73,248 research outputs found

    The Success of the Light Armoured Vehicle

    Get PDF
    Since the 1970s, budget constraints and debates over the tank’s relevance have prompted the Canadian Forces (CF) to pursue lighter, cheaper, and more flexible vehicles. The Light Armoured Vehicle (LAV), built in London, Ontario, has been purchased in great numbers to satisfy these demands, and it has largely succeeded. The CF has purchased the LAV as a wheeled, multi–purpose vehicle to fulfill a variety of roles (infantry carrier, medical evacuation vehicle, etc.), that is cheaper and easier to maintain than tracked alternatives. The CF has continued to purchase LAVs because they have been successful in the field, and they support a domestic producer, General Dynamics Land Systems Canada (GDLS–C), that cooperates closely with the military

    Initiating e-learning by stealth, participation and consultation in a late majority institution

    Get PDF
    The extent to which opportunities afforded by e-learning are embraced by an institution can depend in large measure on whether it is perceived as enabling and transformative or as a major and disruptive distraction. Most case studies focus on the former. This paper describes how e-learning was introduced into the latter environment. The sensitivity of competing pressures in a research intensive university substantially influenced the manner in which e-learning was promoted. This paper tells that story, from initial stealth to eventual university acknowledgement of the relevance of e-learning specifically to its own context

    A case study of MMO2's Madic: A framework for creating mobile internet systems

    Get PDF
    Mobile Internet applications on ubiquitous mobile networks allows real-time, anywhere, anytime connectivity to services. Due to its scalability and potential cost savings, mobile communication is being increasingly applied in the business and consumer communities to create innovative data and voice application, which run over the Internet infrastructure. This paper reports on a case study at an organisation that created an innovative approach to developing mobile applications developed by third party independent developers. A conceptual wireless reference model is presented that was used to define the various system components required to create effective mobile applications

    The Emergent Logic of Health Law

    Get PDF
    The American health care system is on a glide path toward ruin. Health spending has become the fiscal equivalent of global warming, and the number of uninsured Americans is approaching fifty million. Can law help to divert our country from this path? There are reasons for deep skepticism. Law governs the provision and financing of medical care in fragmented and incoherent fashion. Commentators from diverse perspectives bemoan this chaos, casting it as an obstacle to change. I contend in this Article that pessimism about health law’s prospects is unjustified, but that a new understanding of health law’s disarray is urgently needed to guide reform. My core proposition is that the law of health care provision is best understood as an emergent system. Its contradictions and dysfunctions cannot be repaired by some master design. No one actor has a grand overview—or the power to impose a unifying vision. Countless market players, public planners, and legal and regulatory decisionmakers interact in oft-chaotic ways, clashing with, reinforcing, and adjusting to each other. Out of these interactions, a larger scheme emerges—one that incorporates the health sphere’s competing interests and values. Change in this system, for worse and for better, arises from the interplay between its myriad actors. By quitting the quest for a single, master design, we can better focus our efforts on possibilities for legal and policy change. We can and should continuously survey the landscape of stakeholders and expectations with an eye toward potential launching points for evolutionary processes—processes that leverage current institutions and incentives. What we cannot do is plan or predict these evolutionary pathways in precise detail; the complexity of interactions among market and government actors precludes fine-grained foresight of this sort. But we can determine the general direction of needed change, identify seemingly intractable obstacles, and envision ways to diminish or finesse them over time. Dysfunctional legal doctrines, interest group expectations, consumers’ anxieties, and embedded institutional and cultural barriers can all be dealt with in this way, in iterative fashion. This Article sets out a strategy for doing so. To illustrate this strategy, I suggest emergent approaches to the most urgent challenges in health care policy and law—the crises of access, value, and cost

    Securing the state, undermining democracy: internationalization and privatization of western militaries

    Get PDF
    Changes in the field of security since the 1990s triggered off a number of still continuing military transformations in liberal democracies. Since their armed forces were designed for the purposes of the bipolar Cold war security constellation, they have been “redesigned” according to the new tasks as agreed upon in the new NATO strategic concepts or the assignments for the Europeanized forces within the European Union: Conflict prevention, crisis intervention, counter-terrorism have been added to the range of deployment missions. This recent transformation of the armed forces is pushed ahead in the political spirit of new public management well known from other policy areas in the OECD countries. The proclaimed reforms are guided by efficiency and effectiveness principles only, issues of democratic control and integration of the armed forces into the society are marginalized in the political discourse. But integration and cooperation within international organizations is only one of the two trends detrimental to democratic control of the military; increasing contracting with Private Security and Military Companies is the other. Contracting is intended to reduce political and financial costs and risks for Western governments. The authors argue that, in the long run, both trends of privatization and internationalization, though they seem to run into opposite directions from a purely etatist perspective, result in the joint effect of exacerbating democratic control and accountability of security policies. This point is illustrated by the employment of private military companies by the US government agencies and US military and the reform of the German armed forces. -- Seit Ende des Ost-West-Konflikts befinden sich die westlichen Streitkräfte in einem anhaltenden Transformationsprozess. Waren die Streitkräfte zuvor an der bipolaren Sicherheitskonstellation des Kalten Krieges ausgerichtet, werden sie seit 1990 umstrukturiert, um neue Missionen zu erfüllen, wie sie in den strategischen Konzepten der NATO oder den Aufgabenfeldern der Europäischen Sicherheits- und Verteidigungspolitik definiert sind. Unter den Vorzeichen eines New Public Managements vorangetrieben, das in den letzten Jahrzehnten als ökonomisch inspiriertes Reformprinzip bereits zahlreiche andere Politikfelder der OECD-Staaten geprägt hat, sind die Umstrukturierungen der Streitkräfte vorwiegend an Effizienz- und Effektivitäts-Gesichtspunkten orientiert. Fragen der demokratischen Kontrolle und der Integration des Militärs in die jeweilige Gesellschaft werden dagegen im politischen Diskurs vernachlässigt. Zwei Entwicklungstrends kennzeichnen derzeit die westliche Sicherheits- und Verteidigungspolitik: die Integration und Kooperation westlicher Streitkräfte im Rahmen von internationalen Organisationen sowie der zunehmende Einsatz privater Sicherheitsunternehmen. Obwohl Internationalisierung und Privatisierung von Sicherheitspolitik in einer staatszentrierten Perspektive auf den ersten Blick gegenläufige Tendenzen einer Stärkung der Exekutive einerseits und der Schwächung des Staates andererseits zu markieren scheinen, tragen jedoch beide zu einer Schädigung der nationalstaatlichen Demokratie bei. Diese These erläutern die Autorinnen anhand des vermehrten Rückgriffs der US-amerikanischen Regierung auf private Sicherheitsanbieter sowie der Transformation der deutschen Streitkräfte.

    Aeronautical Engineering: A special bibliography with indexes, supplement 74

    Get PDF
    This special bibliography lists 295 reports, articles, and other documents introduced into the NASA scientific and technical information system in August 1976
    • …
    corecore