Sarkis Tatigian, 94, just marked his 75th anniversary as a Navy employee, but says he has no immediate plans to retire.
U.S. Cyber Command’s elevation to a unified combatant command is “mostly symbolic,” but the symbolism is important.
The Navy is developing a new framework that will determine how it administers its technology development process. The goal, the chief of Naval research tells Federal News Radio, is to “impedance match” each stage of the acquisition system with the pace of technology.
The Navy is testing a new evaluation system that it says will be more objective, deliver greater fidelity in measuring sailors’ performance. The end goal is to use the scores to help inform servicemembers’ compensation packages.
In this week’s edition of On DoD, Peter Kim, the Air Force’s chief technology officer, Alex Rice, the CTO at HackerOne, and Reina Staley, the chief of staff of the Defense Digital Service join is to talk about the latest of DoD’s bug bounties: Hack the Air Force. We’ll also talk about changes in how the Army buys cloud computing services as part of a broader effort to shut down expensive, government-owned data centers.
A new report from the Center for a New American Security finds females make up an increasing percentage of the national security workforce, but less so in leadership positions.
The Navy is in the midst of a revamp of its Innovation Cell, the project it launched two years ago with the objective of speeding new technology through the acquisition process in under a year while living completely within the government’s existing acquisition policies.
In part two of a special report: Defense Acquisition at a Crossroads, Federal News Radio examines the challenges the Defense Department will face as it implements numerous Congressional acquisition reforms, many of which it didn’t ask for.
The Pentagon’s internal improvement plan, known as Better Buying Power, coincided with several consecutive years of declines in the rate of cost growth for the Pentagon’s major weapons systems, from more than 9 percent in 2011 to 3.5 percent in 2015, the lowest level since 1985.
In November, when Army officials decided to launch the service’s first-ever bug bounty, one of the key questions they wanted to answer was whether sensitive personnel records were vulnerable to theft by hackers via the…