World Library  



Technology (207 Books)


Works of technology refer to the making, modification, usage, and knowledge of tools, machines, techniques, crafts, systems, methods of organization, in order to solve a problem, improve a preexisting solution to a problem, achieve a goal or perform a specific function. It can also refer to the collection of such tools, machinery, modifications, arrangements and procedures. Technologies significantly affect human as well as other animal species' ability to control and adapt to their natural environments.

 
  • Cover Image

Libraries of the Future

By: J.C.R. Licklider

This report of research on concepts and problems of "Libraries of the Future" records the result of a two-year inquiry into the applicability of some of the newer techniques for handling information to what goes at present by the name of library work— i.e., the operations connected with assembling information in recorded form and of organizing and making it available for use.

Read More
  • Cover Image

Comment créer et Optimiser son profil Google+ : Pour plus de visib...

By: Noel NGUESSAN; Noel NGUESSAN, Editor
Read More
  • Cover Image

Affiliate Assassin to Create Targeted Affiliate Marketing Campaign...

By: Jeffrey Benson

Discover how to create laser targeted affiliate marketing campaigns

you can literally start making money online in a matter of a few days, even a few hours.

Read More
  • Cover Image

Facebook Marketing Profit Masters : Learn the Most Profitable Stra...

By: David Drummy Lewis, Mr.

***Learn proven strategies to earn passive income using Facebook. A step by step process to profit from Facebook while helping people.*** You need this training! Also i encourage you to download and share this free guide with your friends. Thank you

Read More
  • Cover Image

Using Visual SourceSafe : SourceSafe / VSS Tutorial, Volume 163: S...

By: Kevin Gao

Although this SourceSafe tutorial can be used for anyone who is interested in SourceSafe, it is mainly for software developers. As you may have been using SourceSafe for a long time and know many features of VSS, I will try to make the table of the content easy to navigate so hopefully you can easily find the information that you are interested in.

In this SourceSafe How To series / tutorial, I will write some guides, How To and FAQs about SourceSafe and will also post resources I found on the internet. This series will cover some basic and intermediate topics of SourceSafe as well as some advanced topics.

Read More
  • Cover Image

X-15 Research Results

By: Wendell H. Stillwell

This semi-technical summary of the X–15 program is directed toward the less publicized aspects of its achievements.

Read More
  • Cover Image

Unmanned Space Project Management : Surveyor and Lunar Orbiter: Su...

By: Erasmus H. Kloman

NASA commissioned a study of the management of the Surveyor and Lunar Orbiter projects.

Read More
  • Cover Image

Cosmos & Culture : Cultural Evolution in a Cosmic Context: Cultura...

By: Steven J. Dick, Editor; Mark L. Lupisella, Editor

Integrating concepts from philosophical, anthropological, and astrobiological disciplines, Cosmos and Culture begins to explore the interdisciplinary questions of cosmic evolution.

Read More
  • Cover Image

When Biospheres Collide : A History of NASA’s Planetary Protection...

By: Michael Meltzer

The history of planetary protection is presented by tracing the responses to interplanetary concerns on NASA's missions.

Read More
  • Cover Image

Air Force Research Institute Papers 2012-5 : Air Force Command and...

By: Hukill, Johnson, Carter, Lizzol, Redman, Yannakogeorgos

On 23 November 2010, the chief of staff of the Air Force tasked the Air Force Research Institute to review Air Force command and control (C2) to determine whether doctrine and organizational structures require changes to ensure success in uncertain and dynamic future scenarios. The research team concluded that, to maximize effectiveness, the Air Force must organize, train, and equip its C2 structure to increase adaptability, building improved integration with partners— e...

Read More
  • Cover Image

Technology Horizons : A Vision for Air Force Science and Technolog...

By: Office of the US Air Force Chief Scientist

Technology Horizons is our vision for key Air Force science and technology investments over the next decade that will provide us with truly game-changing capabilities to meet our strategic and joint force responsibilities. The coming decades hold high promise for amazing new capabilities across the air, space, and cyber domains. Yet the Air Force and our nation will also be confronted with substantial strategic, technology, and budget challenges. Our greatest advances wi...

Read More
  • Cover Image

Wright Flyer Paper : How Small Is Too Small?; Technology into 2035...

By: Major Paul E. Kladitis, USAF

The Department of Defense (DOD) anticipates the realization of biomimetic bird and two-inch, insect-sized systems within the 2015–47 period. Although robot systems of one millimeter or smaller are not explicitly specified in current DOD and Air Force technology road maps, the technological aims towards this size can be clearly inferred from official documents. This research assesses the likelihood of, and barriers to, the realization of true microrobots and nanorobots (d...

Read More
  • Cover Image

Build-to-shelve Prototyping : Undercutting Doctrinal Development

By: Lieutenant Colonel Donald “Bud” Vazquez, USAF

I submit there are two ways we can use limited numbers of prototype systems to ensure we learn relevant tactical lessons before we have to fight:(1) capitalizing on interactive computing technologies to better develop requirements and tactics throughout the system life cycle and (2) changing our concept of prototypes from the buying of one or two “experimental”items to procuring entire “prototypical” units.

Read More
  • Cover Image

More than Just a Nuisance : When Aerial Terror Bombing Works

By: Major C. G. C. Treadway, USAF

This thesis examines three campaigns during which aerial terror raids, peripheral to the main war efforts and incapable of destroying the enemy war-making capacity, elicited disproportionate reactions from the targeted leaderships. The raids on London during World War I, the V-1 and V-2 raids on London three decades later, and the Scud attacks on Israel during Desert Storm each show evidence of overreaction by Allied/coalition leaders. A review of the nature of terrorism...

Read More
  • Cover Image

The Air Refueling Receiver that Does Not Complain

By: Major Jeffrey L. Stephenson, USAF

This study focuses on the development of aerial refueling methods and procedures for unmanned aerial vehicles (UAV). The author states the need for UAVs, lists assumptions, and gives a brief background on them. His discussion of the three current Air Force UAV systems (Predator, DarkStar, and Global Hawk) is followed by some proposed methods and procedures for rendezvous and aerial refueling of these UAV platforms. The author rounds out his discussion by comparing and an...

Read More
  • Cover Image

Rethinking the Air Operations Center : Air Force Command and Contr...

By: Major J. Taylor Sink, USAF

The study concludes with recommendations for rethinking the Air Operations Center. Methods for improving responsiveness include time-value based target analysis, greater use of alert or reserve forces, on-board mission planning, and limited decentralization, with mission-type orders and commander’s intent transmitted to lower echelons. Solutions for improving assessment include delegating target assessment functions to the wings, focusing theater-level intelligence perso...

Read More
  • Cover Image

Unmanned Aerial Vehicles and Weapons of Mass Destruction : A Letha...

By: Major Jeffrey N. Renehan, USAF

This study analyzes the characteristics and capabilities of unmanned aerial vehicles (UAV) to determine their capability to carry weapons of mass destruction (WMD). The author presents an overview of the various forms of WMD—chemical, biological, and nuclear weapons. The objective is to review the characteristics of both UAVs and WMD to determine if they are capable of being used together as an effective weapon. The result indicates that there is great potential for the ...

Read More
  • Cover Image

Coercive Air Strategy : Forcing a Bureaucratic Shift

By: Major John I. Pray, USAF

The purpose of this work is to provide the air planner with an air strategy that may, under certain defined conditions, be more likely to yield success than current air power theories. Our current stock of strategic ideas tend to rely on a unitary, rational actor assumption to describe the decision-making environments of our potential adversaries. We believe reliance on this simplistic assumption may skew the counterstrategy development process. We propose an alternate d...

Read More
  • Cover Image

To War on Tubing and Canvas : A Case Study in the Interrelationshi...

By: Lieutenant Colonel Jonathan C. Noetzel, USAF

The study reviews each force’s combat glider experience and analyzes it in light of the glider doctrine, or lack thereof, with which each began the war. While military cargo gliders have seen their day, recent technological advances in gliders make them a viable platform for certain missions requiring stealth and silence.

Read More
  • Cover Image

To War on Tubing and Canvas : A Case Study in the Interrelationshi...

By: Lieutenant Colonel Jonathan C. Noetzel, USAF

The study reviews each force’s combat glider experience and analyzes it in light of the glider doctrine, or lack thereof, with which each began the war. While military cargo gliders have seen their day, recent technological advances in gliders make them a viable platform for certain missions requiring stealth and silence.

Read More
 
1
|
2
|
3
|
4
|
5
Records: 41 - 60 of 207 - Pages: 



Copyright © World Library Foundation. All rights reserved. eBooks from Hawaii eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.