Home

Technology

 

 
 
PREV
1 2 3 4 5 6 7 8 9
NEXT
Technology
THE GULF MILITARY BALANCE VOLUME II : THE MISSILE AND NUCLEAR DIMENSIONS  By Anthony H. Cordesman

No songle aspect of US and Iranian military competition is potentially more dangerous than the missile and nuclear dimensions, and the possibility Iran will deploy long-range, nuclear-armed ...Read more >

280 Pages
7.18 MB
ROBOTS ON THE BATTLEFIELD  

When historians turn their gaze on the questions of defence in this first half of the 21st century, they will observe that military robots brought in something brand new to the world of ...Read more >

301 Pages
3.17 MB
COMPRESSIVE SENSING FOR DOD SENSOR SYSTEMS  

During its 2012 Summer Study, JASON was asked by ASDR&E (Assistant Secretary of Defense for Research and Engineering) to consider how compressed sensing may be applied to Department of Defense systems, emphasizing radar because installations on small platforms can have duty cycles limited by average transmit ...Read more >

129 Pages
3.16 MB
REQUIREMENTS FOR DEEP PACKET INSPECTION IN NEXT GENERATION NETWORKS  

This Recommendation specifies the requirements for Deep Packet Inspection (DPI) in Next Generation Networks (NGN). This Recommendation primarily specifies the requirements for Deep Packet Inspection (DPI) entities in NGN, addressing, in particular, aspects such as application identification, flow identification, inspected traffic types, signature management, reporting to the network management system (NMS) and interaction with the policy decision functional ...Read more >

110 Pages
1.32 MB
FUTURE NETWORKS INCLUDING MOBILE AND NGN  

This Recommendation specifies the requirements for Deep Packet Inspection (DPI) in Next Generation Networks (NGN). This Recommendation primarily specifies the requirements for Deep Packet Inspection (DPI) entities in NGN, addressing, in particular, aspects such as application identification, flow identification, inspected traffic types, signature management, reporting to the network management system (NMS) and interaction with the policy decision functional ...Read more >

87 Pages
1.38 MB
TECHNOLOGICAL SOVEREIGNTY IN ICT  

The discussions on strategic implications of Information and Communication Technology (ICT) revolved around attaining technological sovereignty and indigenous development through combined partnership of public and private sector ...Read more >

23 Pages
414.49 KB
NATIONAL SEMINAR ON TECHNOLOGICAL SOVEREIGNTY IN ICT  

The CLAWS National Seminar on Technological Sovereignty in Information and Communications Technology (ICT) was held on 11 Oct 2012 at Manekshaw Centre, New ...Read more >

18 Pages
419.30 KB
CHANGING THE GAME : THE PROMISE OF DIRECTED-ENERGY WEAPONS  

Americas ability to project conventional power abroad is eroding swiftly as state and non-state actors acquire advanced capabilities to offset the U.S. militarys strengths across all operating domainsair, land, sea, space, and ...Read more >

77 Pages
1.66 MB
SCIENCE VS. THE ART OF WAR  

People generally do not feel comfortable with uncertainty. Hence, there is a constant search in lifeincluding in the militaryfor deriving various principles or rule sets and making things more controllable and predictable. Since ancient ...Read more >

9 Pages
1.51 MB
DEPARTMENT OF DEFENSE IMPLEMENTATION OF THE FEDERAL DATA CENTER CONSOLIDATION INITIATIVE  

The Department of Defense (DOD) is the single largest energy consumer in the nation. As the largest owner of federal data centers, with 772, the DOD has more than twice as many centers as any other agency. By consolidating some of its data centers, DOD could have a significant positive impact on energy savings for the federal ...Read more >

25 Pages
618.42 KB
ACQUISITION OF INFORMATION TECHNOLOGY   

Information technology (IT) offers immense capability in terms of agility, flexibility, responsiveness, and effectiveness. It enables nearly all of our military combat capability and has become a necessary element of our most critical warfare systems. However, there is growing concern within Congress and among Department of Defense (DOD) leadership that the nationís military advantage may be eroding. The deliberate process through which weapon systems and information technology are acquired by ...Read more >

109 Pages
7.80 MB
RISK AND RESPONSIBILITY IN A HYPERCONNECTED WORLD  

Many leaders in business, civil society and government realize that for the worlds economy to fully derive the value inherent in technological innovation, a robust, coordinated system of global cyber resilience is essential to effectively mitigate the risk of ...Read more >

40 Pages
1.65 MB
THE FUTURE OF E-DUCATION : THE IMPACT OF TECHNOLOGY AND ANALYTICS ON THE EDUCATION INDUSTRY  

In the last century, society has dramatically changed, however the way in which we prepare ourselves has not. The world is rapidly moving online and, until now, education has largely been restricted to the physical world. A revolution in education is underway, as technological advancements allow education to be ...Read more >

37 Pages
4.55 MB
GOOD DATA GOOD GOVERNANCE  

It is apt to start with an allegory. A school management body decides to rent out the school building as a function hall during the non operational ...Read more >

57 Pages
3.01 MB
PREV
1 2 3 4 5 6 7 8 9
NEXT