%0 Book %A National Academy of Engineering %A National Academy of Engineering %T Frontiers of Engineering: Reports on Leading Edge Engineering from the 1999 NAE Symposium on Frontiers of Engineering %@ 978-0-309-06933-5 %D 2000 %U https://nap.nationalacademies.org/catalog/9774/frontiers-of-engineering-reports-on-leading-edge-engineering-from-the %> https://nap.nationalacademies.org/catalog/9774/frontiers-of-engineering-reports-on-leading-edge-engineering-from-the %I The National Academies Press %C Washington, DC %G English %K Engineering and Technology %K Education %P 138 %X Frontiers of Engineering is the fifth book highlighting the presentations of the National Academy of Engineering's (NAE) annual symposium series, Frontiers of Engineering. The 1999 NAE Symposium on Frontiers of Engineering was held October 14-16, at the Academies' Beckman Center in Irvine, California. The 101 emerging engineering leaders (ages 30-45) from industry, academia, and federal laboratories who attended the meeting heard presentations and discussed cutting-edge research and technical work in four engineering fields. Symposium speakers were asked to prepare extended summaries of their presentations, and it is those papers that are contained here. The intent of this book, and of the four that precede it in the series, is to describe the content and underpinning philosophy of this unique meeting and to highlight some of the exciting developments in engineering today. %0 Book %A National Academies of Sciences, Engineering, and Medicine %T Opportunities from the Integration of Simulation Science and Data Science: Proceedings of a Workshop %@ 978-0-309-48189-2 %D 2018 %U https://nap.nationalacademies.org/catalog/25199/opportunities-from-the-integration-of-simulation-science-and-data-science %> https://nap.nationalacademies.org/catalog/25199/opportunities-from-the-integration-of-simulation-science-and-data-science %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 48 %X Convergence has been a key topic of discussion about the future of cyberinfrastructure for science and engineering research. Convergence refers both to the combined use of simulation and data-centric techniques in science and engineering research and the possibilities for a single type of cyberinfrastructure to support both techniques. The National Academies of Science, Engineering, and Medicine convened a Workshop on Converging Simulation and Data-Driven Science on May 10, 2018, in Washington, D.C. The workshop featured speakers from universities, national laboratories, technology companies, and federal agencies who addressed the potential benefits and limitations of convergence as they relate to scientific needs, technological capabilities, funding structures, and system design requirements. This publication summarizes the presentations and discussions from the workshop. %0 Book %A National Research Council %T Bulk Collection of Signals Intelligence: Technical Options %@ 978-0-309-32520-2 %D 2015 %U https://nap.nationalacademies.org/catalog/19414/bulk-collection-of-signals-intelligence-technical-options %> https://nap.nationalacademies.org/catalog/19414/bulk-collection-of-signals-intelligence-technical-options %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 124 %X The Bulk Collection of Signals Intelligence: Technical Options study is a result of an activity called for in Presidential Policy Directive 28 (PPD-28), issued by President Obama in January 2014, to evaluate U.S. signals intelligence practices. The directive instructed the Office of the Director of National Intelligence (ODNI) to produce a report within one year "assessing the feasibility of creating software that would allow the intelligence community more easily to conduct targeted information acquisition rather than bulk collection." ODNI asked the National Research Council (NRC) -- the operating arm of the National Academy of Sciences and National Academy of Engineering -- to conduct a study, which began in June 2014, to assist in preparing a response to the President. Over the ensuing months, a committee of experts appointed by the Research Council produced the report. %0 Book %A National Academies of Sciences, Engineering, and Medicine %E Johnson, Anne Frances %E Millett, Lynette I. %T Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop %@ 978-0-309-46288-4 %D 2017 %U https://nap.nationalacademies.org/catalog/24833/software-update-as-a-mechanism-for-resilience-and-security-proceedings %> https://nap.nationalacademies.org/catalog/24833/software-update-as-a-mechanism-for-resilience-and-security-proceedings %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 92 %X Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies. To explore the landscape further, the Forum on Cyber Resilience hosted a workshop featuring invited speakers from government, the private sector, and academia. This publication summarizes the presentations and discussions from the workshop. %0 Book %A National Academies of Sciences, Engineering, and Medicine %T An Assessment of the Material Measurement Laboratory at the National Institute of Standards and Technology: Fiscal Year 2023 %@ 978-0-309-71071-8 %D 2023 %U https://nap.nationalacademies.org/catalog/27257/an-assessment-of-the-material-measurement-laboratory-at-the-national-institute-of-standards-and-technology %> https://nap.nationalacademies.org/catalog/27257/an-assessment-of-the-material-measurement-laboratory-at-the-national-institute-of-standards-and-technology %I The National Academies Press %C Washington, DC %G English %K Engineering and Technology %P 126 %X Since 1959, the National Institute of Standards and Technology (NIST) has annually engaged the National Academies of Sciences, Engineering, and Medicine to assemble panels of experts to assess the quality and effectiveness of the NIST measurements and standards laboratories as well as the adequacy of the laboratory resources. This report assesses the Material Measurement Laboratory (MML), with a focus on technical programs, quality of research, scientific and technical expertise, dissemination products and strategies, and how well budget, facilities, equipment, and human resources support technical programs and MML objectives. %0 Book %A National Research Council %T Continuing Innovation in Information Technology %@ 978-0-309-25962-0 %D 2012 %U https://nap.nationalacademies.org/catalog/13427/continuing-innovation-in-information-technology %> https://nap.nationalacademies.org/catalog/13427/continuing-innovation-in-information-technology %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 42 %X Information technology (IT) is widely understood to be the enabling technology of the 21st century. IT has transformed, and continues to transform, all aspects of our lives: commerce and finance, education, employment, energy, health care, manufacturing, government, national security, transportation, communications, entertainment, science, and engineering. IT and its impact on the U.S. economy-both directly (the IT sector itself) and indirectly (other sectors that are powered by advances in IT)—continue to grow in size and importance. In 1995, the National Research Council's Computer Science and Telecommunications Board (CSTB) produced the report Evolving the High Performance Computing and Communications Initiative to Support the Nation's Information Infrastructure. A graphic in that report, often called the "tire tracks" diagram because of its appearance, produced an extraordinary response by clearly linking government investments in academic and industry research to the ultimate creation of new information technology industries with more than $1 billion in annual revenue. Used in presentations to Congress and executive branch decision makers and discussed broadly in the research and innovation policy communities, the tire tracks figure dispelled the assumption that the commercially successful IT industry is self-sufficient, underscoring through long incubation periods of years and even decades. The figure was updated in 2002, 2003, and 2009 reports produced by the CSTB. With the support of the National Science Foundation, CSTB updated the tire tracks figure. Continuing Innovation in Information Technology includes the updated figure and a brief text based in large part on prior CSTB reports. %0 Book %A National Research Council %E Fuller, Samuel H. %E Millett, Lynette I. %T The Future of Computing Performance: Game Over or Next Level? %@ 978-0-309-15951-7 %D 2011 %U https://nap.nationalacademies.org/catalog/12980/the-future-of-computing-performance-game-over-or-next-level %> https://nap.nationalacademies.org/catalog/12980/the-future-of-computing-performance-game-over-or-next-level %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 200 %X The end of dramatic exponential growth in single-processor performance marks the end of the dominance of the single microprocessor in computing. The era of sequential computing must give way to a new era in which parallelism is at the forefront. Although important scientific and engineering challenges lie ahead, this is an opportune time for innovation in programming systems and computing architectures. We have already begun to see diversity in computer designs to optimize for such considerations as power and throughput. The next generation of discoveries is likely to require advances at both the hardware and software levels of computing systems. There is no guarantee that we can make parallel computing as common and easy to use as yesterday's sequential single-processor computer systems, but unless we aggressively pursue efforts suggested by the recommendations in this book, it will be "game over" for growth in computing performance. If parallel programming and related software efforts fail to become widespread, the development of exciting new applications that drive the computer industry will stall; if such innovation stalls, many other parts of the economy will follow suit. The Future of Computing Performance describes the factors that have led to the future limitations on growth for single processors that are based on complementary metal oxide semiconductor (CMOS) technology. It explores challenges inherent in parallel computing and architecture, including ever-increasing power consumption and the escalated requirements for heat dissipation. The book delineates a research, practice, and education agenda to help overcome these challenges. The Future of Computing Performance will guide researchers, manufacturers, and information technology professionals in the right direction for sustainable growth in computer performance, so that we may all enjoy the next level of benefits to society. %0 Book %A National Academies of Sciences, Engineering, and Medicine %T Assessment of the Information Sciences Directorate at the Army Research Office %@ 978-0-309-49200-3 %D 2019 %U https://nap.nationalacademies.org/catalog/25426/assessment-of-the-information-sciences-directorate-at-the-army-research-office %> https://nap.nationalacademies.org/catalog/25426/assessment-of-the-information-sciences-directorate-at-the-army-research-office %I The National Academies Press %C Washington, DC %G English %K Conflict and Security Issues %P 48 %X This report summarizes the 2018 findings of the Panel on Review of Extramural Basic Research at the Army Research Laboratory, which reviewed the programs at the Army Research Office’s Information Sciences Directorate. %0 Book %A National Academies of Sciences, Engineering, and Medicine %T A 21st Century Cyber-Physical Systems Education %@ 978-0-309-45163-5 %D 2016 %U https://nap.nationalacademies.org/catalog/23686/a-21st-century-cyber-physical-systems-education %> https://nap.nationalacademies.org/catalog/23686/a-21st-century-cyber-physical-systems-education %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 106 %X Cyber-physical systems (CPS) are "engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components." CPS can be small and closed, such as an artificial pancreas, or very large, complex, and interconnected, such as a regional energy grid. CPS engineering focuses on managing inter- dependencies and impact of physical aspects on cyber aspects, and vice versa. With the development of low-cost sensing, powerful embedded system hardware, and widely deployed communication networks, the reliance on CPS for system functionality has dramatically increased. These technical developments in combination with the creation of a workforce skilled in engineering CPS will allow the deployment of increasingly capable, adaptable, and trustworthy systems. Engineers responsible for developing CPS but lacking the appropriate education or training may not fully understand at an appropriate depth, on the one hand, the technical issues associated with the CPS software and hardware or, on the other hand, techniques for physical system modeling, energy and power, actuation, signal processing, and control. In addition, these engineers may be designing and implementing life-critical systems without appropriate formal training in CPS methods needed for verification and to assure safety, reliability, and security. A workforce with the appropriate education, training, and skills will be better positioned to create and manage the next generation of CPS solutions. A 21st Century Cyber-Physical Systems Education examines the intellectual content of the emerging field of CPS and its implications for engineering and computer science education. This report is intended to inform those who might support efforts to develop curricula and materials; faculty and university administrators; industries with needs for CPS workers; and current and potential students about intellectual foundations, workforce requirements, employment opportunities, and curricular needs. %0 Book %A National Academies of Sciences, Engineering, and Medicine %T Reproducibility and Replicability in Science %@ 978-0-309-48616-3 %D 2019 %U https://nap.nationalacademies.org/catalog/25303/reproducibility-and-replicability-in-science %> https://nap.nationalacademies.org/catalog/25303/reproducibility-and-replicability-in-science %I The National Academies Press %C Washington, DC %G English %K Surveys and Statistics %K Policy for Science and Technology %P 256 %X One of the pathways by which the scientific community confirms the validity of a new scientific discovery is by repeating the research that produced it. When a scientific effort fails to independently confirm the computations or results of a previous study, some fear that it may be a symptom of a lack of rigor in science, while others argue that such an observed inconsistency can be an important precursor to new discovery. Concerns about reproducibility and replicability have been expressed in both scientific and popular media. As these concerns came to light, Congress requested that the National Academies of Sciences, Engineering, and Medicine conduct a study to assess the extent of issues related to reproducibility and replicability and to offer recommendations for improving rigor and transparency in scientific research. Reproducibility and Replicability in Science defines reproducibility and replicability and examines the factors that may lead to non-reproducibility and non-replicability in research. Unlike the typical expectation of reproducibility between two computations, expectations about replicability are more nuanced, and in some cases a lack of replicability can aid the process of scientific discovery. This report provides recommendations to researchers, academic institutions, journals, and funders on steps they can take to improve reproducibility and replicability in science. %0 Book %A National Academies of Sciences, Engineering, and Medicine %T Information Technology Innovation: Resurgence, Confluence, and Continuing Impact %@ 978-0-309-68420-0 %D 2020 %U https://nap.nationalacademies.org/catalog/25961/information-technology-innovation-resurgence-confluence-and-continuing-impact %> https://nap.nationalacademies.org/catalog/25961/information-technology-innovation-resurgence-confluence-and-continuing-impact %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 148 %X Information technology (IT) is widely understood to be the enabling technology of the 21st century. IT has transformed, and continues to transform, all aspects of our lives: commerce and finance, education, energy, health care, manufacturing, government, national security, transportation, communications, entertainment, science, and engineering. IT and its impact on the U.S. economy—both directly (the IT sector itself) and indirectly (other sectors that are powered by advances in IT)—continue to grow in size and importance. IT’s impacts on the U.S. economy—both directly (the IT sector itself) and indirectly (other sectors that are powered by advances in IT)—continue to grow. IT enabled innovation and advances in IT products and services draw on a deep tradition of research and rely on sustained investment and a uniquely strong partnership in the United States among government, industry, and universities. Past returns on federal investments in IT research have been extraordinary for both U.S. society and the U.S. economy. This IT innovation ecosystem fuels a virtuous cycle of innovation with growing economic impact. Building on previous National Academies work, this report describes key features of the IT research ecosystem that fuel IT innovation and foster widespread and longstanding impact across the U.S. economy. In addition to presenting established computing research areas and industry sectors, it also considers emerging candidates in both categories. %0 Book %A National Research Council %T Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers %@ 978-0-309-07568-8 %D 2001 %U https://nap.nationalacademies.org/catalog/10193/embedded-everywhere-a-research-agenda-for-networked-systems-of-embedded %> https://nap.nationalacademies.org/catalog/10193/embedded-everywhere-a-research-agenda-for-networked-systems-of-embedded %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 235 %X Advances in the miniaturization and networking of microprocessors promise a day when networked computers are embedded throughout the everyday world. However, our current understanding of what such systems would be like is insufficient to bring the promise to reality. Embedded, Everywhere explores the potential of networked systems of embedded computers and the research challenges arising from embedding computation and communications technology into a wide variety of applications—from precision agriculture to automotive telematics to defense systems. It describes how these emerging networks operate under unique constraints not present in more traditional distributed systems, such as the Internet. It articulates how these networks will have to be dynamically adaptive and self-configuring, and how new models for approaching programming and computation are necessary. Issues relating to trustworthiness, security, safety, reliability, usability, and privacy are examined in light of the ubiquitous nature of these systems. A comprehensive, systems-oriented research agenda is presented, along with recommendations to major federal funding agencies. %0 Book %A National Research Council %T Brain and Cognition: Some New Technologies %@ 978-0-309-07841-2 %D 1989 %U https://nap.nationalacademies.org/catalog/1870/brain-and-cognition-some-new-technologies %> https://nap.nationalacademies.org/catalog/1870/brain-and-cognition-some-new-technologies %I The National Academies Press %C Washington, DC %G English %K Behavioral and Social Sciences %P 90 %0 Book %A National Academies of Sciences, Engineering, and Medicine %E Johnson, Anne %E Millett, Lynette I. %T Beyond Spectre: Confronting New Technical and Policy Challenges: Proceedings of a Workshop %@ 978-0-309-49149-5 %D 2019 %U https://nap.nationalacademies.org/catalog/25418/beyond-spectre-confronting-new-technical-and-policy-challenges-proceedings-of %> https://nap.nationalacademies.org/catalog/25418/beyond-spectre-confronting-new-technical-and-policy-challenges-proceedings-of %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 84 %X In 2017, researchers discovered a vulnerability in microprocessors used in computers and devices all over the world. The vulnerability, named Spectre, combines side effects from caching and speculative execution, which are techniques that have been used for many years to increase the speed at which computers operate. The discovery upends a number of common assumptions about cybersecurity and draws attention to the complexities of the global supply chain and global customer base for the vast range of devices and cloud capabilities that all computer users rely on. In October 2018, the Forum on Cyber Resilience hosted a workshop to explore the implications of this development. This publication summarizes the presentations and discussions from the workshop. %0 Book %A National Academy of Engineering %A National Academy of Engineering %T Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2010 Symposium %@ 978-0-309-16362-0 %D 2011 %U https://nap.nationalacademies.org/catalog/13043/frontiers-of-engineering-reports-on-leading-edge-engineering-from-the %> https://nap.nationalacademies.org/catalog/13043/frontiers-of-engineering-reports-on-leading-edge-engineering-from-the %I The National Academies Press %C Washington, DC %G English %K Space and Aeronautics %K Engineering and Technology %P 190 %X This volume highlights the papers presented at the National Academy of Engineering's 2010 U.S. Frontiers of Engineering Symposium. Every year, the symposium brings together 100 outstanding young leaders in engineering to share their cutting-edge research and technical work. The 2010 symposium was held September 23 - 25, and hosted by IBM at the IBM Learning Center in Armonk, New York. Speakers were asked to prepare extended summaries of their presentations, which are reprinted here. The intent of this book is to convey the excitement of this unique meeting and to highlight cutting-edge developments in engineering research and technical work. %0 Book %T Roles of Industry and the University in Computer Research and Development %D 1982 %U https://nap.nationalacademies.org/catalog/10453/roles-of-industry-and-the-university-in-computer-research-and-development %> https://nap.nationalacademies.org/catalog/10453/roles-of-industry-and-the-university-in-computer-research-and-development %I The National Academies Press %C Washington, DC %G English %P 101 %0 Book %A Transportation Research Board %A National Academies of Sciences, Engineering, and Medicine %E Bell, Pamela %E Jividen, David %E Melnick, Ted %E Gartenfeld, Marc %E Tello, Emmy %T Guidance on Successful Computer Maintenance Management System (CMMS) Selection and Practices %D 2015 %U https://nap.nationalacademies.org/catalog/22103/guidance-on-successful-computer-maintenance-management-system-cmms-selection-and-practices %> https://nap.nationalacademies.org/catalog/22103/guidance-on-successful-computer-maintenance-management-system-cmms-selection-and-practices %I The National Academies Press %C Washington, DC %G English %K Transportation and Infrastructure %P 165 %X TRB’s Airport Cooperative Research Program (ACRP) Web-Only Document 23: Guidance on Successful Computer Maintenance Management System (CMMS) Selection and Practices provides guidance with selecting a CMMS that is most compatible with an airport’s individual needs. Airports use CMMS to help manage airport assets. The report explores ways to integrate a CMMS into airport processes, procedures, and other information technology systems. This guidebook is accompanied by an evaluation tool, which may help airports with defining their requirements for a CMMS program. This software is offered as is, without warranty or promise of support of any kind either expressed or implied. Under no circumstance will the National Academy of Sciences or the Transportation Research Board (collectively "TRB") be liable for any loss or damage caused by the installation or operation of this product. TRB makes no representation or warranty of any kind, expressed or implied, in fact or in law, including without limitation, the warranty of merchantability or the warranty of fitness for a particular purpose, and shall not in any case be liable for any consequential or special damages. %0 Book %A National Academies of Sciences, Engineering, and Medicine %T Decrypting the Encryption Debate: A Framework for Decision Makers %@ 978-0-309-47153-4 %D 2018 %U https://nap.nationalacademies.org/catalog/25010/decrypting-the-encryption-debate-a-framework-for-decision-makers %> https://nap.nationalacademies.org/catalog/25010/decrypting-the-encryption-debate-a-framework-for-decision-makers %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 118 %X Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool. At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "end-to-end," intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators. Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information. %0 Book %A Transportation Research Board %A National Academies of Sciences, Engineering, and Medicine %E Murphy, Randall J. %E Sukkarieh, Michael %E Haass, Jon %E Hrilj, Paul, ac %T Guidebook on Best Practices for Airport Cybersecurity %D 2015 %U https://nap.nationalacademies.org/catalog/22116/guidebook-on-best-practices-for-airport-cybersecurity %> https://nap.nationalacademies.org/catalog/22116/guidebook-on-best-practices-for-airport-cybersecurity %I The National Academies Press %C Washington, DC %G English %K Transportation and Infrastructure %P 162 %X TRB’s Airport Cooperative Research Program (ACRP) Report 140: Guidebook on Best Practices for Airport Cybersecurity provides information designed to help reduce or mitigate inherent risks of cyberattacks on technology-based systems.Traditional IT infrastructure such as servers, desktops, and network devices are covered along with increasingly sophisticated and interconnected industrial control systems, such as baggage handling, temperature control, and airfield lighting systems.The guidebook also includes a CD-ROM of multimedia material that may be used to educate all staff at airports about the need, and how, to be diligent against cybersecurity threats.The CD-ROM is also available for download from TRB’s website as an ISO image. Links to the ISO image and instructions for burning a CD-ROM from an ISO image are provided below.Help on Burning an .ISO CD-ROM ImageDownload the .ISO CD-ROM Image(Warning: This is a large file and may take some time to download using a high-speed connection.)CD-ROM Disclaimer - This software is offered as is, without warranty or promise of support of any kind either expressed or implied. Under no circumstance will the National Academy of Sciences or the Transportation Research Board (collectively "TRB") be liable for any loss or damage caused by the installation or operation of this product. TRB makes no representation or warranty of any kind, expressed or implied, in fact or in law, including without limitation, the warranty of merchantability or the warranty of fitness for a particular purpose, and shall not in any case be liable for any consequential or special damages. %0 Book %A National Research Council %T Critical Code: Software Producibility for Defense %@ 978-0-309-15948-7 %D 2010 %U https://nap.nationalacademies.org/catalog/12979/critical-code-software-producibility-for-defense %> https://nap.nationalacademies.org/catalog/12979/critical-code-software-producibility-for-defense %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %K Conflict and Security Issues %P 160 %X Critical Code contemplates Department of Defense (DoD) needs and priorities for software research and suggests a research agenda and related actions. Building on two prior books—Summary of a Workshop on Software Intensive Systems and Uncertainty at Scale and Preliminary Observations on DoD Software Research Needs and Priorities—the present volume assesses the nature of the national investment in software research and, in particular, considers ways to revitalize the knowledge base needed to design, produce, and employ software-intensive systems for tomorrow's defense needs. Critical Code discusses four sets of questions: To what extent is software capability significant for the DoD? Is it becoming more or less significant and strategic in systems development? Will the advances in software producibility needed by the DoD emerge unaided from industry at a pace sufficient to meet evolving defense requirements? What are the opportunities for the DoD to make more effective use of emerging technology to improve software capability and software producibility? In which technology areas should the DoD invest in research to advance defense software capability and producibility?