Search Results (161 titles)

Searched over 21.6 Million titles in 0.23 seconds

 
PDF (eBook) (X) Technology (X) Most Popular Books in China (X) Non Fiction (X)

       
1
|
2
|
3
|
4
|
5
Records: 1 - 20 of 161 - Pages: 
  • Cover Image

X-15 Research Results

By: Wendell H. Stillwell

This semi-technical summary of the X–15 program is directed toward the less publicized aspects of its achievements.

Read More
  • Cover Image

Failure to Launch : From Big Data to Big Decisions; Why velocity, variety and volume is not improving decision making and how to fix it

By: Forte Wares

The key to making big data initiatives a success lies within making the produced data more digestible and usable in decision making, rather than making it just ‘more,’ resulting in the creation of an environment wherein information is used to generate real impact. Put another way, the survival of Big Data is more about making the right data(not just higher volume) available to the right people (not just higher variety) at the right time (not just higher velocity)....

Read More
  • Cover Image

Using Visual SourceSafe : SourceSafe / VSS Tutorial, Volume 163: SourceSafe / VSS Tutorial

By: Kevin Gao

Although this SourceSafe tutorial can be used for anyone who is interested in SourceSafe, it is mainly for software developers. As you may have been using SourceSafe for a long time and know many features of VSS, I will try to make the table of the content easy to navigate so hopefully you can easily find the information that you are interested in....

In this SourceSafe How To series / tutorial, I will write some guides, How To and FAQs about SourceSafe and will also post resources I found on the internet. This series will cover some basic and intermediate topics of SourceSafe as well as some advanced topics....

Introduction _________________________________________________________ 4 What is VSS? ________________________________________________________ 5 Market position _______________________________________________________ 6 What can VSS do? ____________________________________________________ 7 History preserving _____________________________________________________________ 7 File Difference _________________________________________________________________ 8 Project/Folder Difference _______________________________________________________ 9 Easy Collaboration ____________________________________________________________ 10 Several Important Concepts ___________________________________________ 12 VSS Database/Repository _____________________________________________________ 12 Working Folder _______________________________________________________________ 12 Master Copy and Local Copy ___________________________________________________ 12 Basic operations ____________________________________________________ 13 Add _________________________________________________________________________ 13 Get _________________...

Read More
  • Cover Image

China in Space : Civilian and Military Developments

By: Colonel David J. Thompson, USAF; Lieutenant Colonel William R. Morris, USAF

Col Thompson, in his concentrated focus on China’s military space applications, examines PRC ground, space, counterspace, and space policy aspects. His principal findings: China has plans to construct a new launch site in the deep south; PRC telemetry, tracking and com-mand capacities are improving; China has the ability to conduct limited intelligence, surveillance and reconnaissance missions from space; the PRC is pursuing a counterspace capability most likely using satellite jammers and anti-satellites (possibly parasitic or nano-satellites). Col Thompson concludes that while China’s space program does not now constitute a global threat, the PRC is pursuing space capabilities that will increase its regional influence, and deny an adversary certain uses of space....

Read More
  • Cover Image

Wright Flyer Paper : How Small Is Too Small?; Technology into 2035, Vol. 46

By: Major Paul E. Kladitis, USAF

The Department of Defense (DOD) anticipates the realization of biomimetic bird and two-inch, insect-sized systems within the 2015–47 period. Although robot systems of one millimeter or smaller are not explicitly specified in current DOD and Air Force technology road maps, the technological aims towards this size can be clearly inferred from official documents. This research assesses the likelihood of, and barriers to, the realization of true microrobots and nanorobots (defined as submillimeter-sized robots of micro-meter and nanometer proportions, respectively) that can perform in military applications by 2035. This research finds that the realization of true microrobots for military applications by 2035 is unlikely, except for a single case of microrobots....

Read More
  • Cover Image

Wright Flyer Paper : Tracking Next–Generation Automatic Identification Technology into 2035, Vol. 46

By: Major Richard N Holifield, Jr., USAF

This paper explores the advances in automatic identification technology, specifically radio frequency identification, and seeks to exploit these capabilities for use in the Department of Defense (DOD) supply chain. Using technological trends, a thorough literature review, and the opinions of experts, the paper compares current technology to a 2035 requirements forecast to identify capability gaps. The end goal is logistics situational awareness, whereby the DOD has the ability to provide end-to-end visibility throughout its supply chain and can rapidly mobilize, deploy, sustain, and redeploy forces in support of national security objectives....

Read More
  • Cover Image

Introdução ao Uso do LaTeX: Versão 1.2a

By: Ivo Fernandez Lopez e Maria Darci Godinho da Silva

Apesar de haver uma literatura grande sobre o LaTeX, uma boa parte dos trabalhos disponíveis é relativamente antiga e não contém os avanços dos últimos anos. Em virtude disto, resolvemos escrever um texto sobre o LaTeX que, de uma forma simples e auto contida, apresente as opções mais recentes que estenderam e facilitaram o aprendizado e aplicação. No livro, além do básico sobre o LaTeX, acrescentaram-se tópicos sobre como elaborar apresentações, elaborar monografias, dissertações e teses, elaborar uma prova com gabarito, incluir arquivos multimídia, elaborar pôsteres para apresentação em congresso, usar recursos mais modernos para digitação de equações longas e sistemas de equações, elaborar bibliografias, incluir um índice remissivo, incluir sumário etc. A bibliografia do livro é constituída quase que exclusivamente de arquivos disponíveis na Internet e é feito um comentário sobre cada citação, além de permitir o acesso através de hiperligação ("hyperlink"). Ao longo do texto são citadas as referências que podem aprofundar os tópicos, caso o leitor sinta necessidade. No segundo semestre de 2013 foram feitos diversos ac...

1 Introdução -- Noções Básicas de LATEX 1.1 Origem: TeX (TEX) 1.2 Avanço: LaTeX (LATEX) 1.3 Exemplo mínimo de arquivo em LATEX 1.4 Resultado da compilação 1.5 Programas indicados 1.6 Gerando arquivo .pdf ou .dvi (compilação) 1.7 Distribuições de LATEX 1.8 Distribuição MiKTeX 1.9 Distribuição TeXLive 1.10 Editor para os arquivos .tex 1.11 Editor TeXworks 1.11.1 Configurações básicas 1.11.2 Algumas sugestões para o seu uso 1.12 Exemplo da interface do TeXworks 1.13 Editor Texmaker 1.14 Exemplo da interface do Texmaker 1.15 Arquivos auxiliares 2 LATEX Básico 2.1 Caracteres especiais 2.2 Estrutura dos arquivos em LATEX 2.3 Comandos básicos, ambientes, matemática 2.4 Classes de documentos 2.5 Parágrafos, espaços, separação de sílabas 2.6 Fontes e LuaTeX 2.7 Capítulos, seções, apêndice etc 2.8 Título, sumário, listas de tabelas e de figuras 2.9 Geometria da página, espaçamento entre linhas 2.10 Numeração e formatação das páginas, notas de rodapé 2.11 Principais pacotes 2.12 Símbolos matemáticos 2.13 Subscritos, sobrescritos, funções pré-de...

Read More
  • Cover Image

Jumpstart to Software Quality Assurance : Volume First

By: Vishnuvarthanan Moorthy

Software Quality Assurance is a specialized activity and it contributes in building capable processes in organization. This book details the different knowledge areas and provides practical insight which is required for software quality analyst to quickly grasp and start being productive within days, and contributes to build such capable processes. This book details the basics of quality assurance, relevant techniques and methods used in quality assurance. What is in there? • A quick description of various knowledge areas in software quality assurance • Frequently used tools and techniques in Software quality assurance • Sample cases to understand the concepts Why this book? • A simple ready recknor for SQA • Mix of pragmatic and theoretical elaborations • Industry specific and current needs of Industry is taken care • Short book for quick read Who should read? • People who are interested in making a career in software quality assurance • Who are interested in understanding Quality assurance • Who are leading an organization and wants to set up the Quality assurance function ...

Audit Expectations: An audit is expected to check, does the Quality System meet the requirements of the relevant Quality System Standard/model or Contract? Does the organization do what the Quality System specifies? Is the Quality System, as implemented, effective in ensuring maintenance and improvement of the quality of products and services? Audit is not an alternative to an inspection operation and cannot serve as a crutch to an ineffective inspection or quality system Types of Audit: • First Party Audit (Internal Audits) • Second Party Audit (Customer Audits) • Third Party Audit (Audit Agencies) Horizontal and Vertical Audits: • Horizontal Audit - Assess same aspect in all projects. • Vertical Audit - Assess all aspects in one project • forward tracking • backward tracking • Hybrid Audits - Mixing Horizontal and Vertical Audits Audit Team: One or more auditors conducting an audit, supported if needed by Technical Experts. The auditors are lead by Lead Auditor. One or more auditees represent the function or the organization. Lead Auditor Responsibilities: (Second party and Third party audits) • Negotiate scope ...

Quality Fundamentals Quality Assurance Functions Lifecycle Models Project Management Configuration Management Software Estimation Risk and Issue Management Tailoring and Waivering Software Engineering - Development Service Management Reviews Metrics Core SQA Activities Quality Audits Quality Control Tools and Basic Statistics Standards (ISO 9001, 20000, 27001) and Models (CMMI, PCMM) Agile Scrum Earned Value Analysis Reference Sites ...

Read More
  • Cover Image

Get Started with Video Captioning : A Beginner's Guide to Making Video Accessible: A Beginner's Guide to Making Video Accessible

By: Patrick Joseph Besong

Have a video that you need to make accessible, but don't have a clue how to start? This book will get you up and running in no time. It will show you how in layman's language how to go about the task of closed captioning your videos, what the different formats are, what software to use, and will also go over the basic style guidelines in creating captioned videos....

Captioning video not only makes video accessible to the deaf and hard-of-hearing, but there are other compelling reasons for it as well. These are also good talking points to convince others of the need to caption video. • Captioned videos have better user retention of the video content. • The video’s transcripts are searchable, so you will get better Search Engine Optimization (SEO), which may give you a leg up on your competition. • Captioned video also opens your market reach to a whole new segment of paying customers - the deaf! • It’s the law. Many videos that are provided to the public must be captioned either due to federal communication law, or merely a company’s policy regarding accessibility. • Language learning relies heavily on captioned video. • If the viewer is in a noisy area and does not have access to headphones, the captions can be read while watching the video. • Similarly, if the viewer does not have headphones and cannot turn up the volume due to the need to keep noise to a minimum (like in a library or nursery), the captions are there to provide what is being spoken....

Preface 1. Why Caption Video? 2. Captioning Formats 3. Helpful Software 4. Captioning Style Guide Helpful Video Captioning Related Links About the Author...

Read More
  • Cover Image

Comment créer et Optimiser son profil Google+ : Pour plus de visibilité, Volume 1: Pour plus de visibilité

By: Noel NGUESSAN; Noel NGUESSAN, Editor

Le lancement du concept de Google AuthorShip apporte encore plus d’intérêt au profil Google+. Et ce, dans la mesure où il permet à Google de mettre plus en valeur et de favoriser le profil Google+ de chaque auteur identifié sur ses pages de résultats. C’est d’ailleurs ce qu’a récemment confirmé Eric Schmidt, Président du Conseil d’Administration de Google. Par conséquent, bien optimiser son profil permet de tirer avantage de cette faveur que Google compte accorder aux auteurs ayant créé un profil Google+ et l’ayant lié à tous leurs contenus. Découvrez donc dans cet eBook gratuit comment vous y prendre pour réussir l’optimisation de votre profil Google+ qui va de plus en plus influencer votre classement sur le moteur Google....

Google+ est le réseau social de Google lancé en juin 2011 et qui compterait plus de 550 millions d'utilisateurs dont 345 millions d'actifs au dernier pointage. On pourrait penser qu'avec Google+, Google essaie de concurrencer Facebook sur son propre terrain en espérant, bien sûr, prendre sa place de leader dans ce créneau. Mais, en fait, ce n'est pas vraiment la place de leader qui intéresse réellement Google. Même si cela ne lui déplairait pas d'occuper cette place. La raison principale pour laquelle Google a lancé Google+ réside surtout dans la récupération des données personnelles des internautes. Car, avoir plus de données de ses utilisateurs, c'est bien entendu pouvoir fournir des résultats personnalisés et surtout pouvoir vendre de la publicité très ciblée à chacun d'eux. Google envisage donc, avec Google+, de changer le monde de l'internet en profondeur. Et pour ce faire, il lui faut plus de données personnelles, une meilleure identification des individus et plus d'intégration de tous ses services. Google+ n'est pas encore un produit fini comme l'ont été Buzz ou Orkut. Mais, il bel et bien un projet de Goo...

Introduction Les fonctionnalités de Google+ Optimisation du profil Google+ Conseils pour plus de performances Importance du bouton Google +1 ...

Read More
  • Cover Image

Affiliate Assassin to Create Targeted Affiliate Marketing Campaigns : Affiliate Assassin, Volume 84: Affiliate Assassin

By: Jeffrey Benson

Discover how to create laser targeted affiliate marketing campaigns

you can literally start making money online in a matter of a few days, even a few hours.

INTRODUCTION TO AFFILIATE ASSASSIN 3 CHOOSING THE RIGHT PRODUCTS 4 MONEY WITH REVIEW SITES 13 CATER TO HUNGRY BUYERS 13 HOW TO MAKE MONEY WITH AN AMAZON REVIEW SITE 19 MAKING MONEY WITH CPA OFFERS 22 LIST BUILDING PROFIT PLAN 27 THE TOOLS YOU NEED 28 CREATING A HIGH CONVERTING SQUEEZE PAGE 36 INCENTIVE OFFERS: UP CLOSE 41 PROMOTING YOUR SQUEEZE PAGE FOR MAXIMUM PROFITS 42 LIST BUILDING OVERVIEW 49 QUICK AFFILIATE CASH STRATEGIES 51 DESPERATE MARKET PROFITS 55 LAUNCHING YOUR CAMPAIGNS 65 KEYWORD RESEARCH MADE EASY 66 MARKETING YOUR AFFILIATE CAMPAIGNS 72 GENERATE TRAFFIC FROM BACKLINKS 75 GENERATE TRAFFIC FROM SOCIAL MEDIA SITES 78 GENERATE TRAFFIC FROM DIRECTORIES 80 ...

Read More
  • Cover Image

Facebook Marketing Profit Masters : Learn the Most Profitable Strategies to Profit from Facebook: Learn the Most Profitable Strategies to Profit from Facebook

By: David Drummy Lewis, Mr.

***Learn proven strategies to earn passive income using Facebook. A step by step process to profit from Facebook while helping people.*** You need this training! Also i encourage you to download and share this free guide with your friends. Thank you ...

Read More
  • Cover Image

Unmanned Space Project Management : Surveyor and Lunar Orbiter: Surveyor and Lunar Orbiter

By: Erasmus H. Kloman

NASA commissioned a study of the management of the Surveyor and Lunar Orbiter projects.

Read More
  • Cover Image

Technology Horizons : A Vision for Air Force Science and Technology 2010–30, Vol. 1

By: Office of the US Air Force Chief Scientist

Technology Horizons is our vision for key Air Force science and technology investments over the next decade that will provide us with truly game-changing capabilities to meet our strategic and joint force responsibilities. The coming decades hold high promise for amazing new capabilities across the air, space, and cyber domains. Yet the Air Force and our nation will also be confronted with substantial strategic, technology, and budget challenges. Our greatest advances will come with a focused investment of resources in the most promising technologies. The vision in Technology Horizons provides the shared awareness of the challenges and opportunities that will enable us to achieve this focus....

LIST OF ILLUSTRATIONS . . . . . vii FOREWORD BY THE SECRETARY OF THE AIR FORCE AND CHIEF OF STAFF OF THE AIR FORCE . . . . ix PREFACE BY THE CHIEF SCIENTIST OF THE AIR FORCE . . . . xi ACKNOWLEDGMENTS . . . . xv EXECUTIVE SUMMARY . . . . . xvii 1 INTRODUCTION . . . . 1 A Vision for Air Force Science and Technology 2010–30 . . . . 1 Lessons Learned from Prior Air Force Science and Technology Visions . . . . 5 Organization and Conduct of Technology Horizons . . . . . 8 Organization of Results from Technology Horizons . . . . . 14 Caveats . . . . 16 2 STRATEGIC CONTEXT FOR AIR FORCE S&T 2010–30 . . . . . 19 Relation to National Security Objectives . . . . . 21 Technology-Derived Challenges to Air Force Capabilities . . . . . 22 Strategic Implications of S&T Globalization . . . . 38 Federal Budget Implications for Air Force S&T Strategy . . . . . 41 3 ENDURING REALITIES FOR THE AIR FORCE 2010–30 . . . . . 43 Ensuring Interoperability with Legacy Systems . . . . 43 Sustainment Costs for Legacy Systems . . . . . 43 Importance of Low-Observable Systems . . . . 44 Energy Costs and Availability . . . . . 44 Growing Role ...

Read More
  • Cover Image

Build-to-shelve Prototyping : Undercutting Doctrinal Development

By: Lieutenant Colonel Donald “Bud” Vazquez, USAF

I submit there are two ways we can use limited numbers of prototype systems to ensure we learn relevant tactical lessons before we have to fight:(1) capitalizing on interactive computing technologies to better develop requirements and tactics throughout the system life cycle and (2) changing our concept of prototypes from the buying of one or two “experimental”items to procuring entire “prototypical” units....

1 SETTING THE STAGE . . . . 1 Background . . . . . 1 Methodology . . . . 2 Military Doctrine: Definitions and Types . . . . . 3 Notes . . . . 5 2 DEVELOPING ROBUST EMPLOYMENT DOCTRINE . . . . 7 Why Employment Doctrine Matters . . . . 7 How Employment Doctrine Develops . . . . . 8 Combat-Capable versus Combat-Lethal Doctrine . . . . . 11 Notes . . . . 13 3 DOCUMENTING DOCTRINAL LAG . . . . 15 The YB-17 and Refining Doctrine under Fire . . . . . 15 Modern Perspectives . . . . 18 Notes . . . . 21 4 CRITIQUING THE YOCKEY POLICY . . . . . 23 The Fallacy of Strategic Warning . . . . . 23 We Can’t Predict What We’ll Need . . . . . 25 Summarizing the Policy Critique . . . . . 27 Notes . . . . 27 5 POTENTIAL SOLUTIONS . . . . 29 Interactive Simulation for Employment Doctrine . . . . . 29 Prototypical Units . . . . . 32 Historical Perspective . . . . . 33 Notes . . . . 33 6 CONCLUSION . . . . 35 Notes . . . . 37 BIBLIOGRAPHY . . . . . 39...

Read More
  • Cover Image

To War on Tubing and Canvas : A Case Study in the Interrelationships between Technology, Training, Doctrine and Organization

By: Lieutenant Colonel Jonathan C. Noetzel, USAF

The study reviews each force’s combat glider experience and analyzes it in light of the glider doctrine, or lack thereof, with which each began the war. While military cargo gliders have seen their day, recent technological advances in gliders make them a viable platform for certain missions requiring stealth and silence....

ABSTRACT ii INTRODUCTION 1 PRE-WAR DEVELOPMENT 3 The Early Years in Germany 3 Early Gliders in the US 4 A US Military Glider? For What Purpose? 4 Gliders Head Into Combat. 5 Come Join the Glider pilot Corps! 8 Glider pilot Training Shortfalls 9 Military Gliders in Britain 12 OPERATIONAL USE OF GLIDERS 13 Germany 13 Early Commando Raids 14 Crete 15 Other Operations 16 US and Great Britain 17 Sicily 17 British Gliders are First to Normandy 24 US Glider Pilots Join the War in France 20 Disappointment at Arnhem 22 Operation Market 22 Glider Success Over the Rhine? 23 Operation Dragoon 24 US Commando Operations in Burma 25 Summation 26 POST-WAR GLIDER POLICY 27 TECHNOLOGICAL ADVANCES IN GLIDERS 29 TODAY’S LIMITED MILITARY ROLE FOR GLIDERS 31 CONCLUSIONS 32 NOTES 36 BIBLIOGRAPHY 42...

Read More
  • Cover Image

Improving the Management of an Air Campaign with Virtual Reality

By: Major James E. Haywood, USAF

This thesis evaluates the near-term military utility of virtual reality (VR) and its component technologies to the battle management of an air campaign. It presumes a large-scale air campaign on the order to that in the Gulf War where air operations were continuous, prolonged, and intense. The research concludes by assessing the viability and implication of a military decision to invest in a VR-enhanced air battle management system. Recommendations are given for areas in need of further research and development....

Read More
  • Cover Image

Vital Interests, Virtual Threats : Reconciling International Law with Information Warfare and United States Security

By: Major Karl J. Shawhan, USAF

This study examines the history of technology and sovereignty, which reveals a model for the evolution of international law. Specifically, the history of sea, air, and space provides examples on past issues of sovereignty. A three-stage pat-tern of international law emerges. Under the assumption that sovereignty issues related to information warfare will follow the same path, the current state of sovereignty regarding information is established. To focus the study, a functional outline for international convention, the International Regime for Information Security (IRIS), is advanced. IRIS balances US domestic privacy needs with US national security demands. Specifically, technology issues regarding digital identification and encryption are weighed against civil liberties and intelligence needs....

1 INTRODUCTION . . . . . . 1 Notes . . . . . . . 7 2 INTERNATIONAL LAW . . . . 9 Notes . . . . . . . 16 3 INFORMATION RELIANCE . . . . . 19 Notes . . . . . . . 28 4 STATUS QUO—CYBERLITIGATION . . . . . 31 Notes . . . . . . . 36 5 THE INTERNATIONAL REGIME FOR INFORMATION SECURITY MODEL. . . .39 Notes . . . . . . . 47 6 THE FUTURE . . . . . . 49 Notes . . . . . . . 56...

Read More
  • Cover Image

Seller Beware : US International Technology Transfer and Its Impact On National Security

By: Wayne M. Johnson, Lieutenant Colonel, USAF

In this important study, Lt Col Wayne Johnson, USAF, argues that systematic tightening of interagency cooperation and better work on defining sensitive technology prohibitions are needed to maintain the US technological edge. He also maintains that the US government requires a new and disciplined export control process—not the current mosaic of rules, regulations, and perspectives that came out of the cold war, but a process that provides a revamped, systemic approach with consistent implementation. Colonel Johnson explores the problem of defining which technologies the United States is willing to transfer(military or dual-use) and the need to ensure that national security objectives do not take a backseat to economic expediency. To accomplish this end, he argues for better interagency cooperation as a first step leading to a more centralized, coordinated, and strategic view of technology transfer and how it impacts US national security....

Read More
  • Cover Image

Science and Technology : The Making of the Air Force Research Laboratory

By: Robert W. Duffner

Part 1 The Decision 1 Introduction . . . . . . . . . . . . . . . . . . . 3 2 Rumblings of Laboratory Consolidation . . . 7 3 The Catalyst: National Defense Authorization Act and Vision 21 . . . . . . . . .23 4 Overhauling Infrastructure . . . . . . . . . . . 45 5 Laboratory Studies and Strategy . . . . . . . 71 6 Corona 1996: Leadership and Decisions . .93 7 The Last Dance: Meeting in the Secretary’s Office . . . . . . . . . . . . . . . . . . . . . . . . . . 115 8 Conclusion . . . . . . . . . . . . . . . . . . . . 129 Part 2 The Transition 9 Early Strategic Planning . . . . . . . . . . . . 137 10 Shaping the Technology Directorates . . 161 11 Getting the Message Out . . . . . . . . . . 195 12 Other Perspectives: Independent Review Teams . . . . . . . . . . . . . . . . . . . . . . . .209 13 Headquarters: Two Staff Directorates . . 227 14 The Final Push . . . . . . . . . . . . . . . . . .253 15 Conclusion . . . . . . . . . . . . . . . . . . . . 265...

Read More
       
1
|
2
|
3
|
4
|
5
Records: 1 - 20 of 161 - Pages: 
 
 





Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.