Wes Bush: R&D to Take Sequestration Hit

budget stock photoRepresentatives from government contracting companies and the academic sector have urged lawmakers to act on automatic U.S. budget cuts to head off potential effects on the workforce and the economy, Reuters reported Monday.

Andrea Shalal-Esa writes the renewed call follows warnings from the military top brass that the sequester could erode U.S. readiness and impact homeland security in the long run.

Wes Bush, Northrop Grumman CEO and chairman of the Aerospace Industries Association, told reporters that research and development is among the areas feeling the greatest effects from sequestration.

U.S. R&D spending has remained constant over the last decade, in contrast to accelerated R&D funding in China, South Korea and other countries, according to Reuters.

“Other countries are seizing the moment, they are seizing this opportunity,” Bush said at a news conference held after more than 100 industry executives signed an AIA-initiated letter addressed to Congress and President Obama stating their concerns.

“This is a global competition and if we stay on this track, we’re going to lose,” he added.

Check Also

John Cooney

Former ITA Official John Cooney to Lead SkyWater’s Government Engagements

John Cooney, a former official at the Department of Commerce's International Trade Administration, has joined semiconductor foundry services provider SkyWater Technology as director of U.S. government relations.

Ellen Lord

DoD Launches Pilot Programs for Software Procurement; Ellen Lord Quoted

The Department of Defense (DoD) has made continued efforts to transform software procurement across the military,  FedScoop reported Thursday. Ellen Lord, undersecretary of defense for acquisition and sustainment and four-time Wash100 Award recipient, has developed pilot programs to test the acquisition.

Analyst1

Analyst1 to Help DoD’s Innovation Org Develop Cyber Threat Intell Platform

Analyst1 has been selected help the Defense Innovation Unit transform cybersecurity operations through the development of an enterprise-grade technology that will work to automatically process threat intelligence data.