September 1999 - Vol. 42 No. 9
Features
Distance learning—one of the current industry catchphrases—can trace its fairly young roots to the military where team training has become a powerful means for teaching groups of people in vastly different locales to work together. Distributed Mission Training (DMT) has been further enhanced recently by great advancements in VR and real-time networking technologies that now […]
The National Conference of Commissions on Uniform State Laws (NCCUSL) in July voted to promulgate the Uniform Computer Information Transactions Act (UCITA), formerly the Article 2B amendment of the Uniform Commercial Code. Under much scrutiny, and in the works for over 10 years, UCITA will govern all contracts in the development, sale, licensing, maintenance, and […]
I was quite surprised and disappointed by Michael Noll’s "Technical Opinion" ("Does Data Traffic Exceed Voice Traffic," June 1999, p. 121). The very premise that "today’s megamergers may be tomorrow’s megalosses" because voice traffic will continue to exceed data traffic is severely faulted, and the evidence is in error by Noll’s many omissions. Although Noll […]
Legally Speaking: Why the Anticircumvention Regulations Need Revision
Like a tempest in a teapot, the storm rages on over DMCA's ambiguous provisions.
International Perspectives: Y2K International Status and Opportunities
Measures to raise awareness are only the first steps to global compliance.
Distance learning is a hot topic on U.S. college campuses. Recently, a trend has developed in many schools to offer complete email courses, and in some cases, one can obtain an entire degree via email [3, 4]. But there are nagging questions: In such a course, do students get a proper education? Do degrees offered […]
Digital Newspapers Explore Marketing on the Internet
New forms of digital news products combine existing forms of generating revenue with new product development and services.
Exploiting the Benefits of Y2K Preparation
Paying for Y2K compliance is also an investment in future systems performance, and in long-term business performance and financial goals.
Teaching E-Commerce to a Multidisciplinary Class
The students were the virtual vendors, consumers, and corporate executives, paying and receiving e-payments and negotiating with the bank and the government.
The Economics of Network Management
Why are pricing issues the key to infrastructure investment and future growth of the Internet?
Distributed Mission Training: Teams, Virtual Reality, and Real-Time Networking
Distributed Mission Training (DMT) is a revolutionary team-training paradigm currently evolving at the U.S. Department of Defense, especially in the Air Force. The objective of DMT is to concurrently train people in team efforts involving coordination, communication, and decision making. The teams may not necessarily be co-located and could be engaged in independent as well […]
Multimodal Integrated Team Training
Distributed Mission Training is the creation of a shared environment comprised of real, virtual, and constructive systems that allow teams of individuals to train both individually and collectively. While DMT is primarily a team-training concept that has evolved in the U.S. Department of Defense for its operational forces, its foundations in terms of training principles […]
The Effectiveness of Distributed Mission Training
Synthetic training environments can enhance teamwork performance.
A Reusable Architecture For Simulations
Flexible, interacting simulations provide a foundation for successful DMT applications.
Image Generation Systems in Virtual Training Platforms
A novel technology proves ideally suited to fast-moving training environs.
Implementing Distributed Mission Training
An experimental training program tests the DMT mettle through some tough terrain.
Technical Opinion: Getting the Best of Both Real and Virtual Worlds
A simple but effective way to facilitate visual occlusion using a see-through display.
Inside Risks: the Trojan Horse Race
This year has been pivotal for malicious software (malware) such as viruses, worms, and Trojan horses. Although the problem is not new, Internet growth and weak system security have increased the risks. Viruses and worms survive by moving from computer to computer. Prior to the Internet, computers communicated slowly, mostly from floppy disks and bulletin […]