The Advanced Research Projects Agency-Energy has earmarked $15M to support 23 projects that aim to apply artificial intelligence and machine learning tools in the design of energy systems.
MoreA Department of Energy laboratory has awarded cost-sharing subcontracts to eight companies as part of an initiative to build and certify wind power generation systems.
MoreGrant Schneider, federal chief information security officer, said the Federal Acquisition Supply Chain Council will prioritize the development of guidance in 2020 to help agencies address security threats to the supply chain, Nextgov reported
MoreThe House on Tuesday voted 231-192 to pass a continuing resolution to fund government operations through Dec. 20 in order to prevent a government shutdown, Defense News reported Wednesday.
MoreThe Federal Aviation Administration has been working to digitize its notice bulletins that contain logistical data of airports, FCW reported Monday. Abigail Smith, the agency's director of technical training, said these Notice to Airmen or
MoreThe Center for Innovation Technology and George Mason University have partnered to help the Department of Homeland Security study smart building technologies under a four-year, $19M contract. The effort aims to support public safety and aid first
MoreThe Department of Homeland Security has awarded $397,292 to SecureKey Technologies and Factom to conduct phase one research and development activities focused on mitigating cases of fraud.
MoreGen. John Raymond, commander of the U.S. Space Command, said the new command plans to establish a “campaign plan for space” and focus on deploying intelligence capabilities, Space News reported Monday.
MoreAdm. Charles Richard of the U.S. Navy has assumed leadership of U.S. Strategic Command at a ceremony that took place Monday. Richard, USSTRATCOM's former deputy commander, succeeds Gen. John Hyten, who will go on to
MoreLt. Gen. Eric Smith, commander of the Marine Corps Combat Development Command, said the U.S. should focus on discovering ways of using offensive cyber capabilities to exploit weaknesses in authoritarian regimes, Fifth
More