Congressional Research Service Reports - 784 Matching Results

Search Results

Technology Transfer: Use of Federally Funded Research and Development

Description: The government spends approximately one third of the $83 billion federal R&D budget for intramural research and development to meet mission requirements in over 700 government laboratories. Congress has established a system to facilitate the transfer of technology to the private sector and to state and local governments. Despite this, use of federal R&D results has remained restrained, although there has been a significant increase in private sector interest and activities over the past several years. At issue is whether incentives for technology transfer remain necessary, if additional legislative initiatives are needed to encourage increased technology transfer, or if the responsibility to use the available resources now rests with the private sector.
Date: May 30, 2006
Creator: Schacht, Wendy H.
Partner: UNT Libraries Government Documents Department

The Obama Administration's Proposal to Establish a National Network for Manufacturing Innovation

Description: This report discusses the proposed creation of the National Network for Manufacturing Innovation (NNMI), which would help accelerate innovation and support manufacturing technology commercialization. The report includes an overview of the topic as well as discussion on the Administration's proposal, preliminary activities, legislative status, and issues for consideration.
Date: January 29, 2014
Creator: Sargent, John F., Jr.
Partner: UNT Libraries Government Documents Department

Spectrum Policy in the Age of Broadband: Issues for Congress

Description: This report discusses some of the commercial and federal radio frequency spectrum policy changes required by the Middle Class Tax Relief and Job Creation Act of 2012. It also summarizes new policy directions for spectrum management under consideration in the 112th Congress, such as the encouragement of new technologies that use spectrum more efficiently.
Date: January 7, 2011
Creator: Moore, Linda K.
Partner: UNT Libraries Government Documents Department

The National Broadband Plan

Description: This report discusses the Federal Communications Commission's (FCC) National Broadband Plan (NBP), which mandated by the American Recovery and Reinvestment Act of 2009 (ARRA) is a 360-page document composed of 17 chapters containing 208 specific recommendations directed to the FCC, to the Executive Branch (both to individual agencies and to Administration as a whole), to Congress, and to nonfederal and nongovernmental entities. The ARRA specified that the NBP should "seek to ensure that all people of the United States have access to broadband capability."
Date: July 9, 2010
Creator: Kruger, Lennard G.; Gilroy, Angele A.; Goldfarb, Charles B.; Moore, Linda K. & Ruane, Kathleen Ann
Partner: UNT Libraries Government Documents Department

Internet Domain Names: Background and Policy Issues

Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information on the Internet. The report includes background on the DNS and the Internet Corporation for Assigned Names and Numbers (ICANN) that manages the services, as well as related issues for the 113th Congress.
Date: November 26, 2014
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department

Organized Crime: An Evolving Challenge for U.S. Law Enforcement

Description: This report provides an analysis of how organized crime has capitalized on globalization by using borders as opportunities, relying on fast-paced technological change, and adapting its organizational structures. It illustrates how these transformations can impact U.S. persons, businesses, and interests. The report includes a discussion of how U.S. law enforcement conceptualizes organized crime in the 21st century and concludes by examining potential issues for Congress, including the extent to which organized crime is a national security threat (partly to be tackled by U.S. law enforcement agencies), congressional oversight regarding the federal coordination of organized crime investigations, and the utility of current resources appropriated to combat organized crime.
Date: December 23, 2010
Creator: Bjelopera, Jerome P. & Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Date: October 14, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Advanced Vehicle Technologies: Energy, Environment, and Development Issues

Description: This report discusses four major vehicle technologies — electric vehicles, hybrid electric vehicles, plug-in hybrids, and fuel cell vehicles — as well as advanced component technologies. Each technology is discussed in terms of cost, fueling and maintenance infrastructure, and performance.
Date: December 6, 2007
Creator: Yacobucci, Brent D.
Partner: UNT Libraries Government Documents Department

State Taxation of Internet Transactions

Description: This report intends to clarify significant issues in the remote sales tax collection debate, beginning with a description of state and local sales and use taxes. Congress has a role in this issue because interstate commerce, in most cases, falls under the Commerce Clause of the Constitution.
Date: April 19, 2013
Creator: Maguire, Steven
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: March 8, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: March 20, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: May 22, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: January 17, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: April 17, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: May 24, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Date: January 9, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Date: January 23, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

The EU-U.S. Safe Harbor Agreement on Personal Data Privacy: In Brief

Description: This report discusses a recent judgement by the Court of Justice of the European Union (CJEU) that invalidates the Safe Harbor Agreement between the United States and the 28-member European Union (EU). Safe Harbor is a 15-year-old accord, under which personal data could legally be transferred between EU member countries and the United States.
Date: October 29, 2015
Creator: Weiss, Martin A.
Partner: UNT Libraries Government Documents Department

Broadband Internet Regulation and Access: Background and Issues

Description: This report discusses broadband Internet, examining what it is and the various technologies that allow for its transmission. Broadband or high-speed Internet access is provided by technologies that give users the ability to send and receive data at volumes and speeds far greater than access over traditional telephone lines; it also provides a continuous, "always on" connection (no need to dial-up) and a "twoway" capability, that is, the ability to both receive (download) and transmit (upload) data at high speeds.
Date: June 14, 2006
Creator: Gilroy, Angele A. & Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department