CONTRACTING - ALL ARTICLES

Results 11-20 of 2796
The current border fence is shown near San Diego in 2012.

Here's What Global Building Companies Say About Designing Trump's Wall

So far, few of the firms that have expressed interest in the border wall project have the resources to pull it off.

A Chinese military officer looks at a Sig Sauer handgun at the IDEX arms expo in Abu Dhabi in 2015.

Chinese Military Officers Crash U.S. Air Force Conference in Florida

The three officers, armed with cameras, took a stroll around an exhibit hall of new weapons and technology.

A specially modified 46th Test Wing NC-130H aircraft equipped with the Advanced Tactical Laser weapon system.

Air Force Wants to Test a Laser on an Attack Plane Within A Year

But the U.S. Special Operations Command still needs money for the test and policymakers need to figure out the rules of engagement.

A concept of Sikorsky's new HH-60U, which it is pitching to replace 1960s-era Air Force Hueys.

Sikorsky Pitches Area 51 Security Helicopters to Guard ICBMs

Company executives say it’s the most efficient way for the Air Force to replace its half-century-old Hueys.

Category Management Continues Efforts to Get Better Deal for Federal Bucks

Category management has saved $2 billion since 2012, but there's more low-hanging fruit to grab.

Sen. Mark Warner, D-Va.

Senator Urges Labor Department, Congress to Do More for On-Demand Workers

Warner warns that studies of the gig economy could fall victim to sequester.

Border Patrol secures border fence line in Arizona in 2011.

Almost 200 Firms Have Bid To Build Trump's Border Wall

More may answer the call when the federal government lists its formal solicitation on March 6.

An F-35A Lightning II from the 388th Fighter Wing, Hill Air Force Base, Utah, sits on the flightline at Nellis AFB, Nev., during Red Flag 17-1, Jan. 24, 2017.

US Air Force to Send F-35 to Fight ISIS … In a Few Years

The plane’s rotation schedule has the JSF making deployments to Europe and the Pacific before heading to the Middle East, a top Air Force general says.

A member of the Iraqi Special Forces shoots his machine gun at an Islamic State militant drone n the al-Barid district in Mosul, Iraq on Dec. 18, 2016.

Air Force Buys Mysterious Israeli Weapon to Kill ISIS Drones

What is this secret weapon? Pentagon officials aren’t saying, but here are some clues.

 An F/A-18F Super Hornet, assigned to the Red Rippers of Strike Fighter Squadron (VFA) 11, lands on the flight deck of the aircraft carrier USS Theodore Roosevelt (CVN 71) in 2015.

Can a ‘Comparable’ Super Hornet Steal Orders from the F-35C?

Two aircraft are on President Trump’s radar. Here’s how they’re different, and why it matters to more than just power players in Washington.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.