Defense DOD’s ‘Virtual Soldier’ (VIDEO) By David Stegon June 3, 2012 http://www.youtube.com/watch?v=c8xHLSF-hvE&feature=player_embedded A new video from the Department of Defense shows off the “Virtual Soldier” program that uses computer simulations to design future combat systems for the war fighter. Share Facebook LinkedIn Twitter Copy Link Advertisement Advertisement More Like This MPEs gain momentum for sharing information with allied partners By Scoop News Group State Department officials say they’re trying to set the tone globally on AI usage, as lawmakers question if it’s enough By Caroline Nihill MITRE releases recommendations to incoming administration on AI governance By Caroline Nihill Advertisement Top Stories Health and Human Services announces tech, data, AI, and cyber reorganization By Madison Alder Harris likely to combine Biden AI policies with Silicon Valley-informed approach By Madison Alder Rebecca Heilweil White House releases long-awaited FedRAMP modernization guidance for agencies, cloud service providers By Caroline Nihill Apple agrees to White House AI commitments, as agencies meet more executive order deadlines By Madison Alder More than 1,300 devices have been reported missing to USAID, document shows By Rebecca Heilweil Tax watchdog says IRS has work to do on Login.gov security controls By Matt Bracken USAID releases digital policy for the next decade By Rebecca Heilweil The software you can’t use at NASA By Rebecca Heilweil Advertisement
State Department officials say they’re trying to set the tone globally on AI usage, as lawmakers question if it’s enough By Caroline Nihill
Harris likely to combine Biden AI policies with Silicon Valley-informed approach By Madison Alder Rebecca Heilweil
White House releases long-awaited FedRAMP modernization guidance for agencies, cloud service providers By Caroline Nihill
Apple agrees to White House AI commitments, as agencies meet more executive order deadlines By Madison Alder
Pentagon CISO Essye Miller’s top cyber priorities, challenges and more "Unauthorized access, disclosure, destruction of IT and data could be as destructive as any kinetic attack," Miller says in her FedScoop Q&A.