Search Results

open access

Industrial Competitiveness and Technological Advancement: Debate Over Government Policy

Description: There is ongoing interest in the pace of U.S. technological advancement due to its influence on U.S. economic growth, productivity, and international competitiveness. Because technology can contribute to economic growth and productivity increases, congressional interest has focused on how to augment private-sector technological development. Congressional action has mandated specific technology development programs and obligations in federal agencies that did not initially support such efforts. … more
Date: May 30, 2006
Creator: Schacht, Wendy H.
Partner: UNT Libraries Government Documents Department
open access

The Federal Role in Technology Development

Description: The federal government has traditionally played a role in fostering technological progress. This has involved both direct federal research and development (R&D) funding and indirect measures that create incentives for increased private sector investments in innovation. However, this mix of initiatives was challenged since the 104th Congress. While support for all on-going efforts continues, some programs have been funded at reduced levels. However, since FY2001, appropriations appear to have re… more
Date: July 30, 2002
Creator: Schacht, Wendy H.
Partner: UNT Libraries Government Documents Department
open access

Technology Transfer: Use of Federally Funded Research and Development

Description: The government spends approximately one third of the $83 billion federal R&D budget for intramural research and development to meet mission requirements in over 700 government laboratories. Congress has established a system to facilitate the transfer of technology to the private sector and to state and local governments. Despite this, use of federal R&D results has remained restrained, although there has been a significant increase in private sector interest and activities over the past several… more
Date: May 30, 2006
Creator: Schacht, Wendy H.
Partner: UNT Libraries Government Documents Department
open access

Information Warfare: Cyberattacks on Sony

Description: This report discusses information warfare, which includes information-related capabilities to influence, disrupt, corrupt, or usurp the decision making of adversaries while protecting our own.
Date: January 30, 2015
Creator: Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress

Description: This report identifies cybersecurity policy issues that have been proposed for priority consideration. The report lists and synopsizes current legislation that has been developed to address various aspects of the cybersecurity problem. It then lists the current status of the legislation and compares legislation with existing executive branch initiatives. Finally, analysis of information contained in executive branch initiatives and congressional legislation is used to further highlight related … more
Date: September 30, 2009
Creator: Theohary, Catherine A. & Rollins, John
Partner: UNT Libraries Government Documents Department
open access

Y2K Challenges and Transportation: Risks and Solutions

Description: Many companies or governmental entities provide or use transportation systems that are heavily dependent on computers, software, and other technologies that do not have Y2K problems, e.g., they are Y2K compliant or ready. Some transportation systems, however, still use technologies with Y2K problems, which if left uncorrected, could pose safety risks or efficiency concerns on or after January 1, 2000. The extent and nature of those impacts are expected to vary among the modes of transportation … more
Date: April 30, 1999
Creator: Rothberg, Paul F. & Moore, J. Glen
Partner: UNT Libraries Government Documents Department
open access

The U.S. Science and Technology Workforce

Description: This report provides an overview of the status of the U.S. science and technology (S&T) workforce, and identifies some of the issues and options that are currently being discussed in Congress.
Date: July 30, 2009
Creator: Stine, Deborah D. & Matthews, Christine M.
Partner: UNT Libraries Government Documents Department
open access

The U.S. Science and Technology Workforce

Description: In the 21st century, global competition and rapid advances in science and technology will challenge the scientific and technical proficiency of the U.S. workforce. This report provides an overview of the status of the U.S. science and technology (S&T) workforce, and identifies some of the issues and options that are currently being discussed in Congress.
Date: June 30, 2009
Creator: Stine, Deborah D. & Matthews, Christine M.
Partner: UNT Libraries Government Documents Department
open access

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing te… more
Date: January 30, 2004
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: May 30, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Grants Information for Constituents

Description: This report provides information key sources of information on government and private grants for state and community projects. Constituents who know their project best , may search for grant information on the internet and in printed reference sources.
Date: December 30, 2003
Creator: Gerli, Merete F.
Partner: UNT Libraries Government Documents Department
open access

Year 2000 Computer Problem: State Government Issues

Description: The federal government sends and receives data from the states in support of many social service programs. Examples of such programs are: Medicare, Medicaid, Welfare, Food Stamps, and Unemployment Insurance. The federal government will not be able to deliver critical social services if data exchanges with state governments are not Y2K- compliant, yet there is no complete picture of their readiness.
Date: September 30, 1999
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress

Description: Programs for implementing network-centric warfare (NCW) in the Navy include the Cooperative Engagement Capability (CEC), the IT-21 program, and FORCEnet. A related program is the Navy-Marine Corps Intranet (NMCI). Congress has expressed concern for some of these programs, particularly NMCI.
Date: May 30, 2006
Creator: O'Rourke, Ronald
Partner: UNT Libraries Government Documents Department
Back to Top of Screen