Advances in the miniaturization and networking of microprocessors promise a day when networked computers are embedded throughout the everyday world. However, our current understanding of what such systems would be like is insufficient to bring the promise to reality. Embedded, Everywhere explores the potential of networked systems of embedded computers and the research challenges arising from embedding computation and communications technology into a wide variety of applicationsâ€"from precision agriculture to automotive telematics to defense systems. It describes how these emerging networks operate under unique constraints not present in more traditional distributed systems, such as the Internet. It articulates how these networks will have to be dynamically adaptive and self-configuring, and how new models for approaching programming and computation are necessary. Issues relating to trustworthiness, security, safety, reliability, usability, and privacy are examined in light of the ubiquitous nature of these systems. A comprehensive, systems-oriented research agenda is presented, along with recommendations to major federal funding agencies.
Cyber-physical systems (CPS) are increasingly relied on to provide the functionality and value to products, systems, and infrastructure in sectors including transportation, health care, manufacturing, and electrical power generation and distribution. CPS are smart, networked systems with embedded sensors, computer processors, and actuators that sense and interact with the physical world; support real-time, guaranteed performance; and are often found in critical applications. Cyber-physical systems have the potential to provide much richer functionality, including efficiency, flexibility, autonomy, and reliability, than systems that are loosely coupled, discrete, or manually operated, but also can create vulnerability related to security and reliability. Advances in CPS could yield systems that can communicate and respond faster than humans; enable better control and coordination of large-scale systems, such as the electrical grid or traffic controls; improve the efficiency of systems; and enable advances in many areas of science. As CPS become more pervasive, so too will demand for a workforce with the capacity and capability to design, develop, and maintain them. Building on its research program in CPS, the National Science Foundation (NSF) has begun to explore requirements for education and training. As part of that exploration, NSF asked the National Research Council of the National Academies to study the topic. Two workshops were convened in 2014, on April 30 and October 2-3 in Washington, D.C., to explore the knowledge and skills required for CPS work, education, and training requirements and possible approaches to retooling engineering and computer science programs and curricula to meet these needs. Interim Report on 21st Century Cyber-Physical Systems Education highlights emerging themes and summarizes related discussions from the workshops.
Advances in the miniaturization and networking of microprocessors promise a day when networked computers are embedded throughout the everyday world. However, our current understanding of what such systems would be like is insufficient to bring the promise to reality. Embedded, Everywhere explores the potential of networked systems of embedded computers and the research challenges arising from embedding computation and communications technology into a wide variety of applicationsâ€"from precision agriculture to automotive telematics to defense systems. It describes how these emerging networks operate under unique constraints not present in more traditional distributed systems, such as the Internet. It articulates how these networks will have to be dynamically adaptive and self-configuring, and how new models for approaching programming and computation are necessary. Issues relating to trustworthiness, security, safety, reliability, usability, and privacy are examined in light of the ubiquitous nature of these systems. A comprehensive, systems-oriented research agenda is presented, along with recommendations to major federal funding agencies.
A broad and growing literature describes the deep and multidisciplinary nature of the sustainability challenges faced by the United States and the world. Despite the profound technical challenges involved, sustainability is not, at its root, a technical problem, nor will merely technical solutions be sufficient. Instead, deep economic, political, and cultural adjustments will ultimately be required, along with a major, long-term commitment in each sphere to deploy the requisite technical solutions at scale. Nevertheless, technological advances and enablers have a clear role in supporting such change, and information technology (IT) is a natural bridge between technical and social solutions because it can offer improved communication and transparency for fostering the necessary economic, political, and cultural adjustments. Moreover, IT is at the heart of nearly every large-scale socioeconomic system-including systems for finance, manufacturing, and the generation and distribution of energy-and so sustainability-focused changes in those systems are inextricably linked with advances in IT. The focus of Computing Research for Sustainability is "greening through IT," the application of computing to promote sustainability broadly. The aim of this report is twofold: to shine a spotlight on areas where IT innovation and computer science (CS) research can help, and to urge the computing research community to bring its approaches and methodologies to bear on these pressing global challenges. Computing Research for Sustainability focuses on addressing medium- and long-term challenges in a way that would have significant, measurable impact. The findings and recommended principles of the Committee on Computing Research for Environmental and Societal Sustainability concern four areas: (1) the relevance of IT and CS to sustainability; (2) the value of the CS approach to problem solving, particularly as it pertains to sustainability challenges; (3) key CS research areas; and (4) strategy and pragmatic approaches for CS research on sustainability.
Information technology (IT) is essential to virtually all of the nation's critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation's communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.
Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.
Radio Frequency Identification (RFID) technology is gaining rapid acceptance as a means to track a wide array of manufactured objects. Currently, RFID technologies have shown promise in transportation (e.g., smart fare cards) and commerce (e.g., inventory control) for a variety of uses and are likely to find many new applications in both military and civilian areas if and when current technical issues are resolved. There are a number of policy concerns (e.g., privacy), however, that will become more crucial as the technology spreads. This report presents a summary of a workshop, held by the NRC at the request of the Defense Advanced Research Projects Agency, to explore many of the key technical and policy issues. Several important themes that are likely to govern expansion of RFID technology emerged from the workshop and are discussed.
Information technology (IT) is widely understood to be the enabling technology of the 21st century. IT has transformed, and continues to transform, all aspects of our lives: commerce and finance, education, employment, energy, health care, manufacturing, government, national security, transportation, communications, entertainment, science, and engineering. IT and its impact on the U.S. economy-both directly (the IT sector itself) and indirectly (other sectors that are powered by advances in IT)-continue to grow in size and importance. In 1995, the National Research Council's Computer Science and Telecommunications Board (CSTB) produced the report Evolving the High Performance Computing and Communications Initiative to Support the Nation's Information Infrastructure. A graphic in that report, often called the "tire tracks" diagram because of its appearance, produced an extraordinary response by clearly linking government investments in academic and industry research to the ultimate creation of new information technology industries with more than $1 billion in annual revenue. Used in presentations to Congress and executive branch decision makers and discussed broadly in the research and innovation policy communities, the tire tracks figure dispelled the assumption that the commercially successful IT industry is self-sufficient, underscoring through long incubation periods of years and even decades. The figure was updated in 2002, 2003, and 2009 reports produced by the CSTB. With the support of the National Science Foundation, CSTB updated the tire tracks figure. Continuing Innovation in Information Technology includes the updated figure and a brief text based in large part on prior CSTB reports.
Globalization, developments in technology, and new business models are transforming the way products and services are conceived, designed, made, and distributed in the U.S. and around the world. These forces present challenges - lower wages and fewer jobs for a growing fraction of middle-class workers - as well as opportunities for "makers" and aspiring entrepreneurs to create entirely new types of businesses and jobs. Making Value for America examines these challenges and opportunities and offers recommendations for collaborative actions between government, industry, and education institutions to help ensure that the U.S. thrives amid global economic changes and remains a leading environment for innovation. Filled with real-life examples, Making Value for America presents a roadmap to enhance the nation's capacity to pursue opportunities and adapt to transforming value chains by widespread adoption of best practices, a well-prepared and innovative workforce, local innovation networks to support startups and new products, improved flow of capital investments, and infrastructure upgrades.
Computer science has drawn from and contributed to many disciplines and practices since it emerged as a field in the middle of the 20th century. Those interactions, in turn, have contributed to the evolution of information technology â€" new forms of computing and communications, and new applications â€" that continue to develop from the creative interactions between computer science and other fields. Beyond Productivity argues that, at the beginning of the 21st century, information technology (IT) is forming a powerful alliance with creative practices in the arts and design to establish the exciting new, domain of information technology and creative practicesâ€"ITCP. There are major benefits to be gained from encouraging, supporting, and strategically investing in this domain.
Vulnerabilities abound in U.S. society. The openness and efficiency of our key infrastructures â€" transportation, information and telecommunications systems, health systems, the electric power grid, emergency response units, food and water supplies, and others â€" make them susceptible to terrorist attacks. Making the Nation Safer discusses technical approaches to mitigating these vulnerabilities. A broad range of topics are covered in this book, including: Nuclear and radiological threats, such as improvised nuclear devices and "dirty bombs;" Bioterrorism, medical research, agricultural systems and public health; Toxic chemicals and explosive materials; Information technology, such as communications systems, data management, cyber attacks, and identification and authentication systems; Energy systems, such as the electrical power grid and oil and natural gas systems; Transportation systems; Cities and fixed infrastructures, such as buildings, emergency operations centers, and tunnels; The response of people to terrorism, such as how quality of life and morale of the population can be a target of terrorists and how people respond to terrorist attacks; and Linked infrastructures, i.e. the vulnerabilities that result from the interdependencies of key systems. In each of these areas, there are recommendations on how to immediately apply existing knowledge and technology to make the nation safer and on starting research and development programs that could produce innovations that will strengthen key systems and protect us against future threats. The book also discusses issues affecting the government's ability to carry out the necessary science and engineering programs and the important role of industry, universities, and states, counties, and cities in homeland security efforts. A long term commitment to homeland security is necessary to make the nation safer, and this book lays out a roadmap of how science and engineering can assist in countering terrorism.
IDsâ€"Not That Easy highlights some of the challenging policy, procedural, and technological issues presented by nationwide identity systems. In the wake of the events of September 11, 2001, nationwide identity systems have been proposed to better track the movement of suspected terrorists. However, questions arise as to who would use the system and how, if participation would be mandatory, the type of data that would be collected, and the legal structures needed to protect privacy. The committee's goal is to foster a broad and deliberate discussion among policy-makers and the public about the form of nationwide identity system that might be created, and whether such a system is desirable or feasible.
The global spread of science and technology expertise and the growing commercial access to advanced technologies with possible military application are creating potentially serious threats to the technological superiority underpinning U.S. military strength. Key to dealing with this situation is the ability of the U.S. intelligence community to be able to provide adequate and effective warning of evolving, critical technologies. To assist in performing this task, the Technology Warning Division of the Defense Intelligence Agency (DIA) asked the National Research Council (NRC) to undertake a study examining technology warning issues. This report provides the first part of that study. It presents an assessment of critical, evolving technologies; postulates ways potential adversaries could disrupt these technologies; and provides indicators for the intelligence community to determine if such methods are under development. The intention of this report is to establish the foundation for a long-term relationship with the technology warning community to support the examination of technology warning issues.
The U.S. information technology (IT) research and development (R&D) ecosystem was the envy of the world in 1995. However, this position of leadership is not a birthright, and it is now under pressure. In recent years, the rapid globalization of markets, labor pools, and capital flows have encouraged many strong national competitors. During the same period, national policies have not sufficiently buttressed the ecosystem, or have generated side effects that have reduced its effectiveness. As a result, the U.S. position in IT leadership today has materially eroded compared with that of prior decades, and the nation risks ceding IT leadership to other nations within a generation. Assessing the Impacts of Changes in the Information Technology R&D Ecosystem calls for a recommitment to providing the resources needed to fuel U.S. IT innovation, to removing important roadblocks that reduce the ecosystem's effectiveness in generating innovation and the fruits of innovation, and to becoming a lead innovator and user of IT. The book examines these issues and makes recommendations to strengthen the U.S. IT R&D ecosystem.
Decades of evolving U.S. policy have led to three sectors providing weather servicesâ€"NOAA (primarily the National Weather Service [NWS]), academic institutions, and private companies. This three-sector system has produced a scope and diversity of weather services in the United States second to none. However, rapid scientific and technological change is changing the capabilities of the sectors and creating occasional friction. Fair Weather: Effective Partnerships in Weather and Climate Services examines the roles of the three sectors in providing weather and climate services, the barriers to interaction among the sectors, and the impact of scientific and technological advances on the weather enterprise. Readers from all three sectors will be interested in the analysis and recommendations provided in Fair Weather.
Who Goes There?: Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the individuals being authenticated. As authentication becomes ever more ubiquitous, understanding its interplay with privacy is vital. The report examines numerous concepts, including authentication, authorization, identification, privacy, and security. It provides a framework to guide thinking about these issues when deciding whether and how to use authentication in a particular context. The book explains how privacy is affected by system design decisions. It also describes government's unique role in authentication and what this means for how government can use authentication with minimal invasions of privacy. In addition, Who Goes There? outlines usability and security considerations and provides a primer on privacy law and policy.
Drawing on the findings of sector-specific workshops, e-mail surveys, research literature, expert testimony, and committee and panel members' expertise, this National Academy of Engineering study assesses the qualitative impact of academic research on five industriesâ€"network systems and communications; medical devices and equipment; aerospace; transportation, distribution, and logistics services; and financial services. The book documents the range and significance of academic research contributions to the five industriesâ€"comparing the importance of different types of contributions, the multi- and interdisciplinary nature of these contributions, and the multiple vectors by which academic research is linked to each industry. The book calls for action to address six cross-cutting challenges to university-industry interactions: the growing disciplinary and time-horizon-related imbalances in federal R&D funding, barriers to university-industry interaction in service industries, the critical role of academic research in the advancement of information technology, the role of academic research in the regulation of industry, the impact of technology transfer activities on core university research and education missions, and the search for new pathways and mechanisms to enhance the contributions of academic research to industry. The book also includes findings and recommendations specific to each industry.
Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation's critical information systems, thereby causing considerable suffering and damage. Online e-commerce business, government agency files, and identity records are all potential security targets. Toward a Safer and More Secure Cyberspace examines these Internet security vulnerabilities and offers a strategy for future research aimed at countering cyber attacks. It also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and considers the human resource base needed to advance the cybersecurity research agenda. This book will be an invaluable resource for Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, and others interested in digital security and safety.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.