De Aller-Bedste Bøger - over 12 mio. danske og engelske bøger
Levering: 1 - 2 hverdage

Bøger af Bradley Wilson

Filter
Filter
Sorter efterSorter Populære
  • - 15 Poems and 3 Short Stories
    af Bradley Wilson
    73,95 kr.

    BAD POETRY fifteen poems and three short stories includes: Second Dedication A literal (and literary) Easter egg primarily patterned on Dante's rhyme scheme, with minor alterations. Not mentioned in the Table of Contents. Dick or Nachos Short form delight from her mouth to your ears. A (metaphor) for Aphorism A poem composed of simple sayings. Forlorn Element In this ode, the humble material may be worth its weight in gold. The Most Fragile Stone The end of a poisonous relationship? Or the perpetuation? On Anonymity Every artist fears rejection. The Saint Valentine's Day Massacre In this wicked short story, Bernard lusts for his best friend's wife. But who lusts for Bernard? Dance Hall of the Moon Existential crisis. Yikes! Maybe a Few Regrets Sometimes relationships are lonelier than being alone. No it Isn't! Rage against an all too popular non-sequitur. The Good Part Loneliness refines us at an agonizing pace. The Marriage Counselor The real obstacle to fidelity is not a cheating heart! The Canyon of Many Hoodoos In this mystical short story, a weary traveler picks up the mantle of destiny by confronting his deadliest foe in the desert. Better Beatnik style free-form audacity addressed to a dear friend. A Thought Sensible rumination in tidy verse, to prove that the author is still capable of such after Better. To The Mathematicians We are too smug a society. Requiem In the same vein as the previous poem. Bitch, Please! Epistle to too self-absorbed a bitch. The Forbidden Place In this final short story, a curious night watchman enters a bare plywood shed at the back of a single acre property, never suspecting the consequence! Afterward: Text from Mom This is exactly what it sounds like.

  • af Bradley Wilson
    523,95 kr.

    The Department of Defense (DoD) has hypothesized that the demand signal for uncrewed systems (UxS) in the coming years will strain the capacity of the U.S. defense industrial base (DIB). DoD asked the RAND Corporation to explore this possibility and assemble relevant risks, issues, and opportunities to support ongoing DoD activities, including complying with statutory requirements to provide annual reports to Congress. The scope of the request covered many types of UxS, including uncrewed aerial systems (UAS), uncrewed ground systems (UGSs), and maritime platforms-specifically, uncrewed surface vehicles (USVs) and uncrewed underwater vehicles (UUVs). The authors consulted a variety of data sources and conducted interviews with officials from military UxS program offices, representatives from commercial entities, and subject matter experts. They examined fragility indicators, such as financial outlook, DoD sales, the number of firms in relevant sectors, and dependence on foreign sources of supply; and examined criticality indicators, such as defense uniqueness, design requirements, skilled labor needs, facility and equipment availability, materials and components with long lead times, and availability of alternatives. This report contains an analysis of required levels of autonomous UxS to meet DIB requirements, data on DIB categories and specific component elements within those categories, an assessment of the posture of the DIB to produce and sustain levels of UxS platforms as required by DoD, the results of a comparative analysis of near-peer nation-states China and Russia, and recommendations on strengthening the DIB.

  • af Bradley Wilson
    273,95 kr.

    U.S. Marine Corps Systems Command asked the RAND Corporation to assess the Marine Corps offensive cyber operations acquisition life cycle and identify ways to improve the transparency of related decisionmaking. The authors brought together data on operational capability, scheduling, and risk to develop a life-cycle cost-estimating framework. This framework should help Joint Cyber Weapons (JCW) program leadership understand the potential costs and provide additional guidance on budgeting considerations. It incorporates five classes of inputs and has three types of outputs. In creating the framework, the authors considered the demand for exploits from the operational user, as well as the type of cyber weapon (e.g., exploit, implant, payload), the weapon's target environment (e.g., desktop or mobile systems), vulnerability decay rate, the adversary's defense capabilities, weapon cost, and how various acquisitions are phased in and out of service over time. The framework also addresses the production of cyber weapons, their costs, and how uncertainties are distributed over a specified period. The authors conducted exploratory modeling and simulation to better understand associated uncertainties and model inputs.

  • af Bradley Wilson
    278,95 kr.

    Researchers developed a methodology to assess the value of resource options for U.S. Navy cybersecurity investments. The proposed methodology enables the Navy to rationalize the cost-effectiveness of potential investments within the POM process.

  • - Analysis of Alternatives
    af Jessie Riposo, Bradley Wilson & Thomas Goughnour
    378,95 kr.

    The U.S. Navy''s aviation maintenance capability suffers from supportability issues because of its antiquated software architecture and codebase. This report presents the results of an analysis of alternatives for fielding the Naval Aviation Maintenance System, which is intended to help modernize the Navy''s afloat and ashore maintenance capabilities. The authors find that the Navy should migrate to a commercial off-the-shelf solution.

  • af Bradley Wilson, Shane Tierney & Brendan Toland
    498,95 kr.

    To support U.S. Department of Homeland Security efforts to prioritize capability investments, this report examines trends in small unmanned aerial system development, the features that are likely to aid nefarious users, and how such actors could use an sUAS (or multiple systems) to conduct various types of operations-from surveilling U.S. government facilities to dispersing a chemical agent at a large public event.