Search Results (161 titles)

Searched over 21.6 Million titles in 0.23 seconds

 
History (X) Technology (X) Non Fiction (X)

       
1
|
2
|
3
|
4
|
5
Records: 1 - 20 of 161 - Pages: 
  • Cover Image

Wright Flyer Paper : Unmanned Intratheater Airlift, Vol. 45

By: Major Kevin J. McGowan, USAF

This paper investigates the DOD’s tactical logistical challenges and each service’s tactical lift requirements, especially with respect to the movement of supplies from forward supply hubs to forward forces. To address these challenges and requirements, the author suggests the use of remotely piloted aircraft (RPA) as a potential solution. Focusing on existing and quickly emerging technologies as well as the joint operating requirements, the author proposes RPA performance and design characteristics along with a concept of employment that increases tactical lift capabilities and meets all current service requirements....

1 INTRODUCTION . . . .1 Notes . . . . . 12 2 OPERATIONAL REQUIREMENTS . . . .15 Notes . . . . 26 3 TECHNOLOGY REVIEW/PROOF OF CONCEPT . . .27 Notes . . . .41 4 PROPOSED SOLUTION . . . . 45 Notes . . . . .51 5 SYNOPSIS OF CONCEPT OF EMPLOYMENT . . . .53 Notes . . . . 59 6 CONCLUSION . . . . .61...

Read More
  • Cover Image

Technology and Military Doctrine

By: I.B. Holley

1 THE ROLE OF DOCTRINE . . . . . . . . . . . . . 1 2 THE DOCTRINAL PROCESS: SOME SUGGESTED STEPS . . . . . . . . . . . . . . . . . . .5 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3 CONCEPTS, DOCTRINES, PRINCIPLES . . . .19 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4 SOME SEMINAL THINKERS ON TECHNOLOGY AND DOCTRINE . . . . . . . . . . . . . 25 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 5 WEAPONS AND DOCTRINE: A HISTORICAL INTRODUCTION . . . . . . . . . . . . . . . . . . . 55 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 6 INSIGHTS ON TECHNOLOGY AND DOCTRINE . . . . . . . . . . . . . . . . . . . . . . . .79 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 7 OF SABER CHARGES, ESCORT FIGHTERS, AND SPACECRAFT: THE SEARCH FOR DOCTRINE . . . . . . . . . . . . . . . . . . . . . . . .91 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 106 8 LOOKING BACKWARD TO SEE AHEAD IN SPACE: REFLECTIONS ON THE NEED FOR SPACE DOCTRINE . . . . . . . . . . . . . . .109 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 119 9 A MO...

Read More
  • Cover Image

Using Visual SourceSafe : SourceSafe / VSS Tutorial, Volume 163: SourceSafe / VSS Tutorial

By: Kevin Gao

Although this SourceSafe tutorial can be used for anyone who is interested in SourceSafe, it is mainly for software developers. As you may have been using SourceSafe for a long time and know many features of VSS, I will try to make the table of the content easy to navigate so hopefully you can easily find the information that you are interested in....

In this SourceSafe How To series / tutorial, I will write some guides, How To and FAQs about SourceSafe and will also post resources I found on the internet. This series will cover some basic and intermediate topics of SourceSafe as well as some advanced topics....

Introduction _________________________________________________________ 4 What is VSS? ________________________________________________________ 5 Market position _______________________________________________________ 6 What can VSS do? ____________________________________________________ 7 History preserving _____________________________________________________________ 7 File Difference _________________________________________________________________ 8 Project/Folder Difference _______________________________________________________ 9 Easy Collaboration ____________________________________________________________ 10 Several Important Concepts ___________________________________________ 12 VSS Database/Repository _____________________________________________________ 12 Working Folder _______________________________________________________________ 12 Master Copy and Local Copy ___________________________________________________ 12 Basic operations ____________________________________________________ 13 Add _________________________________________________________________________ 13 Get _________________...

Read More
  • Cover Image

Mosquitoes to Wolves : The Evolution of the Airborne Forward Air Controller

By: Gary Robert Lester

By the end of the Vietnam War, advances in technology allowed these FACs to control strikes against targets at night, in bad weather, and with improved precision. Laser-guided weapons systems, new computer navigation equipment, and advanced ground radars combined to provide an effective and lethal capability. If the Mosquitoes were an annoyance in Korea, the Wolves of Vietnam proved to be a deadly addition to the concept of FAC....

Read More
  • Cover Image

Information Technology Tales

By: Brad Bradford

This book also begins with that wondrous first Information Technology and then moves on to tales about the wonders of the written word—great stories, many of them likely new to most readers. In them, you‘ll find all the backgrounds, foregrounds, premises, conclusions, and surprises that make up the best and most valuable books. This book also begins with that wondrous first Information Technology and then moves on to tales about the wonders of the written word—great stories, many of them likely new to most readers. In them, you‘ll find all the backgrounds, foregrounds, premises, conclusions, and surprises that make up the best and most valuable books. At sixty-four, I bring another full lifetime lived both at that exact moment where my experiences could straddle working in print shops and in the current digital eBook era.. My degree in human-computer interfaces in 1973 led to my appointment as adjunct professor at Benedictine University, where I built the world‘s first electronic library in 1988. You could walk into that library, and the first thing you‘d see was the computer asking if there were any books you wanted. You se...

Way back in the fifteenth century a man named Johann Gutenberg invented the ?printing press. More than 400 years passed before Ottmar Mergenthaler found a way in the late 1880s to mechanize that historic invention. Then, less than a century later – in the 1980s – digital printing displaced Mergenthaler’s wondrous Linotypes....

Read More
  • Cover Image

Airpower in Three Wars

By: William W. Momyer
Read More
  • Cover Image

Build-to-shelve Prototyping : Undercutting Doctrinal Development

By: Lieutenant Colonel Donald “Bud” Vazquez, USAF

I submit there are two ways we can use limited numbers of prototype systems to ensure we learn relevant tactical lessons before we have to fight:(1) capitalizing on interactive computing technologies to better develop requirements and tactics throughout the system life cycle and (2) changing our concept of prototypes from the buying of one or two “experimental”items to procuring entire “prototypical” units....

1 SETTING THE STAGE . . . . 1 Background . . . . . 1 Methodology . . . . 2 Military Doctrine: Definitions and Types . . . . . 3 Notes . . . . 5 2 DEVELOPING ROBUST EMPLOYMENT DOCTRINE . . . . 7 Why Employment Doctrine Matters . . . . 7 How Employment Doctrine Develops . . . . . 8 Combat-Capable versus Combat-Lethal Doctrine . . . . . 11 Notes . . . . 13 3 DOCUMENTING DOCTRINAL LAG . . . . 15 The YB-17 and Refining Doctrine under Fire . . . . . 15 Modern Perspectives . . . . 18 Notes . . . . 21 4 CRITIQUING THE YOCKEY POLICY . . . . . 23 The Fallacy of Strategic Warning . . . . . 23 We Can’t Predict What We’ll Need . . . . . 25 Summarizing the Policy Critique . . . . . 27 Notes . . . . 27 5 POTENTIAL SOLUTIONS . . . . 29 Interactive Simulation for Employment Doctrine . . . . . 29 Prototypical Units . . . . . 32 Historical Perspective . . . . . 33 Notes . . . . 33 6 CONCLUSION . . . . 35 Notes . . . . 37 BIBLIOGRAPHY . . . . . 39...

Read More
  • Cover Image

To War on Tubing and Canvas : A Case Study in the Interrelationships between Technology, Training, Doctrine and Organization

By: Lieutenant Colonel Jonathan C. Noetzel, USAF

The study reviews each force’s combat glider experience and analyzes it in light of the glider doctrine, or lack thereof, with which each began the war. While military cargo gliders have seen their day, recent technological advances in gliders make them a viable platform for certain missions requiring stealth and silence....

ABSTRACT ii INTRODUCTION 1 PRE-WAR DEVELOPMENT 3 The Early Years in Germany 3 Early Gliders in the US 4 A US Military Glider? For What Purpose? 4 Gliders Head Into Combat. 5 Come Join the Glider pilot Corps! 8 Glider pilot Training Shortfalls 9 Military Gliders in Britain 12 OPERATIONAL USE OF GLIDERS 13 Germany 13 Early Commando Raids 14 Crete 15 Other Operations 16 US and Great Britain 17 Sicily 17 British Gliders are First to Normandy 24 US Glider Pilots Join the War in France 20 Disappointment at Arnhem 22 Operation Market 22 Glider Success Over the Rhine? 23 Operation Dragoon 24 US Commando Operations in Burma 25 Summation 26 POST-WAR GLIDER POLICY 27 TECHNOLOGICAL ADVANCES IN GLIDERS 29 TODAY’S LIMITED MILITARY ROLE FOR GLIDERS 31 CONCLUSIONS 32 NOTES 36 BIBLIOGRAPHY 42...

Read More
  • Cover Image

Improving the Management of an Air Campaign with Virtual Reality

By: Major James E. Haywood, USAF

This thesis evaluates the near-term military utility of virtual reality (VR) and its component technologies to the battle management of an air campaign. It presumes a large-scale air campaign on the order to that in the Gulf War where air operations were continuous, prolonged, and intense. The research concludes by assessing the viability and implication of a military decision to invest in a VR-enhanced air battle management system. Recommendations are given for areas in need of further research and development....

Read More
  • Cover Image

Vital Interests, Virtual Threats : Reconciling International Law with Information Warfare and United States Security

By: Major Karl J. Shawhan, USAF

This study examines the history of technology and sovereignty, which reveals a model for the evolution of international law. Specifically, the history of sea, air, and space provides examples on past issues of sovereignty. A three-stage pat-tern of international law emerges. Under the assumption that sovereignty issues related to information warfare will follow the same path, the current state of sovereignty regarding information is established. To focus the study, a functional outline for international convention, the International Regime for Information Security (IRIS), is advanced. IRIS balances US domestic privacy needs with US national security demands. Specifically, technology issues regarding digital identification and encryption are weighed against civil liberties and intelligence needs....

1 INTRODUCTION . . . . . . 1 Notes . . . . . . . 7 2 INTERNATIONAL LAW . . . . 9 Notes . . . . . . . 16 3 INFORMATION RELIANCE . . . . . 19 Notes . . . . . . . 28 4 STATUS QUO—CYBERLITIGATION . . . . . 31 Notes . . . . . . . 36 5 THE INTERNATIONAL REGIME FOR INFORMATION SECURITY MODEL. . . .39 Notes . . . . . . . 47 6 THE FUTURE . . . . . . 49 Notes . . . . . . . 56...

Read More
  • Cover Image

Seller Beware : US International Technology Transfer and Its Impact On National Security

By: Wayne M. Johnson, Lieutenant Colonel, USAF

In this important study, Lt Col Wayne Johnson, USAF, argues that systematic tightening of interagency cooperation and better work on defining sensitive technology prohibitions are needed to maintain the US technological edge. He also maintains that the US government requires a new and disciplined export control process—not the current mosaic of rules, regulations, and perspectives that came out of the cold war, but a process that provides a revamped, systemic approach with consistent implementation. Colonel Johnson explores the problem of defining which technologies the United States is willing to transfer(military or dual-use) and the need to ensure that national security objectives do not take a backseat to economic expediency. To accomplish this end, he argues for better interagency cooperation as a first step leading to a more centralized, coordinated, and strategic view of technology transfer and how it impacts US national security....

Read More
  • Cover Image

Combat Operations C3I : Fundamentals and Interactions

By: George E. Orr

Unfortunately, the existence of command, control, communications, and intelligence (C3I) structures, mechanisms, systems, and capabilities does not guarantee success. Major Orr attacks the basic problem of producing a conceptual model of the combat operations process. Only after he establishes the context, a paradigm of warfare based on classical literature, does he discuss the appropriate C3I architecture that will yield the desired results. In a larger sense, Major Orr’s study is an attempt to redefine the nature of modern technology-intensive warfare. This is a broad and contentious problem. While the reader may not agree with all of Major Orr’s assumptions and conclusions, this larger effort is vital to the American military’s capability to cope successfully with a rapidly changing and increasingly dangerous world. In this larger sense, the importance of Major Orr’s study goes far beyond the particular problems of C3I....

I COMBAT OPERATIONS . . . . . . . . . . . . . . . 1 Sun Tzu . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Objectives of War . . . . . . . . . . . . . . . . . 2 Civil-Military Relationships . . . . . . . . . . 2 Principles of War . . . . . . . . . . . . . . . . . 3 Tactical Principles . . . . . . . . . . . . . . . . 4 Carl von Clausewitz . . . . . . . . . . . . . . . . . 6 Andre Beaufre . . . . . . . . . . . . . . . . . . . . . 14 The American Style of War . . . . . . . . . . . . 22 The Traditional Approach . . . . . . . . . . . 22 Maneuver Warfare . . . . . . . . . . . . . . . . 24 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 II C3I AND THE COMBAT OPERATIONS PROCESS . . . . . . . . . . . . . . . . . . . . . . . .31 Command, Control, Communications, and Intelligence (C3I) . . . . . . . . . . . . . . . . . . .31 The Combat Operations Process Model . . . .34 Expansion of the Process Model Functions . .37 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 III COMMAND OF THE COMBAT OPERATIONS PROCESS . . . . . . . . . . . . . . . . . . . . . . . . 61 The Purpose of Command . . . ....

Read More
  • Cover Image

Strategic Paralysis : An Airpower Theory for the Present

By: Major Jason B. Barlow, USAF

The method or objective of Strategic Paralysis is to selectively attack or threaten those strategic or national level targets that most directly support the enemy’s war-making efforts and will to continue with his current behavior. Strategic Paralysis warfare should result in a change in the enemy’s behavior at a lesser cost to both sides as Airpower assets are the primary weapons --not ground troops. Why Airpower? It is the only weapon that can provide the near simultaneous shock to the enemy’s central nervous system necessary to induce paralysis. To achieve success Strategic Paralysis requires four key ingredients: 1) Correctly identifying the enemy’s National Elements of Value (NEVs), 2) High technology, 3) An enemy dependent upon a well developed, modern and vulnerable infrastructure, and 4) Aerospace Control. The bulk of this study is devoted to defining this strategy and bettering our understanding of the first ingredient, that of choosing the best targets for attack....

1. Introduction...............1 2. The Theory of Strategic Paralysis...............12 3. Choosing the Right Targets...............34 4. More Targeting Theories...............61 5. The National Elements of Value Model...............77 6. Conclusions...............110...

Read More
  • Cover Image

To War on Tubing and Canvas : A Case Study in the Interrelationships between Technology, Training, Doctrine and Organization

By: Lieutenant Colonel Jonathan C. Noetzel, USAF

The study reviews each force’s combat glider experience and analyzes it in light of the glider doctrine, or lack thereof, with which each began the war. While military cargo gliders have seen their day, recent technological advances in gliders make them a viable platform for certain missions requiring stealth and silence....

ABSTRACT ii INTRODUCTION 1 PRE-WAR DEVELOPMENT 3 The Early Years in Germany 3 Early Gliders in the US 4 A US Military Glider? For What Purpose? 4 Gliders Head Into Combat. 5 Come Join the Glider pilot Corps! 8 Glider pilot Training Shortfalls 9 Military Gliders in Britain 12 OPERATIONAL USE OF GLIDERS 13 Germany 13 Early Commando Raids 14 Crete 15 Other Operations 16 US and Great Britain 17 Sicily 17 British Gliders are First to Normandy 24 US Glider Pilots Join the War in France 20 Disappointment at Arnhem 22 Operation Market 22 Glider Success Over the Rhine? 23 Operation Dragoon 24 US Commando Operations in Burma 25 Summation 26 POST-WAR GLIDER POLICY 27 TECHNOLOGICAL ADVANCES IN GLIDERS 29 TODAY’S LIMITED MILITARY ROLE FOR GLIDERS 31 CONCLUSIONS 32 NOTES 36 BIBLIOGRAPHY 42...

Read More
  • Cover Image

Cloud Memoirs: Views from Below, Inside, and Above; A look at the history of cloud computing by CohesiveFT team, industry experts, and early adopters

By: Margaret Walker; Ryan Koop, Patrick Kerpan, Fred Hoch, Edmund Sutcliffe, Krishnan Subramanian, James Elwood, Chad Lawler, and Patricia Seybold.

CohesiveFT sifted through our blog posts from 2006 onward, without any editorial updates (although tempted), in order to present the posts as a reflection of ours and some of our colleagues’ thoughts at the time. Interspersed with each chapter are new, exclusive insights from friends, colleagues, and customers we met along the journey. Each chapter looks back at the short history of cloud computing from the early stages where clouds were far off, through the gathering clouds that turned into fog. Today that fog is shifting, and beginning to rain down the first drops of change....

Exclusive Viewpoint: Cloud Still Has a Long Way to Come Chad Lawler Director, Consulting Services, Cloud Computing at Hitachi Consulting It’s very interesting to look ahead and try to anticipate where the puck is going. The truth is that what Werner Vogels has stated about where we are in the “maturity curve” is absolutely true – that even with the progress we’ve made, we are very early in the cloud evolution. We want instant gratification with a solution that fits all of our needs, but we’re not there yet. We’re certainly not at the point where true utility computing is a reality. Here is an example: most cloud vendors say they offer pay-per-use functionality, when really they’re offering pay-per-allocation. You allocate a small, medium, large, or extra-large compute size, server memory, and a certain amount of storage. You pay for what you allocate, not what you use. When you allocate 10TB of storage on AWS S3 and do not use all of it, you still pay for the 10TB allocated. In order to have scalable storage you still have to pay to allocate it. The idea of utility computing is still very relevant, interesting...

Clouds on the Horizon: 2006 - 2008 Founders’ Stories Exclusive Viewpoint: The Beginning of CohesiveFT and the Cloud Welcome to the Elastic Server Beta CohesiveFT's Elastic Server All at once I saw a crowd InfoWorld's top 10 tech startups for 2008 CloudCamp London: the inauguration Win Win for Independent Software Vendors Software Manufacturing: A CFT White Paper Cloud Cover: 2008 - 2009 Exclusive Viewpoint: History and Transformation of the Cloud Exclusive Viewpoint: Using CohesiveFT and AWS to Prove Cloud Concepts We're #1, (and #2, kind of #3, and #6, and part of #10) VPN Cubed – Cloud is Ready for the Enterprise 6CohesiveFT VPN-Cubed: Not Your Daddy's Encrypted Tunnel 2009 in Virtualization and Cloud Computing: The Year of the Virtualization Professional Fog Surrounds Cloud: 2009 - 2012 Exclusive Viewpoint: Cloud Computing: Past, Present and Future Exclusive Viewpoint: White Knight Solutions from CohesiveFT New VPN-Cubed Version and The Cloud Connectivity Market 2010 in Cloud Computing: GAME ON! Getting out of the weeds Welcome to the User-Cloud (Part 1) Welcome to the User-Cloud (Part 2) AMQP – the encha...

Read More
  • Cover Image

Rethinking the Air Operations Center : Air Force Command and Control in Conventional War

By: Major J. Taylor Sink, USAF

The study concludes with recommendations for rethinking the Air Operations Center. Methods for improving responsiveness include time-value based target analysis, greater use of alert or reserve forces, on-board mission planning, and limited decentralization, with mission-type orders and commander’s intent transmitted to lower echelons. Solutions for improving assessment include delegating target assessment functions to the wings, focusing theater-level intelligence personnel on mission assessment, using statistical and effects-based evaluation techniques, using Air Force Special Operations forces to evaluate target system degradation, and acquiring technology that can conduct “top-down” assessment of the enemy’s war-making systems....

Read More
  • Cover Image

Taking Down Telecommunications

By: Major Gerald R. Hust, USAF

Information is one of the most, if not the most, essential elements of combat capability. Because telecommunications affects every aspect of a society, and is probably the most important medium which military information is exchanged, this thesis provides an understanding of the telecommunications system and how best to exploit it across the spectrum of conflict. I examine the system’s vulnerabilities to both lethal and nonlethal attack mechanisms. While the ability to employ nonlethal technologies are currently limited, I recommend pursuing a strong research and development program to acquire this capability. The reason is that they provide additional policy options to deal with conflict, they are cheap, and because research may not only discover unanticipated capabilities for the US, but also identify countermeasures to protect our own systems. This thesis concludes by offering guidelines to help determine whether to exploit telecommunications with either lethal or nonlethal attack strategies....

1 INTRODUCTION . . . 1 Notes . . . 3 2 TELECOMMUNICATIONS . . . . . 5 The Modern Communications System . . . . . 6 Vulnerability Analysis . . . . . . 17 Targeting . . . . 23 Quantification . . . . . 29 Conclusion . . . 32 Notes . . . 35 3 DISABLING WEAPONS . . . . . . 38 Definition . . . . . 39 History And Legal Considerations . . . . . 41 Conventional And Disabling Kill Mechanisms . . . 44 Advantages/Disadvantages . . . . . . 49 Conclusion . . . . 53 Notes . . . . 55 4 GUIDANCE FOR CAMPAIGN PLANNING . . . . . . 57 Planning Factors . . . . 57 Conclusion . . . . . 61 Notes . . . . . 62...

Read More
  • Cover Image

Weather Operations in the Transformation Era

By: Colonel John M. Lanicci, USAF

In Weather Operations in the Transformation Era, Col John M. Lanicci, USAF, takes a compelling look at future weather operations. His hypothesis is that a consolidated battlespace picture integrates both natural and man-made elements, which is totally consistent with USAF transformation efforts. He points out that the way ahead is easier said than done and offers several cogent reasons why the weather operations portion of information-in-warfare has not caught up with current USAF doctrine.Significant advances in information technology and advent of effects-based operations are propelling the USAF weather community away from traditional, single-inject stand-up briefings towards continuously updated advice to war fighters at every step of campaign/mission planning and execution. This technological momentum will make it necessary to fundamentally change data collection, analysis, prediction, and product tailoring. The author outlines these changes in a concept called weather, intelligence, surveillance, and reconnaissance (WISR), a term first used by the Air Staff to describe the total integration of natural and man-made environments ...

Read More
  • Cover Image

Air Superiority at Red FlagMass, Technology, and Winning the Next War

By: Lieutenant Colonel, Joseph W. Locke, USAF

The most significant implication of this study, however, is the predicted variance in changing kill ratio as the force ratio changes. The wide middle area of stability, identified as numerical attrition, is consistent with the traditional notion that kill ratio is largely a function of training and technology. It is also consistent with most of the historical record, including the early campaigns of World War II, that suggested that nominal changes in the relative mass of forces brought about little change in the kill ratio. This is also the reason evolving technology often produced the only observable change in the kill ratio. The rapid change in attrition rate at either end of the model also has great explanatory value....

1 REVIEW OF LITERATURE . . . . . . . . . . . . . 1 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .11 2 METHODOLOGY: RED FLAG . . . . . . . . . . .13 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 38 3 RESULTS . . . . . . . . . . . . . . . . . . . . . . . .41 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .59 4 STRATEGIC IMPLICATIONS . . . . . . . . . . .61 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .65 5 CONCLUSION . . . . . . . . . . . . . . . . . . . . 67 APPENDICES . . . . . . . . . . . . . . . . . . . . . . 71 BIBLIOGRAPHY . . . . . . . . . . . . . . . . . . . .207...

Read More
  • Cover Image

The Command or Control Dilemma When Technology and Organizational Orientation Collide

By: Gregory A. Roman, Lieutenant Colonel, USAF PDF

In this well-researched and insightful study, Lt Col Gregory A. Roman examines the relationships between military organizational hierarchies and the impact of battlespace information. Drawing on a sophisticated range of studies and data and using numerous illustrations, the author contends that the outmoded effects of traditionally centralized (and technologically proliferating) command and control orientations preclude the US military (and particularly the Air Force) from effectively applying and acting upon the benefits of information-age technologies in an age of information warfare. The author sees future warfare characterized by faster decision making, faster operational tempos, and a torrent of tactical battlefield information. These new realities necessitate greater decentralization of control, more flexible information gathering, and creative, nontraditional military organizational arrangements....

Read More
       
1
|
2
|
3
|
4
|
5
Records: 1 - 20 of 161 - Pages: 
 
 





Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.