Search Results (344 titles)

Searched over 21.6 Million titles in 0.23 seconds

 
English (X) Technology (X) Non Fiction (X)

       
1
|
2
|
3
|
4
|
5
Records: 1 - 20 of 344 - Pages: 
  • Cover Image

Validate Digital Signature in Adobe : A Step by Step Guide with Snapshots

By: Pratik Kaushikkumar Kikani; Pratik Kaushikkumar Kikani

The book will show how to validate Digital Signature in Adobe reader. It covers two methods of validating along with snapshots of screen and step by step guidance....

“SIGNATURE IS WHAT YOU GET PAID FOR.” –Pratik Kikani

Index Content Page No E-book Page No Introduction 5-5 6-6 Few Basics of Digital Signature 6-7 7-8 Methods of Validating Sign-Brief 8-9 9-10 Which Method Suitable 10-10 11-11 Method 1 with Snapshots 11-16 12-17 Method 2 with Snapshots 17-28 18-29 Document after Validating Sign 29-29 30-30 ...

Read More
  • Cover Image

Ghidul Google SEO

By: Nicolae Sfetcu, Editor; Nicolae Sfetcu, Performer

Acest document a fost lansat iniţial ca un efort pentru a ajuta echipele Google, însă este la fel de util şi pentru webmasterii începători în domeniul optimizării pentru motoarele de căutare, şi care doresc să îmbunătăţească interacţiunea site-ului atât cu utilizatorii, cât şi cu motoarele de căutare. Deşi acest ghid nu vă va dezvălui niciun secret prin care site-ul dvs. să se claseze în mod automat primul pentru interogările de pe Google, respectarea celor mai bune practici prezentate mai jos va simplifica atât accesarea cu crawlere, cât şi indexarea conţinutului dvs. de motoarele de căutare....

Ghidul de iniţiere Google privind optimizarea pentru motoarele de căutare, Versiunea 1.1, 13 noiembrie 2008

Read More
  • Cover Image

X-15 Research Results

By: Wendell H. Stillwell

This semi-technical summary of the X–15 program is directed toward the less publicized aspects of its achievements.

Read More
  • Cover Image

Wright Flyer Paper : Unmanned Intratheater Airlift, Vol. 45

By: Major Kevin J. McGowan, USAF

This paper investigates the DOD’s tactical logistical challenges and each service’s tactical lift requirements, especially with respect to the movement of supplies from forward supply hubs to forward forces. To address these challenges and requirements, the author suggests the use of remotely piloted aircraft (RPA) as a potential solution. Focusing on existing and quickly emerging technologies as well as the joint operating requirements, the author proposes RPA performance and design characteristics along with a concept of employment that increases tactical lift capabilities and meets all current service requirements....

1 INTRODUCTION . . . .1 Notes . . . . . 12 2 OPERATIONAL REQUIREMENTS . . . .15 Notes . . . . 26 3 TECHNOLOGY REVIEW/PROOF OF CONCEPT . . .27 Notes . . . .41 4 PROPOSED SOLUTION . . . . 45 Notes . . . . .51 5 SYNOPSIS OF CONCEPT OF EMPLOYMENT . . . .53 Notes . . . . 59 6 CONCLUSION . . . . .61...

Read More
  • Cover Image

Failure to Launch : From Big Data to Big Decisions; Why velocity, variety and volume is not improving decision making and how to fix it

By: Forte Wares

The key to making big data initiatives a success lies within making the produced data more digestible and usable in decision making, rather than making it just ‘more,’ resulting in the creation of an environment wherein information is used to generate real impact. Put another way, the survival of Big Data is more about making the right data(not just higher volume) available to the right people (not just higher variety) at the right time (not just higher velocity)....

Read More
  • Cover Image

Using Visual SourceSafe : SourceSafe / VSS Tutorial, Volume 163: SourceSafe / VSS Tutorial

By: Kevin Gao

Although this SourceSafe tutorial can be used for anyone who is interested in SourceSafe, it is mainly for software developers. As you may have been using SourceSafe for a long time and know many features of VSS, I will try to make the table of the content easy to navigate so hopefully you can easily find the information that you are interested in....

In this SourceSafe How To series / tutorial, I will write some guides, How To and FAQs about SourceSafe and will also post resources I found on the internet. This series will cover some basic and intermediate topics of SourceSafe as well as some advanced topics....

Introduction _________________________________________________________ 4 What is VSS? ________________________________________________________ 5 Market position _______________________________________________________ 6 What can VSS do? ____________________________________________________ 7 History preserving _____________________________________________________________ 7 File Difference _________________________________________________________________ 8 Project/Folder Difference _______________________________________________________ 9 Easy Collaboration ____________________________________________________________ 10 Several Important Concepts ___________________________________________ 12 VSS Database/Repository _____________________________________________________ 12 Working Folder _______________________________________________________________ 12 Master Copy and Local Copy ___________________________________________________ 12 Basic operations ____________________________________________________ 13 Add _________________________________________________________________________ 13 Get _________________...

Read More
  • Cover Image

Wright Flyer Paper : How Small Is Too Small?; Technology into 2035, Vol. 46

By: Major Paul E. Kladitis, USAF

The Department of Defense (DOD) anticipates the realization of biomimetic bird and two-inch, insect-sized systems within the 2015–47 period. Although robot systems of one millimeter or smaller are not explicitly specified in current DOD and Air Force technology road maps, the technological aims towards this size can be clearly inferred from official documents. This research assesses the likelihood of, and barriers to, the realization of true microrobots and nanorobots (defined as submillimeter-sized robots of micro-meter and nanometer proportions, respectively) that can perform in military applications by 2035. This research finds that the realization of true microrobots for military applications by 2035 is unlikely, except for a single case of microrobots....

Read More
  • Cover Image

Wright Flyer Paper : Tracking Next–Generation Automatic Identification Technology into 2035, Vol. 46

By: Major Richard N Holifield, Jr., USAF

This paper explores the advances in automatic identification technology, specifically radio frequency identification, and seeks to exploit these capabilities for use in the Department of Defense (DOD) supply chain. Using technological trends, a thorough literature review, and the opinions of experts, the paper compares current technology to a 2035 requirements forecast to identify capability gaps. The end goal is logistics situational awareness, whereby the DOD has the ability to provide end-to-end visibility throughout its supply chain and can rapidly mobilize, deploy, sustain, and redeploy forces in support of national security objectives....

Read More
  • Cover Image

China in Space : Civilian and Military Developments

By: Colonel David J. Thompson, USAF; Lieutenant Colonel William R. Morris, USAF

Col Thompson, in his concentrated focus on China’s military space applications, examines PRC ground, space, counterspace, and space policy aspects. His principal findings: China has plans to construct a new launch site in the deep south; PRC telemetry, tracking and com-mand capacities are improving; China has the ability to conduct limited intelligence, surveillance and reconnaissance missions from space; the PRC is pursuing a counterspace capability most likely using satellite jammers and anti-satellites (possibly parasitic or nano-satellites). Col Thompson concludes that while China’s space program does not now constitute a global threat, the PRC is pursuing space capabilities that will increase its regional influence, and deny an adversary certain uses of space....

Read More
  • Cover Image

Wright Flyer Paper : Back to the Basics; An Aviation Solution to Counterinsurgent Warfare, Vol. 23

By: Major Arthur D. Davis, USAF

In this paper, I seek to demonstrate that the methods of using airpower to take the fight to the enemy and protect our ground forces during small wars need not involve the most advanced aircraft available. This “low-tech” approach does not suggest using lesser technology per se but proposes a different look for the types of aircraft that can perform a specific mission and for their manner of employment—that of protecting ground forces while combating the elusive insurgent. These same aircraft can prove invaluable in training an indigenous force to take the fight forward. By looking to relatively inexpensive, off-the-shelf aircraft, the Air Force can protect its ground-based charges and cement a relationship with embattled nations by helping them help themselves....

Read More
  • Cover Image

Mosquitoes to Wolves : The Evolution of the Airborne Forward Air Controller

By: Gary Robert Lester

By the end of the Vietnam War, advances in technology allowed these FACs to control strikes against targets at night, in bad weather, and with improved precision. Laser-guided weapons systems, new computer navigation equipment, and advanced ground radars combined to provide an effective and lethal capability. If the Mosquitoes were an annoyance in Korea, the Wolves of Vietnam proved to be a deadly addition to the concept of FAC....

Read More
  • Cover Image

Aviation Urban Operations : Are We Training Like We Fight?

By: Lieutenant Colonel, Todd G. Kemper, USMC

The author contends that urban terrain has become the preferred battlespace of US adversaries in the early twenty-first century. This environment poses unique challenges, especially to air and space warfare. The difficulty of sorting friendlies from enemy combatants, the latter intermingled with large numbers of noncombatants in very confined spaces, creates serious dilemmas for maneuver and aviation forces. Colonel Kemper believes that this mission, though well documented, has received neither the priority nor the resources necessary to ensure operational excellence and success on the modern battlefield. Thus, he not only inquires about whether we are training like we fight, but also seeks to determine what makes aviation urban operations so complicated and unique that they require stand-alone doctrine, tactics, techniques, and procedures....

Read More
  • Cover Image

Information Technology Tales

By: Brad Bradford

This book also begins with that wondrous first Information Technology and then moves on to tales about the wonders of the written word—great stories, many of them likely new to most readers. In them, you‘ll find all the backgrounds, foregrounds, premises, conclusions, and surprises that make up the best and most valuable books. This book also begins with that wondrous first Information Technology and then moves on to tales about the wonders of the written word—great stories, many of them likely new to most readers. In them, you‘ll find all the backgrounds, foregrounds, premises, conclusions, and surprises that make up the best and most valuable books. At sixty-four, I bring another full lifetime lived both at that exact moment where my experiences could straddle working in print shops and in the current digital eBook era.. My degree in human-computer interfaces in 1973 led to my appointment as adjunct professor at Benedictine University, where I built the world‘s first electronic library in 1988. You could walk into that library, and the first thing you‘d see was the computer asking if there were any books you wanted. You se...

Way back in the fifteenth century a man named Johann Gutenberg invented the ?printing press. More than 400 years passed before Ottmar Mergenthaler found a way in the late 1880s to mechanize that historic invention. Then, less than a century later – in the 1980s – digital printing displaced Mergenthaler’s wondrous Linotypes....

Read More
  • Cover Image

Technology and Military Doctrine

By: I.B. Holley

1 THE ROLE OF DOCTRINE . . . . . . . . . . . . . 1 2 THE DOCTRINAL PROCESS: SOME SUGGESTED STEPS . . . . . . . . . . . . . . . . . . .5 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3 CONCEPTS, DOCTRINES, PRINCIPLES . . . .19 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4 SOME SEMINAL THINKERS ON TECHNOLOGY AND DOCTRINE . . . . . . . . . . . . . 25 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 5 WEAPONS AND DOCTRINE: A HISTORICAL INTRODUCTION . . . . . . . . . . . . . . . . . . . 55 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 6 INSIGHTS ON TECHNOLOGY AND DOCTRINE . . . . . . . . . . . . . . . . . . . . . . . .79 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 7 OF SABER CHARGES, ESCORT FIGHTERS, AND SPACECRAFT: THE SEARCH FOR DOCTRINE . . . . . . . . . . . . . . . . . . . . . . . .91 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 106 8 LOOKING BACKWARD TO SEE AHEAD IN SPACE: REFLECTIONS ON THE NEED FOR SPACE DOCTRINE . . . . . . . . . . . . . . .109 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 119 9 A MO...

Read More
  • Cover Image

The Business of Domain Names

By: Nicolae Sfetcu

Business of buying, selling, developing and monetizing Internet domain names. On the Internet, the Domain Name System (DNS) associates various sorts of information with so-called domain names; most importantly, it serves as the “phone book” for the Internet: it translates human-readable computer hostnames. Domaining is the business of buying, selling, developing and monetizing Internet domain names. Such domain name portfolios often include cleverly chosen and highly marketable generic domain names, or domains whose registrations had lapsed yet still retain reasonable traffic. There is sometimes no actual intent to use any of the domain names with the exception of generating advertising revenue through domain parking. ...

Business of buying, selling, developing and monetizing Internet domain names.

Read More
  • Cover Image

Iritel Beograd - Company Product Catalogue : IRITEL OTP10G - OTN/DWDM 10G, ODS2G5 - SDH/SONET, OTS622 - SDH/SONET, SUNCE+, SUNCE-M NMS, IP ETHERNET TDM

By: Iritel Beograd

IRITEL (www.iritel.com) Company Product Catalogue - OTP10G - OTN/DWDM 10G Optical Transport Systems - ODS2G5 - SDH/SONET 2G5 Optical Transport Systems - OTS622 - SDH/SONET 622M Optical Transport Systems - SUNCE+ - NETWORK MANAGEMENT SYSTEM (NMS) FOR IRITEL OTN DWDM SDH SONET AND ACCESS SYSTEMS - SUNCE-M - NETWORK MANAGEMENT SYSTEM (NMS) FOR IRITEL SDH SONET AND ACCESS SYSTEMS - INTERFACE CONVERTERS TDM OVER IP, IP OVER TDM - TELECOMMUNICATION POWER SUPPLY - RADIO SYSTEMS...

IRITEL (www.iritel.com) Company Product Catalogue - OTP10G - OTN/DWDM 10G Optical Transport Systems - ODS2G5 - SDH/SONET 2G5 Optical Transport Systems - OTS622 - SDH/SONET 622M Optical Transport Systems - SUNCE+ - NETWORK MANAGEMENT SYSTEM (NMS) FOR IRITEL OTN DWDM SDH SONET AND ACCESS SYSTEMS - SUNCE-M - NETWORK MANAGEMENT SYSTEM (NMS) FOR IRITEL SDH SONET AND ACCESS SYSTEMS - INTERFACE CONVERTERS TDM OVER IP, IP OVER TDM - TELECOMMUNICATION POWER SUPPLY - RADIO SYSTEMS...

Read More
  • Cover Image

Seller Beware : US International Technology Transfer and Its Impact On National Security

By: Wayne M. Johnson, Lieutenant Colonel, USAF

In this important study, Lt Col Wayne Johnson, USAF, argues that systematic tightening of interagency cooperation and better work on defining sensitive technology prohibitions are needed to maintain the US technological edge. He also maintains that the US government requires a new and disciplined export control process—not the current mosaic of rules, regulations, and perspectives that came out of the cold war, but a process that provides a revamped, systemic approach with consistent implementation. Colonel Johnson explores the problem of defining which technologies the United States is willing to transfer(military or dual-use) and the need to ensure that national security objectives do not take a backseat to economic expediency. To accomplish this end, he argues for better interagency cooperation as a first step leading to a more centralized, coordinated, and strategic view of technology transfer and how it impacts US national security....

Read More
  • Cover Image

Taking Down Telecommunications

By: Major Gerald R. Hust, USAF

Information is one of the most, if not the most, essential elements of combat capability. Because telecommunications affects every aspect of a society, and is probably the most important medium which military information is exchanged, this thesis provides an understanding of the telecommunications system and how best to exploit it across the spectrum of conflict. I examine the system’s vulnerabilities to both lethal and nonlethal attack mechanisms. While the ability to employ nonlethal technologies are currently limited, I recommend pursuing a strong research and development program to acquire this capability. The reason is that they provide additional policy options to deal with conflict, they are cheap, and because research may not only discover unanticipated capabilities for the US, but also identify countermeasures to protect our own systems. This thesis concludes by offering guidelines to help determine whether to exploit telecommunications with either lethal or nonlethal attack strategies....

1 INTRODUCTION . . . 1 Notes . . . 3 2 TELECOMMUNICATIONS . . . . . 5 The Modern Communications System . . . . . 6 Vulnerability Analysis . . . . . . 17 Targeting . . . . 23 Quantification . . . . . 29 Conclusion . . . 32 Notes . . . 35 3 DISABLING WEAPONS . . . . . . 38 Definition . . . . . 39 History And Legal Considerations . . . . . 41 Conventional And Disabling Kill Mechanisms . . . 44 Advantages/Disadvantages . . . . . . 49 Conclusion . . . . 53 Notes . . . . 55 4 GUIDANCE FOR CAMPAIGN PLANNING . . . . . . 57 Planning Factors . . . . 57 Conclusion . . . . . 61 Notes . . . . . 62...

Read More
  • Cover Image

Strategic Attack of National Electrical Systems

By: Major Thomas E. Griffith, Jr., USAF

The United States Air Force has long favored attacking electrical power systems.Electric power has been considered a critical target in every war since World War II,and will likely be nominated in the future. Historically, there have been four basic strategies behind attacks on national electrical systems: to cause a decline in civilian morale; to inflict costs on the political leaders to induce a change; to hamper military operations; and to hinder war production. The evidence shows that the only sound reason for attacking electrical power is to effect the production of war material in a war of attrition against a self-supporting nation-state without outside assistance. The implication for future strategic air operations is important. Because attacks on electric power cause indirect collateral damage which can be politically counterproductive,and the military benefit is minimal, the United States should reject attacks on national electrical power systems in the near future....

1 INTRODUCTION . . . . 1 Notes . . . . . 3 2 NATIONAL ELECTRICAL POWER SYSTEMS . . . . 5 Generation . . . . . . 5 Transmission . . . . . 7 Distribution . . . . . . 8 Control . . . . 8 Effects . . . . . 10 Notes . . . . . 12 3 ELECTRICAL POWER TARGETING IN THE PAST— ATTACKS IN TOTAL WAR . . . . . . 15 World War II—Germany . . . 17 World War II—Japan . . . . . 22 United States Strategic Bombing Survey . . . . . . 25 Notes . . . . . 28 4 ELECTRICAL POWER TARGETING IN THE PAST— ATTACKS IN LIMITED WAR . . . . . 33 Korean War . . . . . . 33 Vietnam War . . . . . 37 Desert Storm . . . . . 41 Notes . . . . . 42 5 TARGETING ELECTRICAL POWER SYSTEMS . . . 45 Failures . . . . 45 When to Target Electric Power . . . 48 Conclusions and Implications . . . . 53 Notes . . . . . 54 BIBLIOGRAPHY . . . . 57...

Read More
  • Cover Image

Jumpstart to Software Quality Assurance : Volume First

By: Vishnuvarthanan Moorthy

Software Quality Assurance is a specialized activity and it contributes in building capable processes in organization. This book details the different knowledge areas and provides practical insight which is required for software quality analyst to quickly grasp and start being productive within days, and contributes to build such capable processes. This book details the basics of quality assurance, relevant techniques and methods used in quality assurance. What is in there? • A quick description of various knowledge areas in software quality assurance • Frequently used tools and techniques in Software quality assurance • Sample cases to understand the concepts Why this book? • A simple ready recknor for SQA • Mix of pragmatic and theoretical elaborations • Industry specific and current needs of Industry is taken care • Short book for quick read Who should read? • People who are interested in making a career in software quality assurance • Who are interested in understanding Quality assurance • Who are leading an organization and wants to set up the Quality assurance function ...

Audit Expectations: An audit is expected to check, does the Quality System meet the requirements of the relevant Quality System Standard/model or Contract? Does the organization do what the Quality System specifies? Is the Quality System, as implemented, effective in ensuring maintenance and improvement of the quality of products and services? Audit is not an alternative to an inspection operation and cannot serve as a crutch to an ineffective inspection or quality system Types of Audit: • First Party Audit (Internal Audits) • Second Party Audit (Customer Audits) • Third Party Audit (Audit Agencies) Horizontal and Vertical Audits: • Horizontal Audit - Assess same aspect in all projects. • Vertical Audit - Assess all aspects in one project • forward tracking • backward tracking • Hybrid Audits - Mixing Horizontal and Vertical Audits Audit Team: One or more auditors conducting an audit, supported if needed by Technical Experts. The auditors are lead by Lead Auditor. One or more auditees represent the function or the organization. Lead Auditor Responsibilities: (Second party and Third party audits) • Negotiate scope ...

Quality Fundamentals Quality Assurance Functions Lifecycle Models Project Management Configuration Management Software Estimation Risk and Issue Management Tailoring and Waivering Software Engineering - Development Service Management Reviews Metrics Core SQA Activities Quality Audits Quality Control Tools and Basic Statistics Standards (ISO 9001, 20000, 27001) and Models (CMMI, PCMM) Agile Scrum Earned Value Analysis Reference Sites ...

Read More
       
1
|
2
|
3
|
4
|
5
Records: 1 - 20 of 344 - Pages: 
 
 





Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.