Defense DOD’s ‘Virtual Soldier’ (VIDEO) By David Stegon June 3, 2012 http://www.youtube.com/watch?v=c8xHLSF-hvE&feature=player_embedded A new video from the Department of Defense shows off the “Virtual Soldier” program that uses computer simulations to design future combat systems for the war fighter. Share Facebook LinkedIn Twitter Copy Link Advertisement Advertisement More Like This MPEs gain momentum for sharing information with allied partners By Scoop News Group State Department officials say they’re trying to set the tone globally on AI usage, as lawmakers question if it’s enough By Caroline Nihill MongoDB Atlas database for government, powered by AWS, offers agencies advanced agility to manage deluge of data By Scoop News Group Advertisement Top Stories GSA acting head says nearly half of agency workforce is using GSAi daily By Miranda Nazzaro House bill eyes digitization to fix arcane federal permitting process By Matt Bracken Trump White House launches ‘Schedule G’ for political policy officials By Madison Alder State Department layoffs cut science, tech offices deeper than anticipated By Madison Alder USAID is dead, but some departing staffers’ government phones still work By Rebecca Heilweil The GAO flagged 10 ‘critical’ legacy IT systems. Years later, most haven’t been modernized By Matt Bracken GSA tech services arm violated hiring rules, misused recruitment incentives, watchdog says By Miranda Nazzaro VA acting CIO defends IT workforce reorg amid lawmaker pushback By Miranda Nazzaro Advertisement
State Department officials say they’re trying to set the tone globally on AI usage, as lawmakers question if it’s enough By Caroline Nihill
MongoDB Atlas database for government, powered by AWS, offers agencies advanced agility to manage deluge of data By Scoop News Group
The GAO flagged 10 ‘critical’ legacy IT systems. Years later, most haven’t been modernized By Matt Bracken
GSA tech services arm violated hiring rules, misused recruitment incentives, watchdog says By Miranda Nazzaro
Pentagon CISO Essye Miller’s top cyber priorities, challenges and more "Unauthorized access, disclosure, destruction of IT and data could be as destructive as any kinetic attack," Miller says in her FedScoop Q&A.