This book pioneers the study of Lįnnang-uč, deeply embedded in Manilas Lannang communitys culture. It approaches Lįnnang-uč not just as a language but as a vibrant social practice, highlighting its variability and complex social meanings (e.g., iden...Daugiau...
Martin Claar, Nicole Loring, Clint W. Jones, Esra Merve Ēaliskan Ēaliskan, Martin Claar, Isabel F. Gonzales, Daniel W. Hille, Shelly Johnson, Clint W. Jones, Damir Kovacevic...
This book examines the representation of terrorists and terrorisms in films, television shows, books, video games, and other popular cultural formats aimed at children and young adults to reveal the messaging that future decision-makers receive via...Daugiau...
Yun Kang, You Won Park, David A Shlapak, Seok Joon Kwon, Daniel Gonzales, Natalia Henriquez Sanchez, John J Lee, Dong Ho Chung, Miyeon Oh, Bradley Martin...
South Korea faces challenging choices as the great-power rivalry between the United States and China intensifies. In this report, the authors describe their key insights from an analytical policy game they designed featuring two scenarios that exp...Daugiau...
This report summarizes an alternative futures analysis of how the global digital infrastructure could evolve out to 2050 and the military implications of those futures for the United States and China. A competition for digita...Daugiau...
Edward Parker, Richard Silberglitt, Daniel Gonzales, Natalia Henriquez Sanchez, Justin W Lee, Lindsay Rand, Jon Schmid, Peter Dortmans, Christopher A Eusebi
This report presents an assessment of the quantum technology industrial bases of several U.S.-allied nations that are major players in the development of quantum technology, beginning with a global look and then focusing on the quantum industrial...Daugiau...
Aino Ursula Mäki, Javier Gonzales-Iwanciw, Alice Vadrot, Andreas Goldthau, Anna Kosovac, Claudia Ringler, Daniel Pejic, Daniela Kleinschmit, Ekaterina Chertkovskaya, Eva Alfredsson...
Available Open Access digitally under CC-BY-NC-ND licence.With Agenda 2030, the UN adopted wide-ranging Sustainable Development Goals (SDGs) that integrate development and environmental agendas. This book focuses on the political tensions between the...Daugiau...
Information and intelligence-and the degree of access to and control of the systems within which the data reside-can yield power and influence at scale. These systems and the networks they create collectively make up digital infrastructure (DI). Spaw...Daugiau...
In this report, researchers describe fifth-generation (5G) security and identify where the United States has security advantages or disadvantages relative to China in the 5G competition and how to preserve those advantages....Daugiau...
Edward Parker, Christopher A Eusebi, Daniel Gonzales, Ajay K Kochhar, Sydney Litterer, Kathryn O'Connor, Jon Schmid, Keller Scholl, Richard Silberglitt, Joan Chang...
Quantum technology could eventually deliver transformative new capabilities with significant economic and national security impacts. Only recently has research and development (R&D) expanded beyond basic science research (primarily conducted within...Daugiau...
This report describes a way for the U.S. Department of Defense to better secure unclassified networks holding defense information—through the establishment of a cybersecurity program designed to strengthen the protections of these net...Daugiau...
Chemical admixtures are used in concrete mixtures to produce particular engineering properties such as rapid hardening, water-proofing or resistance to cold. Chemical Admixtures for Concrete surveys recent developments in admixture technolog...Daugiau...
The proposed regulations could provide safety benefits to nearby communities and cost benefits to California consumers. The frequency of major refinery incidents would need to decline by 7.3 percent for the regulations to pay for themselv...Daugiau...
Many current unmanned systems (UxSs) employ different communication systems and have limited autonomy, which limit information sharing with warfighters and other UxSs. This report identifies ways to address these limitations. ...Daugiau...
Mark V. Arena, Rena Rudavsky, Irv Blickstein, Daniel Gonzales, Sarah Harting, Jennifer Lamping Lewis, Michael McGee, Megan McKErnan, Charles Nemfakos, Jan Osburg...
Compares aspects of the Joint Tactical Radio System network domain program with similar elements for the commercial long-term evolution waveform and analyzes acquisition programs that have repeatedly exceeded certain cost thresholds....Daugiau...
The Department of Defense has developed new sensor technologies to support military forces operating in Iraq and Afghanistan. These new capabilities may be useful in counterdrug operations along the southern U.S. border. DoD has held technology demon...Daugiau...
Presents an approach to determine what parties have authority to issue interoperability policy, the legal and policy origins and implementation paths of the authority, and the scope of that authority, shown in a roles and responsibilities...Daugiau...
The authors present a framework and methodology to identify the roles and responsibilities of those implementing Department of Defense policies and also potential conflicts, ambiguities, gaps, inconsistencies, and redundancies in th...Daugiau...
Universal Core (UCore) 2.0 is a Department of Defense (DoD) and intelligence community information exchange framework that can improve interoperability between DoD information systems. This report reviews UCore pilot programs, implementation issues,...Daugiau...
The roles and responsibilities of defense acquisition officers and Department of Defense (DoD) chief information officers are governed by U.S. laws and specified in more detail by a growing and complex body of DoD policy. The authors identify policy...Daugiau...
The challenges associated with securing U.S. Department of Defense (DoD) information systems have grown as the departments information infrastructure has become more complex and interconnected. At the same time, the potential negative consequences a...Daugiau...
Compares three units that conducted stability operations in the same area in northern Iraq-the 101st Airborne Division (which had only limited digital communications), the 3/2 Stryker brigade combat team (SBCT), and the 1/25 SBCT (both equipped with...Daugiau...
How will the network centric operational concepts, organizational structure, and systems of this new Army unit make it more effective combat force?...Daugiau...
Ši knyga nebeleidžiama, tačiau mes Jums pranešime naudoto egzemplioriaus kainą
Gallegos (California State Polytechnic University) offers an introductory reference for beginning IT auditors, explaining foundation concepts of IT audit and control, analyzing the process of audit and review, exploring IT governance and control, dis...Daugiau...
The Multifunctional Information Distribution System (MIDS) program-a U.S.-led international development program of Link 16 data communications terminals--is likely to present challenges to the U.S. Air Force and the MIDS International Program Office...Daugiau...
Chemical admixtures are used in concrete mixtures to produce particular engineering properties such as rapid hardening, water-proofing or resistance to cold. Chemical Admixtures for Concrete surveys recent developments in admixture technolog...Daugiau...
Discusses the growth in the technical capabilities of commercial and foreign space systems, potential explotation of space by adversaries, increasing use of commercial space capabilities by U.S. forces, and continuing budget constraints are all chang...Daugiau...
The authors find that in the long term, an air-launched military TAV would be more cost effective than a small expendable launch vehicle such as Pegasus....Daugiau...