Home

Technology

 

 
 
PREV
1 2 3 4 5 6 7 8 9
NEXT
Technology
STRATEGY FOR AN ARMY CENTER FOR NETWORK SCIENCE, TECHNOLOGY AND EXPERIMENTATION   

The U.S. military and its allies have committed to a strategy of network- centric warfare (NCW) with ever-increasing levels of investment in and dependence on networked systems. As a result, the Army has become increasingly aware of the critical role that network science will play in achieving national defense ...Read more >

99 Pages
2.96 MB
TECHNOLOGICAL STRATEGY IN THE AGE OF EXPONENTIAL GROWTH  

There can be little doubt that the definitive technological strategy problem at this time is how to deal with exponential growth in digital technologies. Exponential growth is producing effects that are pervasive across the global industrial base and having an impact on almost ...Read more >

6 Pages
1.09 MB
CLOUD COMPUTING STRATEGY  

In the current political, economic, and technological landscape, information technology (IT) is expected to provide extensive and ever]increasing capabilities while consuming ...Read more >

44 Pages
1.73 MB
NEW SMARTPHONES AND THE RISK PICTURE  

Mobile phone platforms are susceptible to malicious attacks, both from the network and upon physical compromise. Understanding the vectors of such attacks, level of expertise required to carry them out, available mitigations, and impact of compromise provides a background for certain risk ...Read more >

2 Pages
954.44 KB
JOINT ELECTROMAGNETIC SPECTRUM MANAGEMENT OPERATIONS  

Military operations are complicated by increasingly complex demands on the electromagnetic spectrum. All modern forces depend on the EMS. The EMS is a physical medium through which joint forces conduct ...Read more >

102 Pages
1.64 MB
A HOLISTIC APPROACH TO INTELLIGENCE, SURVEILLANCE AND RECONNAISSANCE  

I was in a strange city, much of it foreign to me and my guide, who was leading our convoy. Moving through crowded, winding passages, I thought it would not be possible to meet our rendezvous time. ...Read more >

11 Pages
454.27 KB
C4ISR  

When the Armys Future Combat System (FCS) was canceled in 2009, so was the vision of the U.S. military fighting conventional wars against states such as China and Russia. FCS replacement, Brigade Combat Team Modernization (BCTM), instead focuses on a versatile mix of brigade combat teams that can be assembled in whatever configurations are needed to fit the ...Read more >

12 Pages
862.24 KB
SECRET IP DATA  

The Secret IP Data provides IP-based secret information transfer across DoD for official DoD business applications such as e-mail, web services, and file transfer. The Secret IP Data service gateway function provides DoD customers with centralized and protected connectivity to federal, Intelligence Community (IC), and allied information at the secret level. The Secret IP Data service includes IP-based secret information exchange within DoD (DoD intranet) and centralized, gateway external ...Read more >

11 Pages
70.96 KB
INTERNET TRENDS  

BASIC STATS – INTERNET GROWTH REMAINS ROBUST, RAPID MOBILE ADOPTION STILL IN EARLY ...Read more >

112 Pages
11.62 MB
DIRECTIVE TYPE MEMORANDUM (DTM) 09 026 : RESPONSIBLE AND EFFECTIVE USE OF INTERNET BASED CAPABILITIES  

This memorandum establishes DoD policy and assigns responsibilities for responsible and effective use of Internet-based capabilities, including social networking services (SNS). This policy recognizes that Internet-based capabilities are integral to operations across the Department of Defense. This DTM is effective immediately; it will be converted to a new DoD ...Read more >

9 Pages
67.75 KB
ARMY TACTICAL STANDARD OPERATING PROCEDURES  

This chapter introduces using collaborative technology to enhance standard operating procedure content development. Then it discusses Army doctrine and policy in support of standard operating procedure content development. Finally, it briefly discusses resources related to coordinating operating procedures with ...Read more >

32 Pages
364.90 KB
THE INNOVATORS DILEMMA : WHEN NEW TECHNOLOGIES CAUSE GREAT FIRMS TO FAIL  

Companies stumble for many reasons: bureaucracy, arrogance, tired executives, poor planning, short-term investment horizons, inadequate skills and resources, and bad luck. Sears and DEC received accolades at the exact time when they were ignoring trends and making the wrong decisions on the future. The Innovator’s Dilemma has three main findings: Sustaining technologies are different than disruptive technologies The pace of progress often precedes the market’s awareness of the need Structures ...Read more >

3 Pages
33.0 KB
WIRED FOR WAR   

The growth in our use of unmanned systems has taken place so rapidly that we often forget how far we have come in just a short time. While U.S. forces went into Iraq with only a handful of drones in the air (all of V Corps had just one), by the end of 2008, there were 5,331 unmanned aircraft systems in the American inventory, from vigilant Global Hawks and armed Predators that circle thousands of feet overhead to tiny Ravens that peer over the next city block. A similar explosion happened on ...Read more >

7 Pages
461 KB
A RAND ANALYSIS TOOL FOR INTELLIGENCE, SURVEILLANCE AND RECONNAISSANCE  

This report is an introduction to the Collection Operations Model (COM), a stochastic, agentbased analysis tool for C3ISR written for the System Effectiveness Analysis Simulation (SEAS) modeling environment. SEAS is a multiagent, theater-operations simulation environment sponsored by the Air Force Space Command, Space and Missile Systems Center, Directorate of Developmental Planning, SEAS Program Office (SMC/XRIM) (see pp. 13 16). The COM grew out of ISR tasking and employment studies conducted ...Read more >

36 Pages
322 KB
POTENTIAL MILITARY USE OF AIRSHIPS AND AEROSTATS  

Airships and aerostats have been used historically for military surveillance and antisubmarine warfare. Unlike fixed-wing aircraft or helicopters, aerostats and airships are “lighter-than-air (LTA)”; typically using helium to stay aloft. Airships are traditionally manned, and use engines to fly. Aerostats are tethered to the ground, by a cable that also provides power. As many as 32 companies are involved in the design or manufacture of more than 100 commercially available airships and ...Read more >

6 Pages
38.1 KB
PREV
1 2 3 4 5 6 7 8 9
NEXT