Topic: Military history/Military science, technology, and theory (Page 2)

You are looking at all articles with the topic "Military history/Military science, technology, and theory". We found 97 matches.

Hint: To view all topics, click here. Too see the most popular topics, click here instead.

πŸ”— Demon Core

πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Weaponry

The demon core was a spherical 6.2-kilogram (14Β lb) subcritical mass of plutonium 89 millimetres (3.5Β in) in diameter, that was involved in two criticality accidents, on August 21, 1945 and May 21, 1946. The core was intended for use in a third nuclear weapon, but remained in use for testing after Japan's surrender. It was designed with a small safety margin to ensure a successful explosion of the bomb. The device briefly went supercritical when it was accidentally placed in supercritical configurations during two separate experiments intended to guarantee the core was indeed close to the critical point. The incidents happened at the Los Alamos Laboratory in 1945 and 1946, both resulting in the acute radiation poisoning and subsequent deaths of scientists: Harry Daghlian and Louis Slotin. After these incidents the spherical plutonium core was referred to as the "demon core".

Discussed on

πŸ”— NOBUS (Nobody but Us)

πŸ”— Computing πŸ”— Computing/Computer hardware πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Military science, technology, and theory πŸ”— Computer Security πŸ”— Computer Security/Computing πŸ”— Computing/Software πŸ”— Military history/Intelligence πŸ”— Computing/Computer Security πŸ”— Computing/Networking

NOBUS ("nobody but us") are security vulnerabilities which the United States National Security Agency (NSA) believes that only it can exploit. As such, NSA sometimes chooses to leave such vulnerabilities open if NSA finds them, in order to exploit them against NSA's targets. More broadly, it refers to the notion that some signals intelligence capabilities are so powerful or otherwise inaccessible that only the NSA will be able to deploy them, though recent analyses suggest that this advantage may be under stress.

Discussed on

πŸ”— Bastion Fort

πŸ”— Military history πŸ”— Military history/Military science, technology, and theory πŸ”— Architecture πŸ”— Urban studies and planning πŸ”— Military history/Fortifications πŸ”— Civil engineering πŸ”— Engineering

A bastion fort or trace italienne (a phrase improperly derived from French, literally meaning Italian outline), is a fortification in a style that evolved during the early modern period of gunpowder when the cannon came to dominate the battlefield. It was first seen in the mid-15th century in Italy. Some types, especially when combined with ravelins and other outworks, resembled the related star fort of the same era.

The design of the fort is normally a polygon with bastions at the corners of the walls. These outcroppings eliminated protected blind spots, called "dead zones", and allowed fire along the curtain from positions protected from direct fire. Many bastion forts also feature cavaliers, which are raised secondary structures based entirely inside the primary structure.

Discussed on

πŸ”— Project A119

πŸ”— Spaceflight πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Military science, technology, and theory πŸ”— Moon πŸ”— Military history/Cold War πŸ”— Cold War πŸ”— Solar System πŸ”— Solar System/Moon

Project A119, also known as A Study of Lunar Research Flights, was a top-secret plan developed in 1958 by the United States Air Force. The aim of the project was to detonate a nuclear bomb on the Moon, which would help in answering some of the mysteries in planetary astronomy and astrogeology. If the explosive device detonated on the surface, not in a lunar crater, the flash of explosive light would have been faintly visible to people on Earth with their naked eye, a show of force resulting in a possible boosting of domestic morale in the capabilities of the United States, a boost that was needed after the Soviet Union took an early lead in the Space Race and was also working on a similar project.

The project was never carried out, being cancelled primarily out of a fear of a negative public reaction, with the potential militarization of space that it would also have signified, and because a Moon landing would undoubtedly be a more popular achievement in the eyes of the American and international public alike. A similar project by the Soviet Union also never came to fruition.

The existence of the US project was revealed in 2000 by a former executive at the National Aeronautics and Space Administration (NASA), Leonard Reiffel, who led the project in 1958. A young Carl Sagan was part of the team responsible for predicting the effects of a nuclear explosion in vacuum and low gravity and in evaluating the scientific value of the project. The project documents remained secret for nearly 45 years, and despite Reiffel's revelations, the United States government has never officially recognized its involvement in the study.

Discussed on

πŸ”— OODA Loop

πŸ”— Military history πŸ”— Military history/Military science, technology, and theory πŸ”— Systems πŸ”— Systems/Systems engineering

The OODA loop is the cycle observe–orient–decide–act, developed by military strategist and United States Air Force Colonel John Boyd. Boyd applied the concept to the combat operations process, often at the operational level during military campaigns. It is now also often applied to understand commercial operations and learning processes. The approach explains how agility can overcome raw power in dealing with human opponents. It is especially applicable to cyber security and cyberwarfare.

The OODA loop has become an important concept in litigation, business, law enforcement, management education, and military strategy. According to Boyd, decision-making occurs in a recurring cycle of observe–orient–decide–act. An entity (whether an individual or an organization) that can process this cycle quickly, observing and reacting to unfolding events more rapidly than an opponent, can thereby "get inside" the opponent's decision cycle and gain the advantage.

Discussed on

πŸ”— The ADE 651 is a fake bomb detector, sold for up to US$60k each

πŸ”— Military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Weaponry πŸ”— Skepticism πŸ”— Law Enforcement πŸ”— Iraq πŸ”— British crime πŸ”— Explosives

The ADE 651 is a fake bomb detector produced by the British company Advanced Tactical Security & Communications Ltd (ATSC). Its manufacturer claimed it could detect bombs, guns, ammunition, and more from kilometers away. However, it was a scam, and the device was little more than a dowsing rod. The device was sold for up to US$60,000 each, despite costing almost nothing to produce. It was widely used in the Middle East, and may have led to numerous deadly bombings in Iraq due to its inability to detect explosives. Its inventor, James McCormick, was sentenced to 10 years in prison in 2013 for fraud.

Discussed on

πŸ”— Great Stirrup Controversy

πŸ”— Military history πŸ”— Military history/Military science, technology, and theory πŸ”— Equine πŸ”— Military history/Medieval warfare

The Great Stirrup Controversy is the academic debate about the Stirrup Thesis, the theory that feudalism in Europe developed largely as a result of the introduction of the stirrup to cavalry in the 8th century CE. It relates to the hypothesis suggested by Lynn Townsend White Jr. in his 1962 book, Medieval Technology and Social Change. White believed that the stirrup enabled heavy cavalry and shock combat, which in turn prompted the Carolingian dynasty of the 8th and 9th centuries to organize its territory into a vassalage system, rewarding mounted warriors with land grants for their service. White's book has proved very influential, but others have accused him of speculation, oversimplification, and ignoring contradictory evidence on the subject. Scholars have debated whether the stirrup actually provided the impetus for this social change, or whether the rise of heavy cavalry resulted from political changes in Medieval Europe.

Discussed on

πŸ”— List of military tactics

πŸ”— Military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Weaponry πŸ”— Lists πŸ”— Military history/Intelligence πŸ”— Military history/Military land vehicles

This page contains a list of military tactics.

The meaning of the phrase is context sensitive, and has varied over time, like the difference between "strategy" and "tactics".

Discussed on

πŸ”— Pykrete

πŸ”— Technology πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/Military science, technology, and theory πŸ”— Architecture πŸ”— United Kingdom πŸ”— Transport πŸ”— Military history/Maritime warfare πŸ”— Military history/World War II πŸ”— Civil engineering πŸ”— Engineering πŸ”— Transport/Maritime πŸ”— Military history/Canadian military history πŸ”— Military history/European military history πŸ”— Military history/British military history

Pykrete is a frozen ice alloy , originally made of approximately 14 percent sawdust or some other form of wood pulp (such as paper) and 86 percent ice by weight (6 to 1 by weight). During World War II, Geoffrey Pyke proposed it as a candidate material for a supersized aircraft carrier for the British Royal Navy. Pykrete features unusual properties, including a relatively slow melting rate due to its low thermal conductivity, as well as a vastly improved strength and toughness compared to ordinary ice. These physical properties can make the material comparable to concrete, as long as the material is kept frozen.

Pykrete is slightly more difficult to form than concrete, as it expands during the freezing process. However, it can be repaired and maintained using seawater as a raw material. The mixture can be moulded into any shape and frozen, and it will be tough and durable, as long as it is kept at or below freezing temperature. Resistance to gradual creep or sagging is improved by lowering the temperature further, to βˆ’15Β Β°C (5Β Β°F).

Discussed on

πŸ”— Crypto AG

πŸ”— United States πŸ”— Mass surveillance πŸ”— Espionage πŸ”— Companies πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Intelligence πŸ”— Cryptography πŸ”— Cryptography/Computer science πŸ”— Switzerland πŸ”— Military history/Cold War πŸ”— Sweden

Crypto AG was a Swiss company specialising in communications and information security. It was secretly jointly owned by the American Central Intelligence Agency (CIA) and West German Federal Intelligence Service (BND) from 1970 until about 1993, with the CIA continuing as sole owner until about 2018. With headquarters in Steinhausen, the company was a long-established manufacturer of encryption machines and a wide variety of cipher devices.

The company had about 230 employees, had offices in Abidjan, Abu Dhabi, Buenos Aires, Kuala Lumpur, Muscat, Selsdon and Steinhausen, and did business throughout the world. The owners of Crypto AG were unknown, supposedly even to the managers of the firm, and they held their ownership through bearer shares.

The company has been criticised for selling backdoored products to benefit the American, British and German national signals intelligence agencies, the National Security Agency (NSA), the Government Communications Headquarters (GCHQ), and the BND, respectively. On 11 February 2020, The Washington Post, ZDF and SRF revealed that Crypto AG was secretly owned by the CIA in a highly classified partnership with West German intelligence, and the spy agencies could easily break the codes used to send encrypted messages. The operation was known first by the code name "Thesaurus" and later "Rubicon".

Discussed on