|Continuing Innovation in Information Technology examines important research areas and some of the significant, billion-dollar-plus, IT industries that have resulted from those investments. It features an updated visualization of the impact of research on IT innovation, including the links to U.S. IT firms and products, and explains the critical role of federal support and the interplay between academic and industrial research. Download the “tire tracks” graphic itself or a poster or trifold brochure based on the report.|
|Computing Research for Sustainability highlights opportunities for computer science research and IT innovation and urges the computing research community to bring its approaches and methodologies to bear in ways that will have significant, measurable impact on sustainability.|
|The Safety Challenge and Promise of Automotive Electronics: Insights from Unintended Acceleration (Transportation Research Board, Board on Energy and Environmental Systems, and CSTB) examines how the National Highway Traffic Safety Administration's regulatory, research, and defect investigation programs can be strengthened to meet the safety assurance and oversight challenges arising from the expanding functionality and use of automotive software and electronics.|
|Strategies and Priorities for Information Technology at the Centers for Medicare and Medicaid Services recommends that CMS embrace IT as a critical strategic capability for improving the efficiency, quality, safety, and equity of U.S. health care. Report in Brief.|
| ||Communicating Science and Engineering Data in the Information Age (by NRC's Committee on National Statistics with CSTB) reviews how the NSF’s National Center for Science and Engineering Statistics collects and distributes information on science and engineering and recommends future directions for the program.|
The Report of a Workshop on Pedagogical Aspects of Computational Thinking summarizes insights and approaches from educators who have addressed computational thinking in their work with K-12 teachers and students and in settings for informal (non-school) education.
| ||Wireless Technology Prospects and Policy Options describes key technology trends, their implications, and options for facilitating the introduction of enhanced and new services.|
|The Future of Computing Performance: Game Over or Next Level? explores the causes and implications of the slowdown in the historically dramatic exponential growth in computing performance and the end of the dominance of the single microprocessor in computing. The report observes that the era of sequential computing must give way to a new era in which parallelism is at the forefront. The report concludes that important scientific and engineering challenges lie ahead and makes recommendations for research, practice, and education.|
|Preliminary Observations on Information Technology Needs and Priorities at the Centers for Medicare and Medicaid Services: An Interim Report discusses CMS's emerging requirements for information; challenges involving the transformation of enterprise data and technology management; and associated organizational, administrative, and cultural challenges.|
|Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options examines governmental, economical, technical, legal, and psychological challenges involved in deterring cyber attacks. It addresses key issues and questions identified in Letter Report from the Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy.|
| ||Biometric Recognition: Challenges and Opportunities presents a broad and comprehensive assessment of biometric recognition systems -- articulating design and operational considerations as well as outlining a research agenda to bolster the scientific and engineering underpinnings of these systems. |
|Toward Better Usability, Security, and Privacy of Information Technology identifies research opportunities and ways to embed usability considerations in design and development related to security and privacy, and vice versa. |
Achieving Effective Acquisition of Information Technology in the Department of Defense calls for the DOD to acquire information technology systems using a fundamentally different acquisition process based on iterative, incremental development practices.
| || |
| || |