Fight for the Future announced July 18 that it has launched an interactive map which tracks “where in the U.S. facial recognition technology is being used and where it is being resisted, and a tool-kit for local activists who want to help kickstart a ban in their city or state.” […]

workforce database

The General Services Administration (GSA) and the National Archives and Records Administration (NARA) have teamed up to establish an Electronic Records Management (ERM) market research tool that will allow agencies to more easily identify vendor services to meet their needs.






[…]

The Department of Homeland Security (DHS) issued a request for information (RFI) on July 16 for Information Assurance Compliance System (IACS) tools that can support FISMA (Federal Information Security Modernization Act) compliance checks and reporting.






[…]

election security polling place

Despite a lot of press in recent months about threats that China-based communications equipment maker Huawei may pose to the developing global 5G communications ecosystem because of the company’s close ties to the Chinese government, the U.S. is continuing to lead the world in 5G technology innovation, panelists at a Center for Strategic and International Studies (CSIS) event said on July 10.






[…]

The U.S. Navy has kicked off its Artificial Intelligence Applications to Autonomous Cybersecurity Challenge (AI ATAC), sponsored by the Naval Information Warfare Systems Command (NAVWAR) and Program Executive Office for Command, Control, Communications, Computers, and Intelligence (PEO C4I).






[…]

The Defense Department’s (DoD) Joint Artificial Intelligence Center (JAIC) is seeking to procure innovative commercial software and services solutions to provide comprehensive data management, end-to-end platform integration, and model/capabilities development for technologies to assist in disaster relief through a new pilot program.






[…]

The Department of Commerce issued a request for information (RFI) for the Commerce CIO, Solutions and Partners (S&P) requirement, that supports the Office of Enterprise Services and Solutions (OESS) whose priority is delivering IT solutions.






[…]

Pentagon DoD Defense Military

The Defense Department’s Joint Artificial Intelligence Center is preparing to call for private sector technology pitches at “Solutions Meetings” that are planned for late summer and early fall in the northern Virginia area.






[…]

Cyber Smoke

MeriTalk announced July 8 that it purchased Cyber Smoke, which hosts bi-monthly gatherings of Federal IT and industry officials that have become “must-attend” exchanges for government and industry in the Washington area. Terms of the purchase from Intelvative were not disclosed.






[…]

Blockchain binary

The Securities and Exchange Commission (SEC) updated a Request for Quote (RFQ) to reflect its intention to procure commercially available off-the-shelf (COTS) data subscription for blockchain ledger data.






[…]

According to security researchers Chase Dardaman and Jason Wheeler, three security flaws in Zipato smart hubs can be used to unlock doors equipped with smart locks if the flaws are chained together.






[…]

Air Force

The U.S. Air Force announced in a press release the award to Accenture Federal Services of a Compute and Store agreement on June 21.






[…]

Internet of Things IoT Data Architecture diagram
cloud computing concept -min

The Computer & Communications Industry Association (CCIA) has promoted Matthew Schruers from vice president of law and policy to chief operating officer.






[…]

cloud computing concept -min

Seven companies – Box, Dropbox, Okta, Slack, Twilio, Workday, and Zendesk – announced the launch of the Enterprise Cloud Coalition (ECC) on June 13.






[…]

News emerged on May 9 that a Russian hacker collective known as Fxmsp claimed to have breached three major U.S.-based antivirus companies. The hackers said they “worked tirelessly” for the first quarter of 2019 to obtain access to the companies’ internal networks, where they extracted sensitive antivirus source code, artificial intelligence models, web security software, and security plug-ins.






[…]

1 2 3 19

Categories