The genesis of major weapon systems
Article Abstract:
It is getting harder and harder to plan for defensive weapon systems when the development cycle requires planners to try and predict what enemy systems will be like ten or more years down the road. The goal of designing a defense system that responds to a current enemy threat is becoming more elusive as a result. Weapons forecasting ends up encouraging planners to exaggerate technological requirements in order to compensate for imprecise knowledge about enemy defense equipment. At the same time, new technologies spur planners to opt for requirements that cost more than available resources. The resulting birth of a weapons system is fated to become embroiled in cost overruns. Obtaining hard data on future enemy defense systems relies on hit-and-miss tactics, some of which are ascertainable only by actually going to war. Weapons improvements in the field are becoming easier to implement due to a program where scientists visit with soldiers to see where improvements are needed.
Publication Name: IEEE Spectrum
Subject: Engineering and manufacturing industries
ISSN: 0018-9235
Year: 1988
User Contributions:
Comment about this article or add new information about this topic:
Encouraging risk-taking, sanctioning failures are helping spur creativity
Article Abstract:
Corporations sometimes try to foster creativity among employees, particularly those in the research and development professions. Some companies encourage risk taking and endeavor to expose researchers to new ideas by interaction with one another. Creativity may not be something that can be controlled, and the only way to get people to be creative is to hire creative people in the first place, although this may be hard to ascertain in a job interview. Brainstorming can be successful when people are not afraid of looking foolish or of failing in some manner. The environment must be supportive for all ideas; new researchers are assigned mentors by some companies so they may feel they are in a supportive place. There may never be a formula for invention, however, due to the fact that the techniques for promoting innovation are as varied as the creative process itself.
Publication Name: IEEE Spectrum
Subject: Engineering and manufacturing industries
ISSN: 0018-9235
Year: 1990
User Contributions:
Comment about this article or add new information about this topic:
The quest for intruder-proof computer systems
Article Abstract:
Everyone agrees on the need to implement security measures in order to have data systems that are impervious to tampering or unauthorized access. However, not everyone can agree on which of the widely varying security systems offers the best mix of protection and price. The traditional password poses a risk because intruders can use a dictionary program to access the files, so experts recommend that passwords be combinations of letters and numbers. Modem access is often a soft spot, so organizations should implement either call-back systems or ones which will deny access after a limited number of wrong attempts. Between 70,000 and 100,000 users currently utilize so-called smart cards with dynamic passwords which change constantly. Biometric devices capable of recognizing unique human traits are also available, but are expensive.
Publication Name: IEEE Spectrum
Subject: Engineering and manufacturing industries
ISSN: 0018-9235
Year: 1989
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: The development of an object-oriented simulation system based on the thought process of the manufacturing system design
- Abstracts: Technology eyed for mercury control. Consider a case-based system for control of complex processes. Wasterwater treatment project ends in success
- Abstracts: The metamorphosis of the quality professional. How to become an internal consultant. Has your work life plateaued?
- Abstracts: Flex in specs: a license to innovate? Learning from earlier systems
- Abstracts: Simple extensions of safe-point methods for stiff systems. Directory of vendors of simulators, specific components and related services