Search Results (148 titles)

Searched over 21.6 Million titles in 7.21 seconds

 
English (X) Technology (X) Most Popular Books in China (X) Non Fiction (X)

       
1
|
2
|
3
|
4
|
5
Records: 1 - 20 of 148 - Pages: 
  • Cover Image

X-15 Research Results

By: Wendell H. Stillwell

This semi-technical summary of the X–15 program is directed toward the less publicized aspects of its achievements.

Read More
  • Cover Image

Failure to Launch : From Big Data to Big Decisions; Why velocity, variety and volume is not improving decision making and how to fix it

By: Forte Wares

The key to making big data initiatives a success lies within making the produced data more digestible and usable in decision making, rather than making it just ‘more,’ resulting in the creation of an environment wherein information is used to generate real impact. Put another way, the survival of Big Data is more about making the right data(not just higher volume) available to the right people (not just higher variety) at the right time (not just higher velocity)....

Read More
  • Cover Image

Using Visual SourceSafe : SourceSafe / VSS Tutorial, Volume 163: SourceSafe / VSS Tutorial

By: Kevin Gao

Although this SourceSafe tutorial can be used for anyone who is interested in SourceSafe, it is mainly for software developers. As you may have been using SourceSafe for a long time and know many features of VSS, I will try to make the table of the content easy to navigate so hopefully you can easily find the information that you are interested in....

In this SourceSafe How To series / tutorial, I will write some guides, How To and FAQs about SourceSafe and will also post resources I found on the internet. This series will cover some basic and intermediate topics of SourceSafe as well as some advanced topics....

Introduction _________________________________________________________ 4 What is VSS? ________________________________________________________ 5 Market position _______________________________________________________ 6 What can VSS do? ____________________________________________________ 7 History preserving _____________________________________________________________ 7 File Difference _________________________________________________________________ 8 Project/Folder Difference _______________________________________________________ 9 Easy Collaboration ____________________________________________________________ 10 Several Important Concepts ___________________________________________ 12 VSS Database/Repository _____________________________________________________ 12 Working Folder _______________________________________________________________ 12 Master Copy and Local Copy ___________________________________________________ 12 Basic operations ____________________________________________________ 13 Add _________________________________________________________________________ 13 Get _________________...

Read More
  • Cover Image

Wright Flyer Paper : How Small Is Too Small?; Technology into 2035, Vol. 46

By: Major Paul E. Kladitis, USAF

The Department of Defense (DOD) anticipates the realization of biomimetic bird and two-inch, insect-sized systems within the 2015–47 period. Although robot systems of one millimeter or smaller are not explicitly specified in current DOD and Air Force technology road maps, the technological aims towards this size can be clearly inferred from official documents. This research assesses the likelihood of, and barriers to, the realization of true microrobots and nanorobots (defined as submillimeter-sized robots of micro-meter and nanometer proportions, respectively) that can perform in military applications by 2035. This research finds that the realization of true microrobots for military applications by 2035 is unlikely, except for a single case of microrobots....

Read More
  • Cover Image

Wright Flyer Paper : Tracking Next–Generation Automatic Identification Technology into 2035, Vol. 46

By: Major Richard N Holifield, Jr., USAF

This paper explores the advances in automatic identification technology, specifically radio frequency identification, and seeks to exploit these capabilities for use in the Department of Defense (DOD) supply chain. Using technological trends, a thorough literature review, and the opinions of experts, the paper compares current technology to a 2035 requirements forecast to identify capability gaps. The end goal is logistics situational awareness, whereby the DOD has the ability to provide end-to-end visibility throughout its supply chain and can rapidly mobilize, deploy, sustain, and redeploy forces in support of national security objectives....

Read More
  • Cover Image

China in Space : Civilian and Military Developments

By: Colonel David J. Thompson, USAF; Lieutenant Colonel William R. Morris, USAF

Col Thompson, in his concentrated focus on China’s military space applications, examines PRC ground, space, counterspace, and space policy aspects. His principal findings: China has plans to construct a new launch site in the deep south; PRC telemetry, tracking and com-mand capacities are improving; China has the ability to conduct limited intelligence, surveillance and reconnaissance missions from space; the PRC is pursuing a counterspace capability most likely using satellite jammers and anti-satellites (possibly parasitic or nano-satellites). Col Thompson concludes that while China’s space program does not now constitute a global threat, the PRC is pursuing space capabilities that will increase its regional influence, and deny an adversary certain uses of space....

Read More
  • Cover Image

Jumpstart to Software Quality Assurance : Volume First

By: Vishnuvarthanan Moorthy

Software Quality Assurance is a specialized activity and it contributes in building capable processes in organization. This book details the different knowledge areas and provides practical insight which is required for software quality analyst to quickly grasp and start being productive within days, and contributes to build such capable processes. This book details the basics of quality assurance, relevant techniques and methods used in quality assurance. What is in there? • A quick description of various knowledge areas in software quality assurance • Frequently used tools and techniques in Software quality assurance • Sample cases to understand the concepts Why this book? • A simple ready recknor for SQA • Mix of pragmatic and theoretical elaborations • Industry specific and current needs of Industry is taken care • Short book for quick read Who should read? • People who are interested in making a career in software quality assurance • Who are interested in understanding Quality assurance • Who are leading an organization and wants to set up the Quality assurance function ...

Audit Expectations: An audit is expected to check, does the Quality System meet the requirements of the relevant Quality System Standard/model or Contract? Does the organization do what the Quality System specifies? Is the Quality System, as implemented, effective in ensuring maintenance and improvement of the quality of products and services? Audit is not an alternative to an inspection operation and cannot serve as a crutch to an ineffective inspection or quality system Types of Audit: • First Party Audit (Internal Audits) • Second Party Audit (Customer Audits) • Third Party Audit (Audit Agencies) Horizontal and Vertical Audits: • Horizontal Audit - Assess same aspect in all projects. • Vertical Audit - Assess all aspects in one project • forward tracking • backward tracking • Hybrid Audits - Mixing Horizontal and Vertical Audits Audit Team: One or more auditors conducting an audit, supported if needed by Technical Experts. The auditors are lead by Lead Auditor. One or more auditees represent the function or the organization. Lead Auditor Responsibilities: (Second party and Third party audits) • Negotiate scope ...

Quality Fundamentals Quality Assurance Functions Lifecycle Models Project Management Configuration Management Software Estimation Risk and Issue Management Tailoring and Waivering Software Engineering - Development Service Management Reviews Metrics Core SQA Activities Quality Audits Quality Control Tools and Basic Statistics Standards (ISO 9001, 20000, 27001) and Models (CMMI, PCMM) Agile Scrum Earned Value Analysis Reference Sites ...

Read More
  • Cover Image

Get Started with Video Captioning : A Beginner's Guide to Making Video Accessible: A Beginner's Guide to Making Video Accessible

By: Patrick Joseph Besong

Have a video that you need to make accessible, but don't have a clue how to start? This book will get you up and running in no time. It will show you how in layman's language how to go about the task of closed captioning your videos, what the different formats are, what software to use, and will also go over the basic style guidelines in creating captioned videos....

Captioning video not only makes video accessible to the deaf and hard-of-hearing, but there are other compelling reasons for it as well. These are also good talking points to convince others of the need to caption video. • Captioned videos have better user retention of the video content. • The video’s transcripts are searchable, so you will get better Search Engine Optimization (SEO), which may give you a leg up on your competition. • Captioned video also opens your market reach to a whole new segment of paying customers - the deaf! • It’s the law. Many videos that are provided to the public must be captioned either due to federal communication law, or merely a company’s policy regarding accessibility. • Language learning relies heavily on captioned video. • If the viewer is in a noisy area and does not have access to headphones, the captions can be read while watching the video. • Similarly, if the viewer does not have headphones and cannot turn up the volume due to the need to keep noise to a minimum (like in a library or nursery), the captions are there to provide what is being spoken....

Preface 1. Why Caption Video? 2. Captioning Formats 3. Helpful Software 4. Captioning Style Guide Helpful Video Captioning Related Links About the Author...

Read More
  • Cover Image

Affiliate Assassin to Create Targeted Affiliate Marketing Campaigns : Affiliate Assassin, Volume 84: Affiliate Assassin

By: Jeffrey Benson

Discover how to create laser targeted affiliate marketing campaigns

you can literally start making money online in a matter of a few days, even a few hours.

INTRODUCTION TO AFFILIATE ASSASSIN 3 CHOOSING THE RIGHT PRODUCTS 4 MONEY WITH REVIEW SITES 13 CATER TO HUNGRY BUYERS 13 HOW TO MAKE MONEY WITH AN AMAZON REVIEW SITE 19 MAKING MONEY WITH CPA OFFERS 22 LIST BUILDING PROFIT PLAN 27 THE TOOLS YOU NEED 28 CREATING A HIGH CONVERTING SQUEEZE PAGE 36 INCENTIVE OFFERS: UP CLOSE 41 PROMOTING YOUR SQUEEZE PAGE FOR MAXIMUM PROFITS 42 LIST BUILDING OVERVIEW 49 QUICK AFFILIATE CASH STRATEGIES 51 DESPERATE MARKET PROFITS 55 LAUNCHING YOUR CAMPAIGNS 65 KEYWORD RESEARCH MADE EASY 66 MARKETING YOUR AFFILIATE CAMPAIGNS 72 GENERATE TRAFFIC FROM BACKLINKS 75 GENERATE TRAFFIC FROM SOCIAL MEDIA SITES 78 GENERATE TRAFFIC FROM DIRECTORIES 80 ...

Read More
  • Cover Image

Facebook Marketing Profit Masters : Learn the Most Profitable Strategies to Profit from Facebook: Learn the Most Profitable Strategies to Profit from Facebook

By: David Drummy Lewis, Mr.

***Learn proven strategies to earn passive income using Facebook. A step by step process to profit from Facebook while helping people.*** You need this training! Also i encourage you to download and share this free guide with your friends. Thank you ...

Read More
  • Cover Image

Unmanned Space Project Management : Surveyor and Lunar Orbiter: Surveyor and Lunar Orbiter

By: Erasmus H. Kloman

NASA commissioned a study of the management of the Surveyor and Lunar Orbiter projects.

Read More
  • Cover Image

Technology Horizons : A Vision for Air Force Science and Technology 2010–30, Vol. 1

By: Office of the US Air Force Chief Scientist

Technology Horizons is our vision for key Air Force science and technology investments over the next decade that will provide us with truly game-changing capabilities to meet our strategic and joint force responsibilities. The coming decades hold high promise for amazing new capabilities across the air, space, and cyber domains. Yet the Air Force and our nation will also be confronted with substantial strategic, technology, and budget challenges. Our greatest advances will come with a focused investment of resources in the most promising technologies. The vision in Technology Horizons provides the shared awareness of the challenges and opportunities that will enable us to achieve this focus....

LIST OF ILLUSTRATIONS . . . . . vii FOREWORD BY THE SECRETARY OF THE AIR FORCE AND CHIEF OF STAFF OF THE AIR FORCE . . . . ix PREFACE BY THE CHIEF SCIENTIST OF THE AIR FORCE . . . . xi ACKNOWLEDGMENTS . . . . xv EXECUTIVE SUMMARY . . . . . xvii 1 INTRODUCTION . . . . 1 A Vision for Air Force Science and Technology 2010–30 . . . . 1 Lessons Learned from Prior Air Force Science and Technology Visions . . . . 5 Organization and Conduct of Technology Horizons . . . . . 8 Organization of Results from Technology Horizons . . . . . 14 Caveats . . . . 16 2 STRATEGIC CONTEXT FOR AIR FORCE S&T 2010–30 . . . . . 19 Relation to National Security Objectives . . . . . 21 Technology-Derived Challenges to Air Force Capabilities . . . . . 22 Strategic Implications of S&T Globalization . . . . 38 Federal Budget Implications for Air Force S&T Strategy . . . . . 41 3 ENDURING REALITIES FOR THE AIR FORCE 2010–30 . . . . . 43 Ensuring Interoperability with Legacy Systems . . . . 43 Sustainment Costs for Legacy Systems . . . . . 43 Importance of Low-Observable Systems . . . . 44 Energy Costs and Availability . . . . . 44 Growing Role ...

Read More
  • Cover Image

Build-to-shelve Prototyping : Undercutting Doctrinal Development

By: Lieutenant Colonel Donald “Bud” Vazquez, USAF

I submit there are two ways we can use limited numbers of prototype systems to ensure we learn relevant tactical lessons before we have to fight:(1) capitalizing on interactive computing technologies to better develop requirements and tactics throughout the system life cycle and (2) changing our concept of prototypes from the buying of one or two “experimental”items to procuring entire “prototypical” units....

1 SETTING THE STAGE . . . . 1 Background . . . . . 1 Methodology . . . . 2 Military Doctrine: Definitions and Types . . . . . 3 Notes . . . . 5 2 DEVELOPING ROBUST EMPLOYMENT DOCTRINE . . . . 7 Why Employment Doctrine Matters . . . . 7 How Employment Doctrine Develops . . . . . 8 Combat-Capable versus Combat-Lethal Doctrine . . . . . 11 Notes . . . . 13 3 DOCUMENTING DOCTRINAL LAG . . . . 15 The YB-17 and Refining Doctrine under Fire . . . . . 15 Modern Perspectives . . . . 18 Notes . . . . 21 4 CRITIQUING THE YOCKEY POLICY . . . . . 23 The Fallacy of Strategic Warning . . . . . 23 We Can’t Predict What We’ll Need . . . . . 25 Summarizing the Policy Critique . . . . . 27 Notes . . . . 27 5 POTENTIAL SOLUTIONS . . . . 29 Interactive Simulation for Employment Doctrine . . . . . 29 Prototypical Units . . . . . 32 Historical Perspective . . . . . 33 Notes . . . . 33 6 CONCLUSION . . . . 35 Notes . . . . 37 BIBLIOGRAPHY . . . . . 39...

Read More
  • Cover Image

To War on Tubing and Canvas : A Case Study in the Interrelationships between Technology, Training, Doctrine and Organization

By: Lieutenant Colonel Jonathan C. Noetzel, USAF

The study reviews each force’s combat glider experience and analyzes it in light of the glider doctrine, or lack thereof, with which each began the war. While military cargo gliders have seen their day, recent technological advances in gliders make them a viable platform for certain missions requiring stealth and silence....

ABSTRACT ii INTRODUCTION 1 PRE-WAR DEVELOPMENT 3 The Early Years in Germany 3 Early Gliders in the US 4 A US Military Glider? For What Purpose? 4 Gliders Head Into Combat. 5 Come Join the Glider pilot Corps! 8 Glider pilot Training Shortfalls 9 Military Gliders in Britain 12 OPERATIONAL USE OF GLIDERS 13 Germany 13 Early Commando Raids 14 Crete 15 Other Operations 16 US and Great Britain 17 Sicily 17 British Gliders are First to Normandy 24 US Glider Pilots Join the War in France 20 Disappointment at Arnhem 22 Operation Market 22 Glider Success Over the Rhine? 23 Operation Dragoon 24 US Commando Operations in Burma 25 Summation 26 POST-WAR GLIDER POLICY 27 TECHNOLOGICAL ADVANCES IN GLIDERS 29 TODAY’S LIMITED MILITARY ROLE FOR GLIDERS 31 CONCLUSIONS 32 NOTES 36 BIBLIOGRAPHY 42...

Read More
  • Cover Image

Improving the Management of an Air Campaign with Virtual Reality

By: Major James E. Haywood, USAF

This thesis evaluates the near-term military utility of virtual reality (VR) and its component technologies to the battle management of an air campaign. It presumes a large-scale air campaign on the order to that in the Gulf War where air operations were continuous, prolonged, and intense. The research concludes by assessing the viability and implication of a military decision to invest in a VR-enhanced air battle management system. Recommendations are given for areas in need of further research and development....

Read More
  • Cover Image

Vital Interests, Virtual Threats : Reconciling International Law with Information Warfare and United States Security

By: Major Karl J. Shawhan, USAF

This study examines the history of technology and sovereignty, which reveals a model for the evolution of international law. Specifically, the history of sea, air, and space provides examples on past issues of sovereignty. A three-stage pat-tern of international law emerges. Under the assumption that sovereignty issues related to information warfare will follow the same path, the current state of sovereignty regarding information is established. To focus the study, a functional outline for international convention, the International Regime for Information Security (IRIS), is advanced. IRIS balances US domestic privacy needs with US national security demands. Specifically, technology issues regarding digital identification and encryption are weighed against civil liberties and intelligence needs....

1 INTRODUCTION . . . . . . 1 Notes . . . . . . . 7 2 INTERNATIONAL LAW . . . . 9 Notes . . . . . . . 16 3 INFORMATION RELIANCE . . . . . 19 Notes . . . . . . . 28 4 STATUS QUO—CYBERLITIGATION . . . . . 31 Notes . . . . . . . 36 5 THE INTERNATIONAL REGIME FOR INFORMATION SECURITY MODEL. . . .39 Notes . . . . . . . 47 6 THE FUTURE . . . . . . 49 Notes . . . . . . . 56...

Read More
  • Cover Image

Seller Beware : US International Technology Transfer and Its Impact On National Security

By: Wayne M. Johnson, Lieutenant Colonel, USAF

In this important study, Lt Col Wayne Johnson, USAF, argues that systematic tightening of interagency cooperation and better work on defining sensitive technology prohibitions are needed to maintain the US technological edge. He also maintains that the US government requires a new and disciplined export control process—not the current mosaic of rules, regulations, and perspectives that came out of the cold war, but a process that provides a revamped, systemic approach with consistent implementation. Colonel Johnson explores the problem of defining which technologies the United States is willing to transfer(military or dual-use) and the need to ensure that national security objectives do not take a backseat to economic expediency. To accomplish this end, he argues for better interagency cooperation as a first step leading to a more centralized, coordinated, and strategic view of technology transfer and how it impacts US national security....

Read More
  • Cover Image

Science and Technology : The Making of the Air Force Research Laboratory

By: Robert W. Duffner

Part 1 The Decision 1 Introduction . . . . . . . . . . . . . . . . . . . 3 2 Rumblings of Laboratory Consolidation . . . 7 3 The Catalyst: National Defense Authorization Act and Vision 21 . . . . . . . . .23 4 Overhauling Infrastructure . . . . . . . . . . . 45 5 Laboratory Studies and Strategy . . . . . . . 71 6 Corona 1996: Leadership and Decisions . .93 7 The Last Dance: Meeting in the Secretary’s Office . . . . . . . . . . . . . . . . . . . . . . . . . . 115 8 Conclusion . . . . . . . . . . . . . . . . . . . . 129 Part 2 The Transition 9 Early Strategic Planning . . . . . . . . . . . . 137 10 Shaping the Technology Directorates . . 161 11 Getting the Message Out . . . . . . . . . . 195 12 Other Perspectives: Independent Review Teams . . . . . . . . . . . . . . . . . . . . . . . .209 13 Headquarters: Two Staff Directorates . . 227 14 The Final Push . . . . . . . . . . . . . . . . . .253 15 Conclusion . . . . . . . . . . . . . . . . . . . . 265...

Read More
  • Cover Image

Combat Operations C3I : Fundamentals and Interactions

By: George E. Orr

Unfortunately, the existence of command, control, communications, and intelligence (C3I) structures, mechanisms, systems, and capabilities does not guarantee success. Major Orr attacks the basic problem of producing a conceptual model of the combat operations process. Only after he establishes the context, a paradigm of warfare based on classical literature, does he discuss the appropriate C3I architecture that will yield the desired results. In a larger sense, Major Orr’s study is an attempt to redefine the nature of modern technology-intensive warfare. This is a broad and contentious problem. While the reader may not agree with all of Major Orr’s assumptions and conclusions, this larger effort is vital to the American military’s capability to cope successfully with a rapidly changing and increasingly dangerous world. In this larger sense, the importance of Major Orr’s study goes far beyond the particular problems of C3I....

I COMBAT OPERATIONS . . . . . . . . . . . . . . . 1 Sun Tzu . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Objectives of War . . . . . . . . . . . . . . . . . 2 Civil-Military Relationships . . . . . . . . . . 2 Principles of War . . . . . . . . . . . . . . . . . 3 Tactical Principles . . . . . . . . . . . . . . . . 4 Carl von Clausewitz . . . . . . . . . . . . . . . . . 6 Andre Beaufre . . . . . . . . . . . . . . . . . . . . . 14 The American Style of War . . . . . . . . . . . . 22 The Traditional Approach . . . . . . . . . . . 22 Maneuver Warfare . . . . . . . . . . . . . . . . 24 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 II C3I AND THE COMBAT OPERATIONS PROCESS . . . . . . . . . . . . . . . . . . . . . . . .31 Command, Control, Communications, and Intelligence (C3I) . . . . . . . . . . . . . . . . . . .31 The Combat Operations Process Model . . . .34 Expansion of the Process Model Functions . .37 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 III COMMAND OF THE COMBAT OPERATIONS PROCESS . . . . . . . . . . . . . . . . . . . . . . . . 61 The Purpose of Command . . . ....

Read More
  • Cover Image

The F-22 : The Right Fighter for the Twenty-first Century?

By: Michael J. Costigan

In this study Lt Col Michael J. Costigan, USAF, takes a critical look at the F-22 and its role in our military strategy in the twenty-first century. Its innovative technologies provide the F-22 with supercruise, stealth, and integrated avionics, and enable it to guarantee the air superiority so necessary to victory....

Read More
       
1
|
2
|
3
|
4
|
5
Records: 1 - 20 of 148 - Pages: 
 
 





Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.