Design of Warfare
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Chesterfield Wfa
CHESTERFIELD WFA Newsletter and Magazine issue 43 Co-Patrons -Sir Hew Strachan & Prof. Peter Welcome to Issue 43 - the July 2019 Simkins Newsletter and Magazine of Chesterfield President - Professor Gary WFA. Sheffield MA PhD FRHistS FRSA nd Our next meeting is on Tuesday evening, 2 July Vice-Presidents when our speaker will be the eminent historian Prof. John Bourne who is going to talk about `JRR Andre Colliot Tolkein and the 11th Lancashire Fusiliers on the Professor John Bourne BA PhD Somme` FRHistS The Burgomaster of Ypres The Mayor of Albert Lt-Col Graham Parker OBE Christopher Pugsley FRHistS Lord Richard Dannat GCB CBE MC DL Roger Lee PhD jssc Dr Jack Sheldon Branch contacts Tolkien in 1916, wearing his British Army uniform Tony Bolton (Chairman) anthony.bolton3@btinternet The Branch meets at the Labour Club, Unity House, Saltergate, .com Chesterfield S40 1NF on the first Tuesday of each month. There Mark Macartney (Deputy Chairman) is plenty of parking available on site and in the adjacent road. [email protected] Access to the car park is in Tennyson Road, however, which is Jane Lovatt (Treasurer) one way and cannot be accessed directly from Saltergate. Grant Cullen (Secretary) [email protected] Facebook Grant Cullen – Branch Secretary http://www.facebook.com/g roups/157662657604082/ http://www.wfachesterfield.com/ Western Front Association Chesterfield Branch – Meetings 2019 Meetings start at 7.30pm and take place at the Labour Club, Unity House, Saltergate, Chesterfield S40 1NF January 8th Jan.8th Branch AGM followed by a talk by Tony Bolton (Branch Chairman) on the key events of the first year after the Armistice. -
Wishful Thinking Or Buying Time? the Logic of British Appeasement in the 1930S
Wishful Thinking or Buying Time? Wishful Thinking or Norrin M. Ripsman and Buying Time? Jack S. Levy The Logic of British Appeasement in the 1930s The “lessons of the 1930s,” based on British and French appeasement of Germany, have pro- foundly inºuenced U.S. security policy for a half century. Presidents have invoked these lessons in decisions for war in Korea, Vietnam, and Iraq in 1990–91 and 2003, and in presidential campaigns.1 Among policymakers and publics, and among many scholars as well, the futility of appeasement has ac- quired the status of a lawlike generalization.2 The implicit assumption is that the Western allies’ primary aim was to secure a lasting peace with Germany through concessions to resolve Adolf Hitler’s grievances. If that was the aim, the policy clearly failed. But, as we shall demonstrate, that was not appease- ment’s primary aim. Scholars need to rethink both the concept of appeasement and the goals of appeasement in the 1930s. The popular image of appeasement was fueled by the scholarship of tra- ditional historians, who condemned British and French appeasement of Germany as politically naïve and morally bankrupt. In their view, the policies Norrin M. Ripsman is Associate Professor in the Department of Political Science at Concordia University. He is the author of Peacemaking by Democracies: The Effect of State Autonomy on the Post–World War Settlements (University Park: Penn State University Press, 2002). Jack S. Levy is Board of Gover- nors’ Professor of Political Science at Rutgers University, Senior Associate at the Arnold A. Saltzman Insti- tute of War and Peace Studies at Columbia University, and past president of both the International Studies Association (2007–08) and the Peace Science Society (2005–06). -
Channel Islands Great War Study Group
CHANNEL ISLANDS GREAT WAR STUDY GROUP Le Défilé de la Victoire – 14 Juillet 1919 JOURNAL 27 AUGUST 2009 Please note that Copyright for any articles contained in this Journal rests with the Authors as shown. Please contact them directly if you wish to use their material. 1 Hello All It will not have escaped the notice of many of us that the month of July, 2009, with the deaths of three old gentlemen, saw human bonds being broken with the Great War. This is not a place for obituaries, collectively the UK’s national press has done that task more adequately (and internationally, I suspect likewise for New Zealand, the USA and the other protagonists of that War), but it is in a way sad that they have died. Harry Patch and Henry Allingham could recount events from the battles at Jutland and Passchendaele, and their recollections have, in recent years, served to educate youngsters about the horrors of war, and yet? With age, memory can play tricks, and the facts of the past can be modified to suit the beliefs of the present. For example, Harry Patch is noted as having become a pacifist, and to exemplify that, he stated that he had wounded, rather than killed, a German who was charging Harry’s machine gun crew with rifle and bayonet, by Harry firing his Colt revolver. I wonder? My personal experience in the latter years of my military career, having a Browning pistol as my issued weapon, was that the only way I could have accurately hit a barn door was by throwing the pistol at it! Given the mud and the filth, the clamour and the noise, the fear, a well aimed shot designed solely to ‘wing’ an enemy does seem remarkable. -
The Second Troop Philadelphia City Cavalry. 75 Less Than Two Months
The Second Troop Philadelphia City Cavalry. 75 THE SECOND TROOP PHILADELPHIA CITY CAVALRY. BY W. A. NEWMAN DORLAND, A.M., M.D., F.A.C.S. Major, Medical Corps, U. S. Army; formerly First Lieutenant and Surgeon of the Troop (April 1, 1898-November 10, 1903.) [For references see pp. 90-9^.1 (Continued from Vol. XLVIII, page 382.) Less than two months after the notable and unique parade of December 26,1799, the Second Troop partici- pated in the first celebration of Washington's birthday as a national holiday, which occurred in Philadelphia on February 22, 1800, under the auspices of the Pennsyl- vania Society of the Cincinnati.440 The Troop on this occasion held the place of honor in the line of parade, acting as the escort of the State Society of the Cincin- nati. The following was the announcement issued by the Society of the Cincinnati for this memorable event.441 11 CINCINNATI. "At a meeting of the Pennsylvania State Society of the Cincinnati, held at the State House, in Philadelphia, on the 21st of December, 1799, Brigadier Gen. Mac- pherson in the chair, [the following card was author- ized] : '' In pursuance of a resolution of the Standing Com- mittee of the Penn. Society of the Cincinnati, the mem- bers of the Cincinnati belonging to our Sister States, who may be in the city on Saturday the 22d instant; such officers of the late Eevolutionary army, not members of the Society; the officers of the late army, navy, and militia, are respectfully invited to join in a procession, to be formed at the State House precisely at 12 o 'clock 76 The Second Troop Philadelphia City Cavalry. -
Vehicle Design
ME1460 Bachelor Thesis in Media Technology Adam Åberg ST 2013 Blekinge Institute of Technology Bachelor Thesis in Media Technology 30 ECTS-cr Spring term 2013 Vehicle Design The Concept of Recontextualization Åberg Adam Supervisor: Peter Giger & Patrik Vörén Examinator: Lena Trojer Blekinge Institute of Technology, School of Planning and Media Design 1 ME1460 Bachelor Thesis in Media Technology Adam Åberg ST 2013 Blekinge Institute of Technology Abstrakt Denna uppsats syftar till att utforska hur begreppet recontextualisering kan användas i samband med design koncept av krigsfordon skapade för antingen spel eller film produktioner. Dessa krigsfordon placeras i olika miljöer och anpassas för tjänst i dessa miljöer med hjälp av grafiska koncept. Dessa grafiska koncept skapas med hjälp av begreppet rekontextualisering. Uppsatsen undersöker hur vida man kan gå tillväga för att skapa dessa grafiska koncept och vilken betydelse det har för skapandet av ett spel eller en film. Med denna uppsats undersöks även industriell design som Feng Zhu (2012) förklarar det i kombination med illustration och skillnaden däremellan samt hur bägge är relevanta för denna uppsatsen samt dess produktion eller liknande produktioner. Sammanfattningsvis skapas dessa konceptuella prototyper och därefter analyseras samt dokumenteras resultaten och slutsatserna i en diskussion. Nyckelord: Recontextualisering, prototyp, koncept, idustriell design, illustration, vehicle, design. Abstract This thesis intends to explore how the concept of recontextualisation can be used in conjunction with design based concepts of war vehicles created for either game or movie productions. These vehicles of war are placed in different environments and adapted for services in these environments via graphic concepts. These graphic concepts are in turn created using the concept of recontextualization. -
Introduction 1 Introduction in a Recent Review of Guy Halsall's Warfare And
introduction 1 INTRODUCTION In a recent review of Guy Halsall’s Warfare and Society in the Barbarian West, 450-900, which is ostensibly meant to be a new standard in the field, Bryan Ward-Perkins approves of the author’s findings, summarizing of early medieval warfare that: It remains very difficult to imagine a seventh- or eighth-century army, except as a hairy and ill-equipped horde, or as a Beowulfian band of heroes, and almost impossible to envisage what such an army did when faced with an obstacle such as a walled town[.]1 Ward-Perkins is being willfully—not to say wonderfully—provocative. He is well aware of the substantial and growing body of scholarship on early medieval warfare that has rendered clichés of hairy barbarians obsolete.2 But quips aside, he highlights a serious gap in existing historiography. While many scholars recognize the similarity (and to varying extents con- tinuity) between Roman and high medieval siege warfare, this has never been demonstrated in any detail. Hence, a notable number of scholars favor a minimalist interpretation of warfare in which the siege is accorded little importance, especially in the West, arguing that post-Roman society lacked the necessary demographic, economic, organizational and even cultural prerequisites. Continuity of military institutions is unquestioned in the case of the East Roman, or Byzantine Empire, but Byzantine siege warfare has received only sporadic attention, and it has been even more marginal in explaining the Islamic expansion.3 This study seeks to examine the organization and practice of siege war- fare among the major successor states of the former Roman Empire: The 1 Ward-Perkins 2006, reviewing Halsall 2003. -
The Insurgent Archipelago
THE INSURGENT ARCHIPELAGO JOHN MACKINLAY The Insurgent Archipelago From Mao to bin Laden Columbia University Press Publishers Since 1893 New York Chichester, West Sussex Copyright © 2009 John Mackinlay All rights reserved Library of Congress Cataloging-in-Publication Data Mackinlay, John. The insurgent archipelago : from Mao to Bin Laden / John Mackinlay. p. cm. Includes index. ISBN 978-0-231-70116-7 (alk. paper) 1. Counterinsurgency—Asia. 2. Peacekeeping forces—Asia. 3. Counterinsurgency—Afghanistan. 4. Peacekeeping foreces—Afghanistan. 5. Communism—Philosophy. 6. War on Terrorism, 2001- 7. Afghan War, 2001– 8. Mao, Zedong, 1893–1976. 9. Bin Laden, Osama, 1957– I. Title. U241.M332 2009 355.02'18095—dc22 2009032743 ∞ Columbia University Press books are printed on permanent and durable acid-free paper. This book is printed on paper with recycled content. Printed in India c 10 9 8 7 6 5 4 3 2 1 References to Internet Web sites (URLs) were accurate at the time of writing. Neither the author nor Columbia University Press is responsible for URLs that may have expired or changed since the manuscript was prepared. CONTENTS Acknowledgements vii Introduction 1 PART I MAOISM Introduction 9 1. Mao the Prototype 15 2. Evolution 27 3. Gaps in Our Knowledge 43 4. The Chronology of Neglect 61 PART II POST-MAOISM Introduction 77 5. Multiple Populations and Mass Communications 81 6. The Migration Factor 99 7. The Virtual Battlefield 123 8. Post-Maoism 143 PART III RESPONDING TO POST-MAOISM Introduction 163 9. The Expeditionary Approach 171 10. The Domestic Approach 197 11. The Insurgent Archipelago 221 Notes 237 Bibliography 267 Index 279 v ACKNOWLEDGEMENTS Very many colleagues have helped me to produce this book. -
A Historical Assessment of Amphibious Operations from 1941 to the Present
CRM D0006297.A2/ Final July 2002 Charting the Pathway to OMFTS: A Historical Assessment of Amphibious Operations From 1941 to the Present Carter A. Malkasian 4825 Mark Center Drive • Alexandria, Virginia 22311-1850 Approved for distribution: July 2002 c.. Expedit'onaryyystems & Support Team Integrated Systems and Operations Division This document represents the best opinion of CNA at the time of issue. It does not necessarily represent the opinion of the Department of the Navy. Approved for Public Release; Distribution Unlimited. Specific authority: N0014-00-D-0700. For copies of this document call: CNA Document Control and Distribution Section at 703-824-2123. Copyright 0 2002 The CNA Corporation Contents Summary . 1 Introduction . 5 Methodology . 6 The U.S. Marine Corps’ new concept for forcible entry . 9 What is the purpose of amphibious warfare? . 15 Amphibious warfare and the strategic level of war . 15 Amphibious warfare and the operational level of war . 17 Historical changes in amphibious warfare . 19 Amphibious warfare in World War II . 19 The strategic environment . 19 Operational doctrine development and refinement . 21 World War II assault and area denial tactics. 26 Amphibious warfare during the Cold War . 28 Changes to the strategic context . 29 New operational approaches to amphibious warfare . 33 Cold war assault and area denial tactics . 35 Amphibious warfare, 1983–2002 . 42 Changes in the strategic, operational, and tactical context of warfare. 42 Post-cold war amphibious tactics . 44 Conclusion . 46 Key factors in the success of OMFTS. 49 Operational pause . 49 The causes of operational pause . 49 i Overcoming enemy resistance and the supply buildup. -
Political Science 279/479 War and the Nation-State
Political Science 279/479 War and the Nation-State Hein Goemans Course Information: Harkness 320 Fall 2010 Office Hours: Monday 4{5 Thursday 16:50{19:30 [email protected] Harkness 329 This course examines the development of warfare and growth of the state. In particular, we examine the phenomenon of war in its broader socio-economic context between the emergence of the modern nation-state and the end of World War II. Students are required to do all the reading. Student are required to make a group presentation in class on the readings for one class (25% of the grade), and there will be one big final (75%). Course Requirements Participation and a presentation in the seminar comprises 25% of your grade. A final exam counts for 75%. The final exam is given during the period scheduled by the University. In particular instances, students may substitute a serious research paper for the final. Students interested in the research paper option should approach me no later than one week after the mid-term. Academic Integrity Be familiar with the University's policies on academic integrity and disciplinary action (http://www.rochester.edu/living/urhere/handbook/discipline2.html#XII). Vi- olators of University regulations on academic integrity will be dealt with severely, which means that your grade will suffer, and I will forward your case to the Chair of the College Board on Academic Honesty. The World Wide Web A number of websites will prove useful: 1. General History of the 20th Century • http://www.bbc.co.uk/history/war/ • http://users.erols.com/mwhite28/20centry.htm • http://www.fsmitha.com/ 2. -
W Vietnam Service Report
Honoring Our Vietnam War and Vietnam Era Veterans February 28, 1961 - May 7, 1975 Town of West Seneca, New York Name: WAILAND Hometown: CHEEKTOWAGA FRANK J. Address: Vietnam Era Vietnam War Veteran Year Entered: 1968 Service Branch:ARMY Rank: SP-5 Year Discharged: 1971 Unit / Squadron: 1ST INFANTRY DIVISION 1ST ENGINEER BATTALION Medals / Citations: NATIONAL DEFENSE SERVICE RIBBON VIETNAM SERVICE MEDAL VIETNAM CAMPAIGN MEDAL WITH '60 DEVICE ARMY COMMENDATION MEDAL 2 OVERSEAS SERVICE BARS SHARPSHOOTER BADGE: M-16 RIFLE EXPERT BADGE: M-14 RIFLE Served in War Zone Theater of Operations / Assignment: VIETNAM Service Notes: Base Assignments: Fort Belvoir, Virginia - The base was founded during World War I as Camp A. A. Humphreys, named for Union Civil War general Andrew A. Humphreys, who was also Chief of Engineers / The post was renamed Fort Belvoir in the 1930s in recognition of the Belvoir plantation that once occupied the site, but the adjacent United States Army Corps of Engineers Humphreys Engineer Center retains part of the original name / Fort Belvoir was initially the home of the Army Engineer School prior to its relocation in the 1980s to Fort Leonard Wood, in Missouri / Fort Belvoir serves as the headquarters for the Defense Logistics Agency, the Defense Acquisition University, the Defense Contract Audit Agency, the Defense Technical Information Center, the United States Army Intelligence and Security Command, the United States Army Military Intelligence Readiness Command, the Missile Defense Agency, the Defense Threat Reduction Agency, and the National Geospatial-Intelligence Agency, all agencies of the United States Department of Defense Lai Khe, Vietnam - Also known as Lai Khê Base, Lai Khe was a former Army of the Republic of Vietnam (ARVN) and U.S. -
Challenges and Directions for Dependable Computing”
Workshop “Challenges and Directions for Dependable Computing” 41st Meeting of IFIP WG 10.4 — Saint John, US VI — January 4-8, 2002 — — — 01. From Fault Injection Experiments to Dependability Benchmarking Jean Arlat (LAAS-CNRS, Toulouse, France) 02. Building a Hierarchical Defense: An Immune System Paradigm for Fault-Tolerant System Design Algirdas Avizˇienis (University of California at Los Angeles, USA) 03. Dependable Computer Networks Dimiter R. Avresky (Northeastern University, Boston, MA, USA) 04. Interactions and Tradeoffs between Software Quality Attributes Mario Barbacci and Charles B. Weinstock (SEI-CMU, Pittsburgh, PA, USA) 05. Production Process of Dependable Systems / Human Factors / Emerging Applications / Middleware Platforms Andrea Bondavalli (University of Florence, Italy), Felicita Di Giandomenico (IEI-CNR, Pisa, Italy) and Luca Simoncini (CNUCE-CNR and University of Pisa, Italy) 06. Creating Robust Software Interfaces: Fast, Cheap, Good — Now You Can Get All Three John DeVale and Philip Koopman (Carnegie Mellon University, Pittsburgh, PA, USA) 07. Pervasive Dependability: Moving Dependable Computing Towards Mainstream Systems Cristof Fetzer and Richard D. Schlichting (AT&T Labs–Research, Florham Park, NJ, USA) 08. Dependability Challenges in Model-Centered Software Development David P. Gluch (Embry-Riddle Aeronautical University, Daytona Beach, FL, USA) 09. Report Correlation for Improved Intrusion Detection and Fault Diagnostics Walter L. Heimerdinger (Honeywell Technology Center, Minneapolis, MN, USA) 10. Future Automotive Scenarios and R&D Challenges Günter Heiner (DaimlerChrysler AG, Berlin, Germany) 11. Dependability Challenges in Pushed-based Systems Yennun Huang (PreCache Inc., Bridgewater, NJ, USA) 12. Dependability Challenges in the Field of Embedded Systems Hermann Kopetz (Vienna University of Technology, Austria) 13. Dependability: Information Assurance Research Agenda Jaynarayan H. -
Assessing Asymmetric Fault-Tolerant Software
Assessing asymmetric fault-tolerant software Peter Popov, Lorenzo Strigini Centre for Software Reliability City University London United Kingdom [email protected], [email protected] Abstract — The most popular forms of fault tolerance against components in these systems. But this research has been design faults use "asymmetric" architectures in which a mostly limited to “symmetric” architectures: “multiple "primary" part performs the computation and a "secondary" version software” and similar schemes, in which two or part is in charge of detecting errors and performing some kind more diverse, redundant components perform equivalent of error processing and recovery. In contrast, the most studied functions and their outputs are “adjudicated” (by voting or forms of software fault tolerance are "symmetric" ones, e.g. N- some other algorithm, built into the computer system or the version programming. The latter are often controversial, the physical controlled systems) to decide which values will be former are not. We discuss how to assess the dependability output to the controlled system. Such architectures are gains achieved by these methods. Substantial difficulties have important for some highly critical applications, but also been shown to exist for symmetric schemes, but we show that expensive and relatively rare. In most systems, fault the same difficulties affect asymmetric schemes. Indeed, the latter present somewhat subtler problems. In both cases, to tolerance against design faults takes the form of predict the dependability of the fault-tolerant system it is not “asymmetric” architectures, in which a “primary” enough to know the dependability of the individual component (we will often use the term “primary” alone for components.