U.S. CODE
Rulings
AD/CVD
Notices
HTSUS
U.S. Code
Regs
More
Ports
About
Updates
Apps
Larger font
Smaller font
CustomsMobile Pro
beta now open!
Apply for a FREE beta account. Spaces are limited so apply today.
SIGNUP FOR BETA
SEARCH
Toggle Dropdown
Search US Code
Search Leg. Notes
Sort by Rank
Titles Ascending
Titles Descending
10 per page
25 Result/page
50 Result/page
U.S Code last checked for updates: Nov 22, 2024
All Titles
Title 42
Chapter 163
Subchapter III
Part F
§ 19083. Helium conservation...
§ 19085. National secure data se...
§ 19083. Helium conservation...
§ 19085. National secure data se...
U.S. Code
Notes
§ 19084.
Advanced computing
(a)
Computing needs
(b)
Reports
(c)
Roadmap
To set priorities and guide strategic decisions regarding investments in advanced computing capabilities, the Director shall develop, publish, and regularly update a 5-year advanced computing roadmap that—
(1)
describes the advanced computing resources and capabilities that would fully meet anticipated project needs, including through investments in the Mid-Scale Research Infrastructure program and the Major Research Equipment and Facilities Construction account;
(2)
draws on community input, information contained in research proposals, allocation requests, insights from Foundation-funded cyber-infrastructure operators, and Foundation-wide information gathering regarding community needs;
(3)
considers computational needs of planned major facilities;
(4)
reflects anticipated technology trends;
(5)
informs users and potential partners about future facilities and services;
(6)
addresses the needs of groups historically underrepresented in STEM and geographic regions with low availability and high demand for advanced computing resources;
(7)
considers how Foundation-supported advanced computing capabilities can be leveraged for activities through the Directorate for Technology, Innovation, and Partnerships; and
(8)
provides an update to Congress about the level of funding necessary to fully meet computational resource needs for the research community.
(d)
Securing American research from cyber theft
(1)
Omitted
(2)
Computing enclave pilot program
(A)
In general
(B)
Structure
(C)
Regionalization
(i)
In general
(ii)
Geographic dispersal
(D)
Program elements
The Director shall work with institutions of higher education selected pursuant to subparagraph (B) to—
(i)
develop an approved design blueprint for compliance with Federal data protection protocols;
(ii)
develop a comprehensive and confidential list, or a bill of materials, of each binary component of the software, firmware, or product that is required to deploy additional secure computing enclaves;
(iii)
develop templates for all policies and procedures required to operate the secure computing enclave in a research setting;
(iv)
develop a system security plan template; and
(v)
develop a process for managing a plan of action and milestones for the secure computing enclave.
(E)
Sustainability
(F)
Duration
(G)
Report
(i)
In general
(ii)
Contents
The report required under clause (i) shall include—
(I)
an assessment of the pilot program under subparagraph (A), including an assessment of the security benefits provided by such secure computing enclaves;
(II)
recommendations related to the value of expanding the network of secure computing enclaves; and
(III)
recommendations on the efficacy of the use of secure computing enclaves by other Federal agencies in a broader effort to expand security of Federal research.
(H)
Authorization of appropriations
(
Pub. L. 117–167, div. B, title III, § 10374
,
Aug. 9, 2022
,
136 Stat. 1571
.)
cite as:
42 USC 19084
.list_box li,p,.cm-search-info,.cm-search-detail,.abt span,.expand-collapse_top
Get the CustomsMobile app!