Federal information technology leaders said their agencies are using “low code” software development processes to accelerate the development and updates of client-facing applications, FCW reported Thursday.
MoreAttorney General William Barr said China’s superiority in the development of 5G networks poses a threat to the U.S. economy and national security, The New York Times reported Thursday.
MoreThe Department of Defense found $5.7 billion in savings following an internal review of “fourth estate” agencies, Defense News reported Thursday. DoD will redirect the identified funding towards new priorities in support
MoreFour companies will help the Department of Homeland Security's Science and Technology Directorate address cybersecurity challenges related to the fire safety of smart cities. The Smart Cities Internet of Things Innovation Labs effort will
MoreAir Force Global Strike Command tested a Minuteman III intercontinental ballistic missile's flight and reentry to verify the weapon's reliability. The unarmed missile, also known as Flight Test Unit 2, flew with a reentry vehicle from Vandenberg Air
MoreThe U.S. Army is continuing efforts to implement cloud and virtual training capabilities for battlefield missions as part of a pilot project, FCW reported Wednesday.
MoreJose Arrieta, chief information officer of the Department of Health and Human Services, said the department’s efforts to implement blokchain-based technology has helped it streamline acquisition procedures.
MoreThe General Services Administration will move the Federal Procurement Data System’s main reporting functions – administrative, standard, ad hoc and static – to the System for Award Management’s beta website by March
MoreThe House on Wednesday passed a bill that would codify the General Services Administration’s Federal Risk Authorization Modernization Program, Federal Times reported Wednesday.
MoreThe National Institute of Standards and Technology has launched two data confidentiality projects and is calling on industry to “provide products and technical expertise to support and demonstrate security platforms,” Fifth Domain
More