Search Results

open access

Programs Funded by the H-1B Visa Education and Training Fee, and Labor Market Conditions for Information Technology (IT) Workers

Description: This report discusses legislation and funding plans made by Congress in relation to H-1B professional specialty visas granted to foreign workers specifically in the Information Technology sector. Updated October 5, 2007.
Date: October 5, 2007
Creator: Levine, Linda & Naughton, Blake Alan
Partner: UNT Libraries Government Documents Department
open access

Weapons of Mass Destruction: Trade Between North Korea and Pakistan

Description: U.S. intelligence officials claimed Pakistan was a key supplier of uranium enrichment technology to North Korea, and some media reports suggested that Pakistan had exchanged centrifuge enrichment technology for North Korean help in developing longer range missiles. U.S. official statements leave little doubt that cooperation occurred, but there are significant details missing on the scope of cooperation and the role of Pakistan's government. The roots of cooperation are deep. North Korea and Pa… more
Date: October 11, 2006
Creator: Squassoni, Sharon A.
Partner: UNT Libraries Government Documents Department
open access

Weapons of Mass Destruction: Trade Between North Korea and Pakistan

Description: In October 2002, the United States confronted North Korea about its alleged clandestine uranium enrichment program. Soon after, the Agreed Framework collapsed, North Korea expelled international inspectors, and withdrew from the Nuclear Nonproliferation Treaty (NPT). U.S. intelligence officials claimed Pakistan was a key supplier of uranium enrichment technology to North Korea, and some media reports suggested that Pakistan had exchanged centrifuge enrichment technology for North Korean help in… more
Date: October 11, 2006
Creator: Squassoni, Sharon
Partner: UNT Libraries Government Documents Department
open access

China: Possible Missile Technology Transfers under U.S. Satellite Export Policy - Actions and Chronology

Description: This CRS Report discusses security concerns, significant congressional and administration action, and a comprehensive chronology pertaining to satellite exports to the PRC. The report discusses issues for U.S. foreign and security policy (including that on China and weapons nonproliferation), such as: What are the benefits and costs of satellite exports to China for U.S. economic and security interests? Should the United States continue, change, or cease the policy in place since the Reagan Adm… more
Date: October 6, 2003
Creator: Kan, Shirley A.
Partner: UNT Libraries Government Documents Department
open access

Japan's Science and Technology Strategies and Policies

Description: Japan,s rise as a leading economic power has been attributed to many factors. Increasingly, attention has focused on Japan,s ability to apply innovative technologies to develop new products. Technology development and applications are at the core of a system in which the government and the private sector facilitate industrial policies and practices. Japanese research and development efforts increasingly stress what one Japanese policymaker calls the "fusion" solution, or combining advances in d… more
Date: October 14, 1992
Creator: McLoughlin, Glenn J.
Partner: UNT Libraries Government Documents Department
open access

Internet Domain Names: Background and Policy Issues

Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases residing in computers around the world that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information from computers anywhere on the Internet.
Date: October 28, 2009
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
open access

Data Mining and Homeland Security: An Overview

Description: Data mining has become one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terro… more
Date: October 3, 2006
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

U.S.-China Cyber Agreement

Description: During the state visit on September 24-25, 2015, President Xi Jinping of China and President Barack Obama reached a Cyber Agreement. This report briefly discusses that agreement.
Date: October 16, 2015
Creator: Rollins, John W.; Lawrence, Susan V.; Rennack, Dianne E. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

The Internet Tax Freedom Act: In Brief

Description: This report discusses the Internet Tax Freedom Act (ITFA; P.L. 105-277), which enacted in 1998, implemented a three-year moratorium preventing state and local governments from taxing Internet access, or imposing multiple or discriminatory taxes on electronic commerce.
Date: October 5, 2015
Creator: Stupak, Jeffrey M.
Partner: UNT Libraries Government Documents Department
open access

Digital Television: An Overview

Description: Digital television (DTV) is a new television service representing the most significant development in television technology since the advent of color television in the 1950s. DTV can provide sharper pictures, a wider screen, CD-quality sound, better color rendition, and other new services currently being developed. A successful deployment of DTV requires: the development by content providers of compelling digital programming; the delivery of digital signals to consumers by broadcast television … more
Date: October 2, 2002
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: This report discusses The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Description: This report discusses the "digital divide," a term that has been used to characterize a gap between those Americans who use or have access to telecommunications technologies (e.g., telephones, computers, the Internet) and those who do not. It particularly discusses one important subset of the digital divide debate concerns high speed Internet access or broadband.
Date: October 31, 2006
Creator: Kruger, Lennard G. & Gilroy, Angele A.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen