh Corman and Rob Arnold to support CISA’s COVID-19 pandemic response efforts. “This changing threat landscape demands an ‘all-hands-on-deck’ approach and for
MoreTechnology executives at military and federal agencies said organizations should come up with security strategies to address vulnerabilities as edge computing becomes more viable driven by advancements in cloud, 5G, internet of
More