NCI, Inc. has announced today launch of its artificial intelligence (AI) solution Shai, which stands for Scaling Humans with Artificial…
Browsing: Information Technology
ECS has announced the creation of the ECS Cloud Center of Excellence (CCoE). The ECS CCoE was established to ensure the highest…
Growth is central to Mike King’s role at Peraton. As chief growth officer for the national security-technology company, the longtime…
Perfecta has been awarded a General Services Administration Multiple Award Schedule 070 contract, allowing it to sell mission-critical cybersecurity and communications…
Bloomberg Government has launched a predicted-value solution to give clients a competitive edge for evaluating contract opportunities released by the…
Bob Stevens is vice president of public sector at Lookout. In any enterprise vertical, mobility has become the foundation for…
The Defense Department has sworn in its new chief information officer, former JPMorgan Chase executive Dana Deasy. Deasy took his…
Nearing five years as AllCom Global Services CEO, Bob Weatherwax can look back on a significant milestone: Since taking the…
A week from today, GovernmentCIO Media is hosting a breakfast event with health IT leaders from the federal government and industry…
Alpha Omega Integration last week received the Virginia Vanguard Top Service Company Award 2018, ranking second in the Commonwealth of Virginia…
If there’s one philosophy that guides Jason Juranek’s role as CEO of the satellite, fiber and cellular network solutions provider…
John Edgar is chief IT strategist at Salient CRGT and former vice president of IT for the U.S. Postal Service…
MacAulay-Brown, Inc. has announced the promotion of Duane Shugars to senior vice president and general manager of MacB’s Enlighten IT Group, reporting to…
Virsec’s solution to processor-based exploits like Spectre and Meltdown has been named to a list of 20 “Hot New Security…
Raytheon and Virsec Systems have joined forces to protect global government and critical infrastructure customers from advanced cyberattacks, using commercial cybersecurity tools…