Skip to main content

Currently Skimming:

2 General Assessment of the Information Technology Laboratory
Pages 7-15

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 7...
... Further, the ITL has in recent years focused its R&D agenda on eight broad program areas: complex systems; cyber and network security; the enabling of scientific discovery; identitymanagement systems; information discovery, use, and sharing; pervasive information technologies; trustworthy information systems; and virtual measurement systems. The ITL now has a number of programs in these broad areas.11 The ITL program portfolio contains the following:  Complex Systems Program: This program examines systems that are composed of large, interrelated, and interacting entities that, taken together, show a macroscopic behavior that is not predictable through an examination of the individual entities.
From page 8...
...  National Initiative for Cybersecurity Education: This initiative was established to "build a comprehensive framework that promulgates the availability of education, training, and awareness resources, designed to improve the cybersecurity knowledge, skills, and behavior of every segment of the population."13  Quantum Information Program: In order to develop a measurement and standards infrastructure for information systems based on the principles of quantum physics, this program pursues the following objectives: to understand the potential for quantum information to revolutionize information science; to develop theory, methods, architectures, and algorithms to enable the engineering and testing of quantum computing components and systems; and to demonstrate and to test secure, commercial-grade communication components, systems, and protocols for the quantum era.  Identity Management Systems Program: The purpose of this program is to advance the development and adoption of fingerprint, face, and iris identification and surveillance technologies through the designing of appropriate performance metrics, evaluation methodologies, test suites and test data, prototypes and testbeds, workshops, and standards and guidelines.
From page 9...
... The goals of the NSTIC are "to protect individuals, businesses, and public agencies from the high costs of cyber crimes such as identity theft and fraud, while simultaneously helping to ensure that the Internet continues to support innovation and a thriving marketplace of products and ideas."14  Virtual Measurement Systems Program: This program was established to investigate uncertainties produced primarily by computer simulations or by computer-assisted measurements. The program introduces metrological constructs (i.e., standard references, uncertainty characterization and propagation, and traceability)
From page 10...
...  NIST Special Publication 800* series: These publications are renowned for providing technically sound, unbiased, relevant guidelines that are frequently adopted voluntarily in private-sector procurements and practices and often mandated by the Office of Management and Budget (OMB)
From page 11...
... Programs in cloud computing, health information technology, identity management, cybersecurity education, trusted identities, and voting standards are all addressing national priorities in information technology. National priorities with critical information technology aspects are being addressed by projects in biosciences and bioimaging, cyber physical systems, forensics, greenhouse gas measurement, optical medical imaging, public safety communications, quantum information, smart grid, and trusted networking (Internet Protocol Version 6 [IPv6]
From page 12...
... 10. The Advanced Network Technologies Division is doing an excellent job in responding to several national priorities in both the short and long term, including its continued outstanding activities in Internet infrastructure protection and its newer efforts in smart grids and public safety communications.
From page 13...
... In light of increasing foreign dominance of the biometric industry, IAD's reliance on OA funding, and IAD's work in support of biometrics technology development, it is important that the IAD and the ITL remain mindful of the NIST mission to promote U.S. innovation and industrial competitiveness, and so IAD efforts should continue to place highest priority on the needs of the nation's commerce even while pursuing activities involving international sponsors.
From page 14...
... ITL staff, perhaps led by the program managers, should look for linkages with external organizations such as research universities and laboratories. The recent addition of temporary funding associated with the economic recovery can help build these connections.
From page 15...
... activities have been in the R&D area. Such a discussion would have been enlightening and should be included in all future responses to panel recommendations.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.