in ,

Cubic to Develop Interactive Training for Army; Bill Rebarick Comments

Cubic to Develop Interactive Training for Army; Bill Rebarick Comments - top government contractors - best government contracting event
https://executivebiz-media.s3.amazonaws.com/2022/08/19/30/9f/c3/a0/b7/6f/d4/64/Executive-Biz.png

Cubic logoCubic Corp. has received a multiyear $4.25 million task order to help the U.S. Army develop instructional strategies and game-based learning tools for military personnel.

The company will work with the Army’s Maneuver Center of Excellence at Fort Benning, Georgia to integrate military doctrine into interactive training materials, Cubic said Thursday.

“Numerous studies have shown the use of simulated immersive environments increase learner engagement,” Bill Rebarick, general manager of Cubic’s advanced learning solutions business.

Rebarick added the company plans to employ modern technologies to create a real-time strategic training for future soldiers and military leaders.

The contract will develop Army courseware in support of the branch’s Doctrine 2015 program.

Sign Up Now! ExecutiveBiz provides you with Daily Updates and News Briefings about Industry News

mm

Written by Mary-Louise Hoffman

is a writer of news summaries about executive-level business activity in the government contracting sector. Her reports for ExecutiveBiz are focused on trends and events that drive the GovCon industry to include commercial technologies that private companies are developing for federal government use. She contributes news content to ExecutiveBiz’s sister sites GovCon Wire and ExecutiveGov.

FireEye CEO David DeWalt: Info Security Leaders Should Eye Threat Intell for Cyber Defense - top government contractors - best government contracting event
FireEye CEO David DeWalt: Info Security Leaders Should Eye Threat Intell for Cyber Defense
Kevin Winter: Booz Allen Exec Team Keys on IT Security in Threat Landscape - top government contractors - best government contracting event
Kevin Winter: Booz Allen Exec Team Keys on IT Security in Threat Landscape