View allAll Photos Tagged NationalInstituteOfStandardsAndTechnology,

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-16-623

 

INFORMATION TECHNOLOGY: Better Management of Interdependencies between Programs Supporting 2020 Census Is Needed

 

Note: The Bureau continues to refine its assumptions as it conducts further research and testing leading up to the 2020 Census.

 

a) The 30 area census offices for identifying addresses where people could live are included in the 250 area census offices planned for the 2020 Census.

 

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-16-771

 

ELECTRONIC HEALTH INFORMATION: HHS Needs to Strengthen Security and Privacy Guidance and Oversight

 

Note: In January 2015, the Office of Civil Rights (OCR) provided additional guidance to reporting entities which directed them to report some breaches as hacking or IT incidents instead of as theft as they may have previously reported.

 

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-16-508

 

IDENTITY THEFT AND TAX FRAUD: IRS Needs to Update Its Risk Assessment for the Taxpayer Protection Program

 

Note: This figure's numbering shows the order in which events occur when fraudsters successfully commit IDT refund fraud.

 

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-23-105466

 

Cybersecurity: Secret Service Has Made Progress Toward Zero Trust Architecture, but Work Remains

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-16-623

 

INFORMATION TECHNOLOGY: Better Management of Interdependencies between Programs Supporting 2020 Census Is Needed

 

Note: The percentages in figure 1 do not add up to 100 percent due to rounding.

 

This infographic is an overview from a U.S. GAO report:

www.gao.gov/products/GAO-16-362

 

Grants Management: Actions Needed to Address Persistent Grant Closeout Timeliness and Undisbursed Balance Issues

 

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-16-325

 

CLOUD COMPUTING: Agencies Need to Incorporate Key Practices to Ensure Effective Performance

 

When using this photo, please attribute: * Photo by NEC Corporation of America with Creative Commons license.

 

NEC is the world leader in biometrics fingerprint and facial matching technology, with recognition from leading independent organizations such as U.S. National Institute of Standards and Technology (NIST). NEC’s extensive portfolio solutions range from mobile fingerprint identification, facial recognition to integrated workflow management solutions that provide extensive database matching capabilities across multiple organizations. Learn how some of the nation’s leading agencies trust NEC with their public safety solutions after attending the AFIS Internet Conference.

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-22-104746

 

Cybersecurity: Federal Response to SolarWinds and Microsoft Exchange Incidents

 

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-22-104364

 

Cybersecurity: OMB Should Update Inspector General Reporting Guidance to Increase Rating Consistency and Precision

 

When using this photo, please attribute: * Photo by NEC Corporation of America with Creative Commons license.

 

NEC is the world leader in biometrics fingerprint and facial matching technology, with recognition from leading independent organizations such as U.S. National Institute of Standards and Technology (NIST). NEC’s extensive portfolio solutions range from mobile fingerprint identification, facial recognition to integrated workflow management solutions that provide extensive database matching capabilities across multiple organizations. Learn how some of the nation’s leading agencies trust NEC with their public safety solutions after attending the AFIS Internet Conference.

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-20-126

 

CLOUD COMPUTING SECURITY: Agencies Increased Their Use of the Federal Authorization Program, but Improved Oversight and Implementation Are Needed

 

Note: The 24 Chief Financial Officers Act agencies are the Departments of Agriculture, Commerce, Defense, Education, Energy, Health and Human Services, Homeland Security, Housing and Urban Development, the Interior, Justice, Labor, State, Transportation, the Treasury, and Veterans Affairs; the Environmental Protection Agency, General Services Administration, National Aeronautics and Space Administration, National Science Foundation, Nuclear Regulatory Commission, Office of Personnel Management, Small Business Administration, and Social Security Administration, and the United States Agency for International Development.

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-21-26SP

 

5G WIRELESS: Capabilities and Challenges for an Evolving Network

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-23-105466

 

Cybersecurity: Secret Service Has Made Progress Toward Zero Trust Architecture, but Work Remains

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-19-409

 

ADVANCED MANUFACTURING: Innovation Institutes Have Demonstrated Initial Accomplishments, but Challenges Remain in Measuring Performance and Ensuring Sustainability

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-16-10

 

ELECTRONIC MONITORING: Draft National Standard for Offender Tracking Systems Addresses Common Stakeholder Needs

 

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-21-26SP

 

5G WIRELESS: Capabilities and Challenges for an Evolving Network

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-23-105480

 

Critical Infrastructure Protection: Additional Federal Coordination Is Needed to Enhance K-12 Cybersecurity

WTC 1 & 2 - Drawing Book #2 - Drawings

Title: Exterior Wall Tree

 

70 sheets comprising of drawings and schedule notes of WTC 1 & 2 - Drawing Book #2.

 

Derived from FOIA record: WTCI-000012-L.PDF

71 pages in total.

First page depicts a cover sheet.

 

From NIST FOIA records.

Unknown FOIA log.

Requester: gerrycan1

Download source: archive.org/download/WTCI000722L/Drawing%20Book%202/book2...

This infographic is related to a U.S. GAO report: www.gao.gov/products/GAO-18-205

 

Illicit Opioids: While Greater Attention Given to Combating Synthetic Opioids, Agencies Need to Better Assess their Efforts

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-21-171

 

INFORMATION TECHNOLOGY: Federal Agencies Need to Take Urgent Action to Manage Supply Chain Risks

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-23-105426

 

Broadband Funding: Stronger Management of Performance and Fraud Risk Needed for Tribal and Public-Private Partnership Grants

 

Note: We excluded 13 records that included broadband infrastructure deployment as an application purpose but did not specify the technology type.

ᵃ "Other" includes various combinations of satellite (GEO); satellite (LEO); cable; cellular; DSL; and other (for example, microwave and public Wi-Fi).

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-22-105024

 

Critical Infrastructure Protection: Education Should Take Additional Steps to Help Protect K-12 Schools from Cyber Threats

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-14-753

 

CLOUD COMPUTING: Additional Opportunities and Savings Need to Be Pursued

When using this photo, please attribute: * Photo by NEC Corporation of America with Creative Commons license.

 

NEC is the world leader in biometrics fingerprint and facial matching technology, with recognition from leading independent organizations such as U.S. National Institute of Standards and Technology (NIST). NEC’s extensive portfolio solutions range from mobile fingerprint identification, facial recognition to integrated workflow management solutions that provide extensive database matching capabilities across multiple organizations. Learn how some of the nation’s leading agencies trust NEC with their public safety solutions after attending the AFIS Internet Conference.

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-22-104560

 

Cybersecurity: Internet Architecture is Considered Resilient, but Federal Agencies Continue to Address Risks

 

When using this photo, please attribute: * Photo by NEC Corporation of America with Creative Commons license.

 

NEC is the world leader in biometrics fingerprint and facial matching technology, with recognition from leading independent organizations such as U.S. National Institute of Standards and Technology (NIST). NEC’s extensive portfolio solutions range from mobile fingerprint identification, facial recognition to integrated workflow management solutions that provide extensive database matching capabilities across multiple organizations. Learn how some of the nation’s leading agencies trust NEC with their public safety solutions after attending the AFIS Internet Conference.

When using this photo, please attribute: * Photo by NEC Corporation of America with Creative Commons license.

 

NEC is the world leader in biometrics fingerprint and facial matching technology, with recognition from leading independent organizations such as U.S. National Institute of Standards and Technology (NIST). NEC’s extensive portfolio solutions range from mobile fingerprint identification, facial recognition to integrated workflow management solutions that provide extensive database matching capabilities across multiple organizations. Learn how some of the nation’s leading agencies trust NEC with their public safety solutions after attending the AFIS Internet Conference.

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-21-52

 

BIOMEDICAL RESEARCH: NIH Should Publicly Report More Information about the Licensing of Its Intellectual Property

 

Notes: The effective periods of the 32 licenses ranged from 7 to 31 years. The figure does not reflect three licenses associated with drugs approved by the Food and Drug Administration (FDA) before NIH granted those licenses.

ᵃA single license can be associated with multiple products and vice versa.

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-13-187

 

Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented

  

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-15-119

 

IDENTITY THEFT AND TAX FRAUD: Enhanced Authentication Could Combat Refund Fraud, but IRS Lacks an Estimate of Costs, Benefits and Risks

 

Note: The figure above is shown for illustrative purposes; the actual distribution of IDT versus noncompliant returns from legitimate taxpayers is unknown. To develop the magnitude measures above, we divided IRS's highest and lowest AUR category estimate by the estimate IRS chose in filing season 2013. Using these two extremes would likely result in too broad of a range in IDT refunds paid estimates.

 

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-21-26SP

 

5G WIRELESS: Capabilities and Challenges for an Evolving Network

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-21-26SP

 

5G WIRELESS: Capabilities and Challenges for an Evolving Network

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-21-182

 

INFORMATION TECHNOLOGY: DOD Software Development Approaches and Cybersecurity Practices May Impact Cost and Schedule

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-17-569

 

PUBLIC-SAFETY BROADBAND NETWORK: FirstNet Has Made Progress Establishing the Network, but Should Address Stakeholder Concerns and Workforce Planning

 

a) Phase 1 goal begins with the award of the network contract and the initial task orders resulting from the contract. Goals for phases 2–6 begin with the award of each subsequent task order for the deployment of the state RANs.

b) Includes state data collected through September 2016.

c) Goals begin with the award of each task order for the deployment of the state RANs. Target goals are based on the total number of user devices on a network user contract proposed for Phase 5.

d) In this user density map, FirstNet aggregated stakeholder data (from states, territories, tribes, and federal agencies) with its own internal data to produce nationwide estimates of the demand for coverage by public safety users at the county level.

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-20-123

 

CYBERSECURITY: Selected Federal Agencies Need to Coordinate on Requirements and Assessments of States

 

Note: Not all respondents answered all survey questions. The figure is based on 46 responses.

WTC 1 & 2 - Drawing Book #2 - Drawings

Title: Exterior Wall Tree

 

70 sheets comprising of drawings and schedule notes of WTC 1 & 2 - Drawing Book #2.

 

Derived from FOIA record: WTCI-000012-L.PDF

71 pages in total.

First page depicts a cover sheet.

 

From NIST FOIA records.

Unknown FOIA log.

Requester: gerrycan1

Download source: archive.org/download/WTCI000722L/Drawing%20Book%202/book2...

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-18-198

 

TELECOMMUNICATIONS: FCC Should Improve Monitoring of Industry Efforts to Strengthen Wireless Network Resiliency

 

Note: "Other" includes outages caused by planned maintenance to upgrade a network or equipment failure (e.g., a failed circuit card).

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-15-80

 

ANTHRAX: Agency Approaches to Validation and Statistical Analyses Could Be Improved

 

Note: SNPs and INDELs (insertions or deletions) are small differences between genomes. A duplication is a kind of insertion where a specific sequence of the deoxyribonucleic acid (DNA) has been repeated. These changes in genetic sequence are an important part of evolution.

 

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-15-52

 

CONSUMER PRODUCT SAFETY OVERSIGHT: Opportunities Exist to Strengthen Coordination and Increase Efficiencies and Effectiveness

 

Note: CPSC noted that that size of each circle is not proportional to the size of each agency's budget. CPSC also stated that they interact with multiple centers within FDA and multiple offices and programs within EPA.

 

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-22-104364

 

Cybersecurity: OMB Should Update Inspector General Reporting Guidance to Increase Rating Consistency and Precision

 

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-15-6

 

FEDERAL FACILITY CYBERSECURITY: DHS and GSA Should Address Cyber Risk to Building and Access Control Systems

 

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-15-201

 

BORDER SECURITY: Additional Efforts Needed to Address Persistent Challenges in Achieving Radio Interoperability

 

Note: The customers within each Border Patrol sector include Office of Field Operations and Office of Air and Marine as well as Border Patrol.

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-21-104500

 

High-Performance Computing: Advances Made Towards Implementing the National Strategy, but Better Reporting and a More Detailed Plan Are Needed

 

ᵃNote: According to DOE officials, these funding estimates include site preparation and non-recurring engineering costs.

This image is excerpted from a U.S. GAO report:

www.gao.gov/products/GAO-15-6

 

FEDERAL FACILITY CYBERSECURITY: DHS and GSA Should Address Cyber Risk to Building and Access Control Systems

 

1 3 4 5 6 7 ••• 24 25