SAN FRANCISCO — Ongoing budget battles pose unique challenges for NASA officials who oversee the space agency’s information technology programs, according to government and industry officials ...
WASHINGTON — Six months after seeking information about instruments it could fly to the moon, NASA has issued a request for information for commercial systems that could transport payloads there. The ...
The National Aeronautics and Space Administration (NASA) has not yet effectively implemented leading practices for information technology (IT) management. Specifically, GAO identified weaknesses in ...
AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of information collection. SUMMARY: The National Aeronautics and Space Administration, as part of its continuing effort to ...
NASA officials have discovered a new asteroid that has a small chance of hitting Earth in December 2032. The near-Earth asteroid has been named 2024 YR4 and is estimated to be 40 to 90 meters wide.
A team of researchers has confirmed stars ring loud and clear in a "key" that will harmonize well with the science goals and ...
A troubling email landed in the inboxes of all NASA employees on Tuesday. The message, sent by the agency’s human resources department, revealed that hackers may have breached NASA servers in recent ...
A GAO study found that an incomplete information security program has left weaknesses in NASA networks and information systems that could leave it open to disruption or penetration. But the space ...
NASA has released a Request For Information for a new engine the agency will use on the Orion European Service Module beginning with EM-6 (Exploration Mission 6). The Request For Information states ...
Is it an urban myth, or is it really true that NASA sent the first men to the moon with less computing power than what sits inside today’s average desktop? The answer largely depends on how you define ...
Get the latest federal technology news delivered to your inbox. The inspector general for NASA notes resource constraints and a lack of awareness about information security policies and procedures by ...