{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram

Army Research Lab's autonomy stack boosts self-driving tech

Army Research Lab claims it is making great progress with self-driving tech development since it began using its own new “autonomy stack” to speed up development. By owning its autonomy tech stack — all the layers of technology that support applications and development — rather than depending on a contractor for it, ARL now has more control over its Scalable, Adaptive and Resilient Autonomy (SARA) program to improve how robots drive themselves, researchers told FedScoop. Jackson Barnett has more.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

GAO gives 3 priority recommendations to White House on science and tech issues

The Government Accountability Office provided its first-ever priority recommendation letter to White House’s Office of Science and Technology Policy urging the office to work with agencies to establish common outcomes, joint strategies, and roles and responsibilities; address needs using their resources; and develop a way to monitor, evaluate and report results. Dave Nyczepir has more from the letter.

Google to provide Air Force’s maintenance office a cloud ‘ecosystem’

Through a deal worth an undisclosed amount, Google Cloud will build a cloud ecosystem of backend technology to support the Air Force's maintenance office, the company announced. More from Jackson.


WATCH: Deputy Commissioner Dave Zvenyach on data strategies at TTS

Zvenyach says the Technology Transformation Services is leveraging data to support key network and security decisions as it looks to expand its distributed environment. He says that data will be key to creating a better end-user experience. Watch Zvenyach’s full interview here.


Cyber defense strategies that focus on protecting people

Cybercriminals are increasingly evolving tactics that narrowly target an organization's most significant security risk — its own people. Deborah Watson, resident CISO at Proofpoint says that while an agency’s ecosystem of security tools monitor network activity, cloud environments and endpoint devices, it may be missing its most outstanding security and compliance risk — its people. Read more from Watson.

Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}