Congressional Research Service Reports - 443 Matching Results

Search Results

Access to Broadband Networks

Description: The purpose of this report is to provide a more concrete discussion of access to wireline broadband networks. To that end, this report provides a discussion of what broadband networks look like; how both consumers and independent applications providers gain access to these networks; and the parameters available to network providers (such as their choices about network architecture, overall bandwidth capacity, bandwidth reserved for their own use, traffic prioritization, the terms and rates for access to their networks and for their retail services) that can affect end users’ and independent applications providers’ access to those networks.
Date: June 29, 2006
Creator: Goldfarb, Charles B.
Partner: UNT Libraries Government Documents Department

The Advanced Technology Program

Description: The Advanced Technology Program (ATP) was created by P.L. 100-418, the Omnibus Trade and Competitiveness Act of 1988, to encourage public-private cooperation in the development of pre-competitive technologies with broad application across industries. This activity has been targeted for elimination as a means to cut federal spending. Since FY2000, the original House-passed appropriation bills have not included funding for ATP. Many of the Administration’s budget requests have proposed termination of the program. However, ATP continues to be supported, although at levels below that achieved in FY1995 when the activity was expanded significantly. This report discusses funding (or lack thereof) appropriated for the ATP for FY2006.
Date: July 6, 2005
Creator: Schacht, Wendy H.
Partner: UNT Libraries Government Documents Department

Cybercrime: The Council of Europe Convention

Description: Forty-three countries, including the United States, have signed the Council of Europe’s Convention on Cybercrime of November 2001. The U.S. Senate ratified the Convention on August 3, 2006. The Convention seeks to better combat cybercrime by harmonizing national laws, improving investigative abilities, and boosting international cooperation. Supporters argue that the Convention will enhance deterrence, while critics counter it will have little effect without participation by countries in which cybercriminals operate freely. Others warn it will endanger privacy and civil liberties.
Date: September 28, 2006
Creator: Archick, Kristin
Partner: UNT Libraries Government Documents Department

Cybercrime: The Council of Europe Convention

Description: Forty-three countries, including the United States, have signed the Council of Europe’s Convention on Cybercrime of November 2001. The U.S. Senate ratified the Convention on August 3, 2006. The Convention seeks to better combat cybercrime by harmonizing national laws, improving investigative abilities, and boosting international cooperation. Supporters argue that the Convention will enhance deterrence, while critics counter it will have little effect without participation by countries in which cybercriminals operate freely. Others warn it will endanger privacy and civil liberties.
Date: April 26, 2002
Creator: Archick, Kristin
Partner: UNT Libraries Government Documents Department

Critical Infrastructure: Control Systems and the Terrorist Threat

Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Date: October 1, 2002
Creator: Shea, Dana A
Partner: UNT Libraries Government Documents Department

Critical Infrastructure: Control Systems and the Terrorist Threat

Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Date: February 21, 2003
Creator: Shea, Dana A
Partner: UNT Libraries Government Documents Department

Critical Infrastructure: Control Systems and the Terrorist Threat

Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Date: April 23, 2003
Creator: Shea, Dana A
Partner: UNT Libraries Government Documents Department

Critical Infrastructure: Control Systems and the Terrorist Threat

Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Date: July 14, 2003
Creator: Shea, Dana A
Partner: UNT Libraries Government Documents Department

Constitutionality of Requiring Sexually Explicit Material on the Internet to be Under a Separate Domain Name

Description: It is unclear whether making a “.xxx” domain mandatory would violate the First Amendment. Some propose making use of a “.xxx” domain voluntary, but others propose that Congress make it mandatory. The latter proposal raises the question whether a mandatory separate domain would violate the First Amendment, and this report focuses on that question.
Date: January 3, 2006
Creator: Cohen, Henry
Partner: UNT Libraries Government Documents Department

Managing Electronic Waste: Issues with Exporting E-Waste

Description: This report looks at issues specifically related to export for recycling of electronic waste (e-waste). Particularly, it discusses documented impacts to human health and the environment that have been tied to unsafe recycling practices in developing countries, as well as issues that have motivated certain stakeholders to divert e-waste from landfill disposal and, hence, increase recycling.
Date: October 7, 2009
Creator: Luther, Linda
Partner: UNT Libraries Government Documents Department

Spectrum Policy in the Age of Broadband: Issues for Congress

Description: The convergence of wireless telecommunications technology and Internet protocols is fostering new generations of mobile technologies. This transformation has created new demands for advanced communications infrastructure and radio frequency spectrum capacity that can support high-speed, content-rich uses. This report considers the possibility of modifying spectrum policy: (1) to support national goals for broadband deployment by placing more emphasis on attracting new providers of wireless broadband services; and (2) to accommodate the wireless broadband needs of industries that are considered by many to be the economic drivers of the future, not only communications, but also areas such as energy, health care, transportation, and education.
Date: July 13, 2009
Creator: Moore, Linda K.
Partner: UNT Libraries Government Documents Department

The U.S. Science and Technology Workforce

Description: In the 21st century, global competition and rapid advances in science and technology will challenge the scientific and technical proficiency of the U.S. workforce. This report provides an overview of the status of the U.S. science and technology (S&T) workforce, and identifies some of the issues and options that are currently being discussed in Congress.
Date: June 30, 2009
Creator: Stine, Deborah D. & Matthews, Christine M.
Partner: UNT Libraries Government Documents Department