Story by Spc. Kathia Del Rio | 143d Sustainment Command (Expeditionary) | 09.29.2020
The U.S. Army Reserve will activate its first-ever field feeding company Oct. 16, 2020, in Wilson, N.C. The activation of the 375th Field Feeding Company (FFC), signifies yet another push of moving culinary specialists (92G) from dining facilities to battlefield environments....
Story by Robert Timmons | Fort Jackson Public Affairs Office | 08.05.2020
At one point in every Soldier’s career they will move from job to job as they progress – they normally don’t do it in a single day. For Command Sgt. Maj. Anthony Wilson, he took off his garrison sergeant major’s hat the morning of July 31, only to put on one for the Soldier Support Institute later that day....
Story by Petty Officer 1st Class Ryan Litzenberger | Commander, Submarine Group Seven | 02.06.2020
A Tefe, Amazon, Brazil native and Commander, Submarine Group 7’s (CSG 7) Sailor of the year is currently serving in Yokosuka, Japan. Yeoman 1st Class Silvia Raya joined the Navy in 2005. Yeoman perform administrative and clerical work. They receive visitors, answer telephone calls and sort incoming mail. They type, organize files and operate modern office equipment such as word processing......
Courtesy Story | Fort Sill Public Affairs | 05.01.2018
This is the Fires Conference issue: Fires in support of large-scale combat operations.
Story by Terrance Bell | U.S. Army Fort Lee | 11.22.2017
FORT LEE, Va. (Nov. 22, 2017) -- Fort Lee is no longer an obstacle course desert.
Story by Staff Sgt. Alexx Pons | Air Force Personnel Center | 09.26.2017
The Air Force Association awards committee announced the final recipients of the 2017 National Aerospace and Specialty Awards....
Story by Staff Sgt. Alexander Riedel | United States Air Forces Central | 08.17.2017
Secretary of the Air Force Heather Wilson visited the 438th Air Expeditionary Wing in Kabul, Afghanistan, Aug. 17.
Story by Jaimi Chafin | Air Force Reserve Command | 06.06.2017
Ransomware attacks effect computers by encrypting all of the information on the devices, and the hackers demand a ransom, usually paid in the form of bitcoins, in return for the decryption key. Generally if a payment isn’t made, the hackers leave them permanently encrypted with no way to pay the ransom to unlock the encrypted files....