National Defense Authorization Act for Fiscal Year 2000

Total Page:16

File Type:pdf, Size:1020Kb

National Defense Authorization Act for Fiscal Year 2000 106TH CONGRESS REPORT 1st Session HOUSE OF REPRESENTATIVES 106±162 "! NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 R E P O R T OF THE COMMITTEE ON ARMED SERVICES HOUSE OF REPRESENTATIVES ON H.R. 1401 together with ADDITIONAL, SUPPLEMENTAL, AND DISSENTING VIEWS [Including cost estimate of the Congressional Budget Office] MAY 24, 1999.ÐCommitted to the Committee of the Whole House on the State of the Union and ordered to be printed NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 1 106TH CONGRESS REPORT 1st Session HOUSE OF REPRESENTATIVES 106±162 "! NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 R E P O R T OF THE COMMITTEE ON ARMED SERVICES HOUSE OF REPRESENTATIVES ON H.R. 1401 together with ADDITIONAL, SUPPLEMENTAL, AND DISSENTING VIEWS [Including cost estimate of the Congressional Budget Office] MAY 24, 1999.ÐCommitted to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 56±735 WASHINGTON : 1999 HOUSE COMMITTEE ON ARMED SERVICES ONE HUNDRED SIXTH CONGRESS FLOYD D. SPENCE, South Carolina, Chairman BOB STUMP, Arizona IKE SKELTON, Missouri DUNCAN HUNTER, California NORMAN SISISKY, Virginia JOHN R. KASICH, Ohio JOHN M. SPRATT, Jr., South Carolina HERBERT H. BATEMAN, Virginia SOLOMON P. ORTIZ, Texas JAMES V. HANSEN, Utah OWEN PICKETT, Virginia CURT WELDON, Pennsylvania LANE EVANS, Illinois JOEL HEFLEY, Colorado GENE TAYLOR, Mississippi JIM SAXTON, New Jersey NEIL ABERCROMBIE, Hawaii STEVE BUYER, Indiana MARTIN T. MEEHAN, Massachusetts TILLIE K. FOWLER, Florida ROBERT A. UNDERWOOD, Guam JOHN M. MCHUGH, New York PATRICK J. KENNEDY, Rhode Island JAMES TALENT, Missouri ROD R. BLAGOJEVICH, Illinois TERRY EVERETT, Alabama SILVESTRE REYES, Texas ROSCOE G. BARTLETT, Maryland TOM ALLEN, Maine HOWARD ``BUCK'' MCKEON, California VIC SNYDER, Arkansas J.C. WATTS, Jr., Oklahoma JIM TURNER, Texas MAC THORNBERRY, Texas ADAM SMITH, Washington JOHN N. HOSTETTLER, Indiana LORETTA SANCHEZ, California SAXBY CHAMBLISS, Georgia JAMES H. MALONEY, Connecticut VAN HILLEARY, Tennessee MIKE MCINTYRE, North Carolina JOE SCARBOROUGH, Florida CIRO D. RODRIGUEZ, Texas WALTER B. JONES, Jr., North Carolina CYNTHIA A. MCKINNEY, Georgia LINDSEY GRAHAM, South Carolina ELLEN O. TAUSCHER, California JIM RYUN, Kansas ROBERT BRADY, Pennsylvania BOB RILEY, Alabama ROBERT E. ANDREWS, New Jersey JIM GIBBONS, Nevada BARON P. HILL, Indiana MARY BONO, California MIKE THOMPSON, California JOSEPH PITTS, Pennsylvania JOHN B. LARSON, Connecticut ROBIN HAYES, North Carolina STEVEN KUYKENDALL, California DONALD SHERWOOD, Pennsylvania ANDREW K. ELLIS, Staff Director (II) (II) C O N T E N T S Page Explanation of the Committee Amendments ........................................................ 1 Purpose ..................................................................................................................... 2 Relationship of Authorization to Appropriations .................................................. 2 Summary of Authorization in the Bill ................................................................... 2 Summary Table of Authorizations ...................................................................... 3 Rationale for the Committee Bill ........................................................................... 10 The Administration's Defense Budget Request ................................................. 11 The Committee Bill: Managing Risk .................................................................. 12 Hearings ................................................................................................................... 13 DIVISION AÐDEPARTMENT OF DEFENSE AUTHORIZATION .................... 13 TITLE IÐPROCUREMENT ................................................................................... 13 OVERVIEW .......................................................................................................... 13 Aircraft Procurement, Army ............................................................................ 17 Overview ........................................................................................................ 17 Items of Special Interest .............................................................................. 21 AH±64 modifications ................................................................................. 21 Aircraft survivability equipment (ASE) ................................................... 21 Aircraft survivability equipment (ASE) modifications ........................... 22 CH±47 cargo helicopter modifications ..................................................... 22 Longbow ..................................................................................................... 22 UH±60 Blackhawk .................................................................................... 23 UH±60 modifications ................................................................................. 23 Utility/cargo airplane modifications ......................................................... 24 Missile Procurement, Army ............................................................................. 24 Overview ........................................................................................................ 24 Items of Special Interest .............................................................................. 27 Avenger modifications ............................................................................... 27 Avenger system summary ........................................................................ 27 Brilliant anti-armor (BAT) submunition ................................................. 27 Multiple launch rocket system (MLRS) launcher systems .................... 27 Weapons and Tracked Combat Vehicles, Army ............................................. 28 Overview ........................................................................................................ 28 Items of Special Interest .............................................................................. 32 Abrams upgrade program/heavy assault bridge (HAB) ......................... 32 Bradley base sustainment ........................................................................ 32 M113 carrier modifications ....................................................................... 33 M240 series medium machine gun .......................................................... 33 M249 squad automatic weapon (SAW) .................................................... 33 MK19±3 grenade launcher ....................................................................... 33 Ammunition Procurement, Army .................................................................... 34 Overview ........................................................................................................ 34 Items of Special Interest .............................................................................. 38 Ammunition ............................................................................................... 38 Hydra 70 rockets ....................................................................................... 38 Provision of industrial facilities ............................................................... 38 Other Procurement, Army ............................................................................... 39 Overview ........................................................................................................ 39 Items of Special Interest .............................................................................. 51 Area common user system (ACUS) modification program ..................... 51 Army data distribution system (ADDS) .................................................. 51 Artillery accuracy equipment ................................................................... 51 Automated data processing equipment (ADPE) ..................................... 52 Combat support medical ........................................................................... 52 (III) IV Page Family of heavy tactical vehicles ............................................................. 53 General purpose vehicles .......................................................................... 53 High speed compactor ............................................................................... 53 Hunter unmanned aerial vehicle (UAV) .................................................. 53 Information system security program (ISSP) ......................................... 54 Integrated family of test equipment (IFTE) ............................................ 54 Items less than $2.0 million (construction equipment) .......................... 54 Joint surveillance target attack radar system (Joint STARS) Common ground station (CGS) ............................................................................. 55 Lightweight video reconnaissance system (LVRS) ................................. 55 M56 smoke generator system ................................................................... 55 Modification of in-service equipment ....................................................... 56 Modification of in-service equipment (tactical surveillance) .................. 56 Night vision devices .................................................................................. 57 Nonsystem training devices ...................................................................... 57 Product improved (PI) combat vehicle crewman (CVC) headset ........... 58 Ribbon bridge
Recommended publications
  • Njit-Etd2010-076
    Copyright Warning & Restrictions The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions specified in the law, libraries and archives are authorized to furnish a photocopy or other reproduction. One of these specified conditions is that the photocopy or reproduction is not to be “used for any purpose other than private study, scholarship, or research.” If a, user makes a request for, or later uses, a photocopy or reproduction for purposes in excess of “fair use” that user may be liable for copyright infringement, This institution reserves the right to refuse to accept a copying order if, in its judgment, fulfillment of the order would involve violation of copyright law. Please Note: The author retains the copyright while the New Jersey Institute of Technology reserves the right to distribute this thesis or dissertation Printing note: If you do not wish to print this page, then select “Pages from: first page # to: last page #” on the print dialog screen The Van Houten library has removed some of the personal information and all signatures from the approval page and biographical sketches of theses and dissertations in order to protect the identity of NJIT graduates and faculty. ABSTRACT AUTOMATION OF ANATOMIC TORSION MONITOR FOR EVALUATION AND IMPROVEMENT OF LOW BACK DYSFUNCTION by Vishal Kumar Singh The existing Anatomical Torsion Monitor (ATM) to evaluate mechanical stiffness and viscoelasticity of the low back suffers from various inherent defects. This has to be replaced by an improved device. Also the existing ATM cannot provide oscillations to the low back.
    [Show full text]
  • ICCD Thesaurus Per La Definizione Dei Reperti Archeologici Agg2020-21
    MINISTERO DELLA CULTURA ISTITUTO CENTRALE PER IL CATALOGO E LA DOCUMENTAZIONE Strumenti terminologici Thesaurus per la definizione dei reperti archeologici mobili (applicazione nella scheda RA - Reperti archeologici, versione 3.00) aggiornamento 2020 - 21 Coordinamento: Maria Letizia Mancinelli (ICCD - Servizio per la qualità degli standard catalografici) Collaborazione tecnico-scientifica (ricerche e stesura del vocabolario, aggiornamenti, 2009 - 2014): Maria Teresa Natale Collaborazione tecnico-scientifica (aggiornamento 2020-21): Eugenia Imperatori Premessa L’esposizione dei contenuti del thesaurus è organizzata sulla base della seguente tabella: LIVELLI GERARCHICI PREVISTI NEL THESAURUS SONO UTILIZZATI PER VALORIZZARE CAMPI DIVERSI DEL TRACCIATO DELLA SCHEDA RA 3.00, paragrafo OG-OGGETTO (vedere di seguito le istruzioni specifiche) LIVELLI DA UTILIZZARE PER LA COMPILAZIONE DEL CAMPO LIVELLI DA UTILIZZARE PER LA COMPILAZIONE DEL SOTTOCAMPO CLS Categoria - Classe e produzione OGTD - Definizione ATTRIBUTI DEL TERMINE INSERITO IN UNO DEI LIVELLI 1-5 Per la compilazione del campo CLS vanno selezionate le definizioni gerarchicamente relazionate al termine e alle sue eventuali specifiche scelti dai successivi livelli 4 e 5 del thesaurus (si rinvia in proposito alle istruzioni per l’utilizzo del vocabolario aperto per il campo CLS della scheda RA, pubblicate sul sito ICCD) LIVELLO 1 LIVELLO 2 LIVELLO 3 LIVELLO 4 LIVELLO 5 CATEGORIA CATEGORIA CATEGORIA TERMINE IMMAGINE TERMINE TERMINE PIU’ SPECIFICO NOTA D’AMBITO I LIVELLO II LIVELLO III LIVELLO
    [Show full text]
  • A Study of the Demand for Information Technology Professionals in Selected Internet Job Portals
    Journal of Information Systems Education, Vol 13(1) A Study of the Demand for Information Technology Professionals in Selected Internet Job Portals Kai S. Koong Lai C. Liu Computer Information Systems Southern University at New Orleans New Orleans, Louisiana 70126, USA Xia Liu FYI.Net, Incorporated Houston, Texas 77027, USA ABSTRACT The demand for information technology (IT) professionals has grown rapidly in the last decade. Parallel to this increasing need for IT personnel is the continuous change in the type of skills that are brought about by innovations in cutting edge technologies. However, the type of new IT skills and knowledge needed to keep companies competitive in the global market extend beyond the ability to apply the updated hardware and software to make business processes more efficient. Communication excellence and managerial expertise are just two of the other more commonly needed skills demanded by employers. This study identifies and classifies information technology related job listings that are disclosed in the databases of two leading e-recruiting services. Two secondary variables, written and oral communica- tions and experience, were also collected and examined in this study. The results of this research should be of interest to job seekers, human resources administrators, career counselors, corporate trainers, information systems consultants, labor attorneys, immigration and naturalization officers, and agency recruiters. Educators will find the outcomes of this study useful for the design and development of new curricula that can prepare students for the job market. Stu- dents will find this study particularly helpful since the trends identified in this research can have important implications for them in their selection of elective courses and in choosing a track for specialization.
    [Show full text]
  • Distributing Liability: the Legal and Political Battles of Y2K LSE Research Online URL for This Paper: Version: Accepted Version
    Distributing liability: the legal and political battles of Y2K LSE Research Online URL for this paper: http://eprints.lse.ac.uk/103330/ Version: Accepted Version Article: Mulvin, Dylan (2020) Distributing liability: the legal and political battles of Y2K. IEEE Annals of the History of Computing. ISSN 1058-6180 Reuse Items deposited in LSE Research Online are protected by copyright, with all rights reserved unless indicated otherwise. They may be downloaded and/or printed for private study, or other acts as permitted by national copyright laws. The publisher or other rights holders may allow further reproduction and re-use of the full text version. This is indicated by the licence information on the LSE Research Online record for the item. [email protected] https://eprints.lse.ac.uk/ Distributing Liability The legal and political battles of Y2K Dylan Mulvin* • Dylan Mulvin is an Assistant Professor in the Department of Media and Communications at the London School of Economics and Political Science – London, UK WC2A 2AE. E-mail: [email protected]. Abstract In 1999 the United States Congress passed the Y2K Act, a major—but temporary— effort at reshaping American tort law. The Act strictly limited the scope and applicability of lawsuits related to liability for the Year 2000 Problem. This paper excavates the process that led to the Act, including its unlikely signature by President Clinton. The history presented here is based on a reconsideration of the Y2K crisis as a major episode in the history of computing. The Act, and the Y2K crisis more broadly, expose the complex interconnections of software, code, and law at the end of the 20th century, and, taken seriously, argue for the appreciation of the role of liability in the history of technology.
    [Show full text]
  • Ballistic Helmets – Their Design, Materials, and Performance Against Traumatic Brain Injury
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln US Army Research U.S. Department of Defense 2013 Ballistic helmets – Their design, materials, and performance against traumatic brain injury S.G. Kulkarni Texas A&M University, [email protected] X.-L. Gao University of Texas at Dallas, [email protected] S.E. Horner U.S. Army, Fort Belvoir J.Q. Zheng U.S. Army, Fort Belvoir N.V. David Universiti Teknologi MARA Follow this and additional works at: https://digitalcommons.unl.edu/usarmyresearch Kulkarni, S.G.; Gao, X.-L.; Horner, S.E.; Zheng, J.Q.; and David, N.V., "Ballistic helmets – Their design, materials, and performance against traumatic brain injury" (2013). US Army Research. 201. https://digitalcommons.unl.edu/usarmyresearch/201 This Article is brought to you for free and open access by the U.S. Department of Defense at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in US Army Research by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. Composite Structures 101 (2013) 313–331 Contents lists available at SciVerse ScienceDirect Composite Structures journal homepage: www.elsevier.com/locate/compstruct Review Ballistic helmets – Their design, materials, and performance against traumatic brain injury ⇑ S.G. Kulkarni a, X.-L. Gao b, , S.E. Horner c, J.Q. Zheng c, N.V. David d a Department of Mechanical Engineering, Texas A&M University, College Station, TX 77843, United States b Department of Mechanical Engineering, University of Texas at Dallas, 800 West Campbell Road, Richardson, TX 75080-3021, United States c Program Executive Office – SOLDIER, U.S.
    [Show full text]
  • The Year 2000 Problem
    Journal of International Information Management Volume 8 Issue 1 Article 9 1999 The year 2000 problem Marshal Whatley California State University, San Bernardino Follow this and additional works at: https://scholarworks.lib.csusb.edu/jiim Part of the Management Information Systems Commons Recommended Citation Whatley, Marshal (1999) "The year 2000 problem," Journal of International Information Management: Vol. 8 : Iss. 1 , Article 9. Available at: https://scholarworks.lib.csusb.edu/jiim/vol8/iss1/9 This Article is brought to you for free and open access by CSUSB ScholarWorks. It has been accepted for inclusion in Journal of International Information Management by an authorized editor of CSUSB ScholarWorks. For more information, please contact [email protected]. Whatley: The year 2000 problem The Year 2000 Problem Journal of International Infonnatioii^lanageme^ The year 2000 problem Marshal Whatley California State University, San Bernardino ABSTRACT The purpose of this article is to discuss the root causes of the Year 200 Problem, the effects of the problem and how a systematic approach can be used to solve this problem. INTRODUCTION The Year 2000 Problem (Y2K), also known as the 'millennium bug,' may well be one of the largest problems facing organizations as they enter the 21st century. Computers are an integral component of an organization, organically of equal importance as financial resources and human resources. An organization's information system is the base on which all strategic and informa­ tional processes are developed, defined, and redefined. Therefore, the Y2K problem is not just a computer problem, it is a systemic business problem. A systemic approach will be needed to solve this problem.
    [Show full text]
  • Social and Ethical Aspects of the Y2K Problem László Ropolyi
    Social and ethical aspects of the Y2K problem László Ropolyi [email protected] Originally presented at ETHICOMP 2001 Abstract It will be shown that the Year 2000 computer problem has three (a technical, a business related and a social) aspects. From the controversial tendencies of the independent and interconnected relationships of the problem a framework of the postmodern network society can be associated. The Year 2000 computer problem can be considered as a measurement of the postmodernity of the present societies. Introduction The Year 2000 computer problem (the Millennium Bug, Y2K Crisis, Time Bomb 2000, etc.) emerged from the common programmer's practice of the 1950s and 1960s that for representation of the year in computers they used two rather four digits. In that time this practice was reasonable and economic. [Fallows, 1999, Information] On the one hand according to the common opinion of the age the development and complete renew of computer software will be a very fast process, in this way within a few decades the two-digits representation of the year will be considered as the interplay of the forgotten past, on the other hand the computer memory and processing time was very expensive. However, if we compare these expectations to the real processes we will find the technological development run in a different way. The development of computer hardware was really very fast, but the relevant software changed and developed relatively slowly, and in many cases a version of the basically same, old software were used in the new computers even close to the Millennium, too.
    [Show full text]
  • Distributing Liability: the Legal and Political Battles of Y2K
    Theme Article: Computing and Capitalism Distributing Liability: The Legal and Political Battles of Y2K Dylan Mulvin London School of Economics and Political Science Abstract—In 1999 the United States Congress passed the Y2K Act, a major—but temporary—effort at reshaping American tort law. The Act strictly limited the scope and applicability of lawsuits related to liability for the Year 2000 Problem. This article excavates the process that led to the Act, including its unlikely signature by President Clinton. The history presented here is based on a reconsideration of the Y2K crisis as a major episode in the history of computing. The Act, and the Y2K crisis more broadly, expose the complex interconnections of software, code, and law at the end of the 20th century, and, taken seriously, argue for the appreciation of the role of liability in the history of technology. & It’s almost a betrayal. After being told for The United States’ “Y2K Act” of 1999 took years that technology is the path to a highly drastic steps to protect American companies evolved future, it’s come as something of a shock to discover that a computer system is from lawsuits related to the Year 2000 Problem not a shining city on a hill - perfect and ever (the “Y2K bug”).3 Among other changes, the new - but something more akin to an old Act gave all companies ninety days to solve any farmhouse built bit by bit over decades by Y2K malfunctions, capped punitive damages, and non-union carpenters.1 stipulated that legal and financial responsibility –– Ellen Ullman, “The Myth of Order” Wired, would have to be distributed proportionately April 1999 among any liable companies.
    [Show full text]
  • To Optimize the Design of a Magnetic Motor Chandana M1, Charan N2, Dikshith Gowda R3, Kiran R4, M
    ISSN (Online) 2581-9429 IJAR ST International Journal of Advanced Research in Science & Technology (IJARST) Volume 7, Issue 4, July 2020 To Optimize the Design of a Magnetic Motor Chandana M1, Charan N2, Dikshith Gowda R3, Kiran R4, M. J. Chandrashekar5 UG Students, Department of Electrical and Electronics Engineering1,2,3,4 Associate Professor, Department of Electrical and Electronics Engineering5 SJB Institute of Technology, Bangalore, Karnataka [email protected], [email protected], [email protected] [email protected] and [email protected] Abstract: The main objective of this work is to study the free energy permanent magnet motor, where the natural repulsion or attraction characteristics of magnet poles creates a perpetual motion which can be harnessed by the magnet motor. The essential idea of this work has started by taking advantages of permanent magnet properties in these machines when replacing electric coils by permanent magnets, to build a free energy magnetic motor. The design of rotor drum plays a vital role in these magnetic motor where the magnetic field and repelling force is when the magnets is separated by a definite distance is considered. The simulation is done using a matlab software where the electrical parameters are simulated using the magnet properties and electrical equations. The materials were selected according to the characteristics and influencing factor such as temperature, weight and stored energy. The permanent magnets have invisible and continuous power where it can attract the iron or other specific kind of metal with the energy flow which allows the permanent magnet to defy the gravity for years. Therefore, it is believed that the free energy can be extracted from the permanents magnets by arranging the magnets in special configuration.
    [Show full text]
  • Is the Millennium Bug Really Just a Fly in the Ointment?
    Is the Millennium Bug Really Just a Fly in the Ointment? by G. Richard Fisher Y2K — only two letters and a with M. Kurt Goedelman mers will begin no later than 1999.’’2 number, but it has some churches, He also says that it is impossible to ministries and individual Christians make computers compliant. reeling with paranoia. This three- A FRIGHTENING PLOT LINE North has pressed his conspiracy character abbreviation simply stands Doomsday is just a few short theory ideas to the utmost degree. His for the year A.D. 2000. However, the months away, they say. This massive web site contains hundreds of articles fear and trepidation arise not so much shutdown will throw the world into warning of the impending dangers. from the ushering of a new millen- upheaval. Some have scenarios that He has further put his reputation on nium, but from what some say will be include the president declaring mar- the line: a computer apocalypse on Jan. 1, tial law or even the notion that these ‘‘I have been writing for over a 2000. failed computers will usher in Arma- year on this with all the skill I Due to enormous costs, at the ad- geddon, setting the stage for the have. I simply cannot get it vent of computers nearly 40 years Antichrist and the end. Most of the across to all of you or even to ago, software programmers conserved doomsday prognosticators have a most of you. I am never at a loss on memory and data storage by using book or program for sale on how to for words, but I am at a loss for only two digits for the year-date code.
    [Show full text]
  • International Journal of Innovative Technology and Exploring Engineering
    International Journal of Innovative Technology and Exploring Engineering ISSN : 2278 - 3075 Website: www.ijitee.org Volume-8 Issue-9S3, JULY 2019 Published by: Blue Eyes Intelligence Engineering and Sciences Publication xploring En E gi d ne an e r y in g g lo o n h c e T IjItEe e I n v i t t e E a X r v P N n o L O a O I n T t R A i o I V n N O I G N n IN f a o l l J a o r n u www.ijitee.org Exploring Innovation Editor-In-Chief Chair Dr. Shiv Kumar Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE), Bhopal (M.P.), India Associated Editor-In-Chief Chair Dr. Dinesh Varshney Professor, School of Physics, Devi Ahilya University, Indore (M.P.), India Associated Editor-In-Chief Members Dr. Hai Shanker Hota Ph.D. (CSE), MCA, MSc (Mathematics) Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India Dr. Gamal Abd El-Nasser Ahmed Mohamed Said Ph.D(CSE), MS(CSE), BSc(EE) Department of Computer and Information Technology , Port Training Institute, Arab Academy for Science ,Technology and Maritime Transport, Egypt Dr. Mayank Singh PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu- Natal, Durban, South Africa. Scientific Editors Prof.
    [Show full text]
  • No Heroes Without Masks the Summer Months Follow Upon a Period of Strict Isolation
    No heroes without masks The summer months follow upon a period of strict isolation. The Military Museum has now re- opened its doors and puts its generously-sized galleries at the disposal of curious visitors. The Educational Service chose the currently mandatory wearing of facemasks to stop the spread of the coronavirus as the guiding principle for a tour through the centuries, when other masks for other purposes and made out of other materials were utilized. Floor markings draw the attention of the visitors to the selected objects and QR codes supply a short explanation. Those wishing to learn more can download this leaflet with additional infor- mation. The tour successively takes you through the Arms and Armour Gallery, the 14-18 Gallery and the Aviation Hall, before turning back to the 14-18 Gallery and climbing the stairs of the two floors in the Bordiau Gallery. We wish you a most pleasant walk. Armour Gallery introduction Armours, both a protective item and a power symbol, characterize mediaeval warfare. Rich noblemen can afford made-to-measure armours, whereas less moneyed knights have to make do with “off the peg” pieces sometimes provided by the suzerain and stored in large arsenals. A complete armour can count up to 250 pieces and weigh some 25 to 40 kg. Armours follow civilian fashion, as you will be able to observe through the various protective helmets we selected. Frogmouth helmet, late 15th century, early 16th century Jousting or tournament great helms are quite occlusive. The jousting armour is heavier than the combat armour and can weigh up to 70 kg.
    [Show full text]