NASA has split an existing mission directorate into two separate ones focusing on exploration systems and space operations, respectively. The space agency said Tuesday its current Human Exploration and Operations Mission Directorate
MoreThe Cybersecurity and Infrastructure Security Agency (CISA) has announced the publication of two new resources to help mitigate threats facing the information and communications technology supply chain. The ICT SCRM Task Force
MoreThe Argonne Collaborative Center for Energy Storage Science has released a white paper detailing the research and development needed for the commercialization of electric aviation batteries. The white paper explores research areas
MoreAn engines project of the Naval Air Warfare Center aircraft division will gain access to the Department of Defense’s supercomputers, which will aid in conducting simulation tests of naval aviation engines before
MoreFrank Kendall, secretary of the Air Force and a three-time Wash100 winner, said he believes the service should improve its engineering capacity and strengthen its analysis capability to make informed decisions on
MoreLaura Stanton, assistant commissioner for the office of information technology category at the General Services Administration’s (GSA) Federal Acquisition Service (FAS), said GSA plans to introduce a cloud marketplace that could be
MoreSunnyvale, California-based security company Illumio has secured a contract from the Air Force Research Laboratory to help the service branch implement a tool to gain visibility into digital assets and prevent threats
MoreThe first F-5N aircraft has been delivered to Naval Air Station Patuxent River in Maryland to kick off flight and ground tests of the redesigned F-5 tactical fighter jet as part of
MoreThe Government Accountability Office (GAO) has found that the Department of Defense (DOD) fielded the MHS GENESIS electronic health record system in six of the 24 planned deployment sites and those actual
MoreProfessor Binoy Ravindran leads a U.S. Navy-supported team of students studying how to address cyber vulnerabilities in ways that do not interfere with a system's functions. The team from Virginia Tech is
More