82 research outputs found

    Military Transformation and the Defense Industry after Next

    Get PDF
    Though still adjusting to the end of the Cold War, the defense industry is now confronted with the prospect of military transformation. Since the terrorist attacks on 11 September 2001, many firms have seen business improve in response to the subsequent large increase in the defense budget. But in the longer run, the defense sector\u27s military customers intend to reinvent themselves for a future that may require the acquisition of unfamiliar weapons and support systems.https://digital-commons.usnwc.edu/usnwc-newport-papers/1016/thumbnail.jp

    Third International Symposium on Space Mission Operations and Ground Data Systems, part 1

    Get PDF
    Under the theme of 'Opportunities in Ground Data Systems for High Efficiency Operations of Space Missions,' the SpaceOps '94 symposium included presentations of more than 150 technical papers spanning five topic areas: Mission Management, Operations, Data Management, System Development, and Systems Engineering. The papers focus on improvements in the efficiency, effectiveness, productivity, and quality of data acquisition, ground systems, and mission operations. New technology, techniques, methods, and human systems are discussed. Accomplishments are also reported in the application of information systems to improve data retrieval, reporting, and archiving; the management of human factors; the use of telescience and teleoperations; and the design and implementation of logistics support for mission operations

    An Update on Analyzing Differences Between Public and Private Sector Information Resource Management: Strategic Information Challenges and Critical Technologies

    Get PDF
    Change is a constant within our contemporary IRM environment. The rapid development of information and communication technologies has been the most predominant among the many agents of change that are forcing a reevaluation of the role of the IRM professional. Few studies to date have compared public and private sector CIO perceptions concerning the IRM challenges and critical technologies faced by their organization. An earlier study concluded that the sectors CIOs do perceive to be faced with many of the same challenges and also view many of the same technologies as critical to the organization\u27s operations. A limiting factor identified in that study was the temporal separation of sector sampling. Any conclusions comparing the public and private sectors were based on survey responses separated by almost one year. The goal of this research is to validate if public and private sector senior IRM managers perceive to still be faced with the same challenges and view the same technologies as being critical to an organization\u27s IRM requirements. The results of a 2002 annual survey of public sector CIOs and senior IRM managers are compared with data collected from 2002 private sector CIOs. This research concluded that performing an analysis on datasets obtained from both sectors during the same time period provided a more appropriate comparison between sectors. Findings from this study provide sufficient evidence that both sectors have developed a closer correlation than was previously concluded

    Technology 2002: The Third National Technology Transfer Conference and Exposition, volume 2

    Get PDF
    Proceedings from symposia of the Technology 2002 Conference and Exposition, December 1-3, 1992, Baltimore, MD. Volume 2 features 60 papers presented during 30 concurrent sessions

    Analysis of binary XML suitability for NATO tactical messaging

    Get PDF
    The ability to efficiently transfer information among tactical systems is essential for network-centric operations. However, maintaining interoperability among heterogeneous networks and applications is a challenging issue, especially for large enterprises such as the US Department of Defense and NATO. Each of these organizations maintain extensive communication networks of tactical systems that process and manage all types of data. Additional complexity is added when considering that many systems are built with a variety of proprietary or legacy data formats. Establishing and maintaining interoperability is difficult. Using XML, many interoperability issues can now be successfully addressed. XML provides a self-describing way to effectively structure information that can be applied to compose diverse tactical communications. However, XML is inefficient for network transmission since it uses a text-based format which can consume more memory (and thus more bandwidth) than binary equivalents. In addition, parsing text-based documents is slow and computationally expensive. One potential solution is to use GZIP to reduce the file size before transmission. Unfortunately, this solution has limitations since it often provides suboptimal compression and also requires additional processing time when extracting data. Recent standardization efforts have identified promising new encodings for XML that use binary representations to reduce parsing time, memory size, and bandwidth requirements. This thesis surveys conversion of NATO tactical data link information into an XML format for distribution to command and control centers. General benefits and tradeoffs are then considered for applying binary XML encoding to that data. This thesis also examines work done by the World Wide Web Consortium in examining common use cases and developing the requirements needed for a binary XML encoding. The performance of two specific implementations, XML Schema based Binary Compression (XSBC) and Fast Infoset (FI) are compared with GZIP. XML files of varying sizes are encoded in binary form, then compression ratios and parsing times are compared and analyzed. Initial results are excellent and further work is recommended.http://archive.org/details/analysisofbinary109452012Approved for public release; distribution is unlimited

    Diversity in IS research : a fictive metaphor analysis

    Get PDF
    In striving to understand Information Systems phenomena Information Systems researchers frequently draw on a seemingly endless array of different disciplines to inform their studies. This act has drawn both the ire and admiration of those within the field as well as those outside its porous boundaries. On the one hand Information Systems researchers are berated for being chaotic and schizophrenic in their combined research endeavour - for producing a collective output that shows neither rhyme nor reason. On the other hand they are praised for being intellectually open and democratic in their approach. These reactions draw their strength from the many issues that stem from diversity in Information Systems research. These reactions are stimulated in part by the assertion that research in the Information Systems discipline is diverse. Despite this assertion not much is known or understood about diversity in Information Systems research. This thesis addresses this critical oversight by making research diversity the prime focus. The contributions it makes to current understandings of research diversity in Information Systems are philosophical, theoretical and empirical. Philosophically, this thesis relies on the novel approach of fictism - a blend of positivism and interpretivism. Theoretically, it explores diversity through the alternative lens of concepts. Empirically it examines the conceptual diversity of three key Information Systems concepts: organisations, technology and people. Grounded in Lakoff and Johnson's (1980) work with metaphors, the results show that Information Systems research may not be as diverse as was initially thought. Of the three primary views of key Information Systems concepts - machine, organism and culture - the study finds a distinct bias toward conceptualising these concepts as machines. This bias, one that exists at the very core of the Information Systems research endeavour, has important implications not only for individual researchers but the broader Information Systems community alike

    Debating Space Security: Capabilities and Vulnerabilities

    Get PDF
    The U.S. position in the debate on space security has been that (1) space-based systems could be developed and used to obtain decisive warghting superiority over an adversary, and (2) these space-based systems, because they might give such an inordinate advantage over any adversary, will be attacked. The Russians and Chinese, in contrast, claim to be threatened by U.S. aspirations in space but deny that they pose a serious threat to U.S. space-based systems. They view the development of advanced military space systems by the United States as evidence of a growing gap of military capabilities limited only by technological--not political--constraints. They argue that U.S. missile defense systems operating in coordination with advanced satellite sensors would weaken their nuclear retaliatory potential. This dissertation argues that the positions held by both of these parties are more extreme than warranted. An analytical evaluation quickly narrows the touted capabilities and assumed vulnerabilities of space systems to a much smaller set of concerns that can be addressed by collaboration. Chapter 2: Operationally Responsive Space (ORS): Is 24/7 Warghter Support Feasible? demonstrates the infeasibility of dramatically increasing U.S. warfighting superiority by using satellites. Chapter 3: What Can be Achieved by Attacking Satellites? makes the case that although U.S. armed forces rely extensively on its satellite infrastructure, that does not immediately make them desirable targets. The functions performed by military satellites are diffused among large constellations with redundancies. Also, some of the functions performed by these satellites can be substituted for by other terrestrial and aerial systems. Chapter 4: The Limits of Chinese Anti-Satellite Missiles demonstrates that anti-satellite (ASAT) intercepts are very complex under realistic conditions and that a potential adversary with space capabilities comparable to China's has very limited capability to use ASATs in a real-world battle scenario. Finally, in order to evaluate the chief concern raised by the Russians and Chinese, chapter 5: Satellites, Missile Defense and Space Security simulates a boost-phase missile defense system cued by the advanced Space Tracking and Surveillance (STSS) sensors. It demonstrates that even under best case assumptions, the STSS sensors are not good enough for the boost-phase missile defense system to successfully intercept and destroy an ICBM. Together, these chapters aim to narrow the contentions in the debate on space security thereby fostering the international colloboration and data sharing needed to ensure safe operations in space

    Destitution and paths to justice

    Get PDF

    Strategic Latency Unleashed: The Role of Technology in a Revisionist Global Order and the Implications for Special Operations Forces

    Get PDF
    The article of record may be found at https://cgsr.llnl.govThis work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory in part under Contract W-7405-Eng-48 and in part under Contract DE-AC52-07NA27344. The views and opinions of the author expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC. ISBN-978-1-952565-07-6 LCCN-2021901137 LLNL-BOOK-818513 TID-59693This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory in part under Contract W-7405-Eng-48 and in part under Contract DE-AC52-07NA27344. The views and opinions of the author expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC. ISBN-978-1-952565-07-6 LCCN-2021901137 LLNL-BOOK-818513 TID-5969

    The Journal of ERW and Mine Action Issue 7.1 (2003)

    Get PDF
    Research, Development and Technology in Mine Actio
    corecore