{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram

Hicks says Pentagon has different employment strategy for hypersonics than China, Russia

Pentagon leaders are “laser-focused” on developing new capabilities like hypersonic weapons, but they also plan to employ the systems differently than competitors like China or Russia, Deputy Defense Secretary Kathleen Hicks told reporters Thursday. Brandi Vincent has the story.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

TSA re-competing 3 agile team contracts worth $470M

The Transportation Security Administration is re-competing three contracts worth an estimated $470 million for agile teams to customize and integrate software and applications for various offices. Dave Nyczepir has the details.

Army looking at ‘payload agnostic’ EW capabilities as it modernizes its architecture

As the Army looks to rebuild its electronic warfare arsenal, it is developing a battlefield architecture taking a largely agnostic approach to platforms and payloads to maximize warfighter effectiveness in various theaters against a variety of threats. Mark Pomerleau has the story.

Army looking at several dismounted electronic warfare concepts

While the Army still works through a specific requirement for a dismounted electronic warfare jammer program of record, a Stryker-based system that will first be delivered next year will provided limited dismounted capability for soldiers, according to service officials. Mark Pomerleau has this also.

The Pentagon may require vendors certify their software is free of known flaws. Experts are split.

Should the Pentagon require that vendors only sell the military software that’s free of known vulnerabilities or defects that could cause security problems? On the surface, it seems like a reasonable request. Suzanne Smalley has the story for CyberScoop.

Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}