Defense DOD’s ‘Virtual Soldier’ (VIDEO) By David Stegon June 3, 2012 http://www.youtube.com/watch?v=c8xHLSF-hvE&feature=player_embedded A new video from the Department of Defense shows off the “Virtual Soldier” program that uses computer simulations to design future combat systems for the war fighter. Share Facebook LinkedIn Twitter Copy Link Advertisement Advertisement More Like This MPEs gain momentum for sharing information with allied partners By Scoop News Group State Department officials say they’re trying to set the tone globally on AI usage, as lawmakers question if it’s enough By Caroline Nihill MongoDB Atlas database for government, powered by AWS, offers agencies advanced agility to manage deluge of data By Scoop News Group Advertisement Top Stories Nuclear Regulatory Commission has IT recs to address amid Trump ‘reform’ of the agency By Matt Bracken IRS data error likely affected millions of Education Department forms By Matt Bracken Trump nominates former Transportation CIO Ryan Cote to lead IT at VA By Billy Mitchell Trump White House issues internal federal guidance on AI reporting By Madison Alder Rebecca Heilweil VA systems lack accessibility standards needed by disabled veterans, IG says By Billy Mitchell Implementing zero trust: a blueprint for cyber resilience in the age of AI By Dan Coleman GSA’s newly expanded acquisition data reporting program is riddled with ‘shortcomings,’ watchdog says By Billy Mitchell Scammers have a new tactic: impersonating DOGE By Rebecca Heilweil Tim Starks Advertisement
State Department officials say they’re trying to set the tone globally on AI usage, as lawmakers question if it’s enough By Caroline Nihill
MongoDB Atlas database for government, powered by AWS, offers agencies advanced agility to manage deluge of data By Scoop News Group
Nuclear Regulatory Commission has IT recs to address amid Trump ‘reform’ of the agency By Matt Bracken
GSA’s newly expanded acquisition data reporting program is riddled with ‘shortcomings,’ watchdog says By Billy Mitchell
Pentagon CISO Essye Miller’s top cyber priorities, challenges and more "Unauthorized access, disclosure, destruction of IT and data could be as destructive as any kinetic attack," Miller says in her FedScoop Q&A.