WorldCat Identities

Hundley, Richard O.

Overview
Works: 21 works in 75 publications in 2 languages and 5,094 library holdings
Genres: Conference papers and proceedings  History 
Roles: Author
Classifications: HM851, 004.678
Publication Timeline
.
Most widely held works by Richard O Hundley
The global course of the information revolution : recurring themes and regional variations by Richard O Hundley( Book )

13 editions published between 2003 and 2004 in English and held by 258 WorldCat member libraries worldwide

Advances in information technology are heavily influencing ways in which business, society, and government work and function throughout the globe, bringing many changes to everyday life, in a process commonly termed the "information revolution." This book paints a picture of the state of the information revolution today and how it will likely progress in the near- to mid-term future (10 to 15 years), focusing separately on different regions of the world-North America, Europe, the Asia-Pacific region, Latin America, the Middle East and North Africa, and sub-Saharan Africa
Past revolutions, future transformations : what can the history of revolutions in military affairs tell us about transforming the U.S. military? by Richard O Hundley( Book )

8 editions published in 1999 in English and held by 215 WorldCat member libraries worldwide

Advances in technology can bring about dramatic changes in military operations, often termed "revolutions in military affairs" or RMAs. Such technology-driven changes in military operations are not merely a recent phenomenon: they have been occurring since the dawn of history, they will continue to occur in the future, and they will continue to bestow a military advantage on the first nation to develop and use them. Accordingly, it is important to the continued vitality and robustness of the U.S. defense posture for the DoD R & D community to be aware of technology developments that could revolutionize military operations in the future, and for the U.S. military services to be on the lookout for revolutionary ways in which to employ those technologies in warfare. This report examines the history of past RMAs, to see what can be learned from them regarding the challenge confronting the DoD today, when it has set out on a concerted effort to bring about a technology-driven transformation of the U.S. military to achieve the operational goals outlined in Joint Vision 2010. Among its many findings are three of particular note: RMAs are rarely brought about by dominant players (such as the U.S. military is today). For a dominant player to bring about an RMA requires a receptive organizational climate, fostering a continually refined vision of how war may change in the future and encouraging vigorous debate regarding the future of the organization; senior officers with traditional credentials willing to sponsor new ways of doing things and able to establish new promotion pathways for junior officers practicing a new way of war; mechanisms for experimentation, to discover, learn, test and demonstrate new ideas; and ways of responding positively to the results of successful experiments, in terms of doctrinal changes, acquisition programs, and force structure modifications. The DoD has some of these elements today, but is missing others. The report makes specific suggestions regarding ways of filling in the missing elements. Doing these things will facilitate DoD's force transformation activities and help ensure that the next RMA is brought about by the United States. and not some other nation
The global course of the information revolution : political, economic, and social consequences : proceedings of an international conference( Book )

11 editions published in 2000 in English and held by 168 WorldCat member libraries worldwide

RAND has embarked on a three-year effort, sponsored by the National Intelligence Council's Strategic Estimates Program, to chart the course of changes brought about by the information revolution over the next 10 to 20 years. As a first step, RAND convened in November 1999 an international conference on political/governmental, business/financial, and social/cultural trends. Across the diverse conference discussions, a shared vision emerged of an information revolution future of more "information work" and new business models, an increase in electronic commerce, challenges to the nation state, creation of a number of sub-, trans-, and supranational groupings, more porous borders, and new fault lines within and between nations. The world can expect increasing disparities (winners and losers), concerns about privacy, and effects on national cultures
Security in cyberspace : challenges for society : proceedings of an international conference by Richard Hundley( Book )

4 editions published in 1996 in English and held by 160 WorldCat member libraries worldwide

As more and more human activities--involving governments, businesses, individuals, and society as a whole--move into "cyberspace," they become exposed to a new set of vulnerabilities that can be exploited by a wide spectrum of "bad actors" for a variety of motives. This paper discusses questions such as: (1) How serious are the likely threats to different segments of society, both today and in the future, from cyberspace-based attacks by various "bad actors"--Such as hackers, criminals, disgruntled employees, terrorists and nation-sponsored informational attacks? (2) What are the current best strategies for achieving security in cyberspace? (3) What roles and missions should various national entities (police, defense forces, local governments, etc.) be assigned to counter these threats, given that it is often unclear who the perpetrator is, and from where the threat emanates? (4) Are there specific services and institutions in each nation--which we term a "national interest element"--that play such vital roles in society that their protection from cyberspace-based attacks should be of national concern? This paper does not answer all these questions, but at least attempts to structure the discussion so that meaningful answers can be obtained
The future of the information revolution in Europe : proceedings of an international conference( Book )

7 editions published in 2001 in English and held by 148 WorldCat member libraries worldwide

"This report contains the proceedings of a conference focused on the information revolution in Europe, that was held in Limelette, Belgium, in April 2001. Participants in this conference argued that the information revolution is following a somewhat different course in Europe than in America: the process of "creative destruction" by which new technologies and business paradigms replace their predecessors is proceeding more slowly, Europe's emphasis on economic and social equity results in a less aggressive approach to new IT business opportunities than does the "winner-take-all" business mentality in the U.S., and Europe's "top down" planning mentality is fostering more deliberate decision making. As a result, the information revolution has been proceeding slower in Europe than in America, with the U.S. in the vanguard in most IT-related areas and Europe following along somewhat behind. This is likely to continue for at least the next few years, if not longer."--Rand abstracts
Security in cyberspace : an emerging challenge for society by Richard O Hundley( Book )

4 editions published in 1994 in English and held by 90 WorldCat member libraries worldwide

As more and more human activities--involving governments, businesses, individuals, and society as a whole--move into "cyberspace," they become exposed to a new set of vulnerabilities that can be exploited by a wide spectrum of "bad actors" for a variety of motives. This paper discusses questions such as: (1) How serious are the likely threats to different segments of society, both today and in the future, from cyberspace-based attacks by various "bad actors"--Such as hackers, criminals, disgruntled employees, terrorists and nation-sponsored informational attacks? (2) What are the current best strategies for achieving security in cyberspace? (3) What roles and missions should various national entities (police, defense forces, local governments, etc.) be assigned to counter these threats, given that it is often unclear who the perpetrator is, and from where the threat emanates? (4) Are there specific services and institutions in each nation--which we term a "national interest element"--that play such vital roles in society that their protection from cyberspace-based attacks should be of national concern? This paper does not answer all these questions, but at least attempts to structure the discussion so that meaningful answers can be obtained
The implications of COTS vulnerabilities for the DOD and critical U.S. infrastructures : what can/should the DOD do? by Robert H Anderson( Book )

4 editions published in 1998 in English and held by 81 WorldCat member libraries worldwide

There is a growing reliance on commercial off-the-shelf (COTS) products within critical systems on which the security and safety of the United States depend. Next-generation command and control systems within DoD depend heavily on COTS hardware and software. Typical COTS software products are large and complex, often comprising millions of lines of source code. This complexity precludes complete, unambiguous analysis of the code for "trap doors," "logic bombs," and other malevolent code possibly buried within it. In addition, increasing amounts of such code are developed by non-U.S. citizens and offshore workers with uncertain loyalties to the United States. Market forces favor functionality over security and reliability, so the problem is unlikely to disappear. In addition, DoD and the U.S. government lack sufficient market strength to compel greater security in COTS products. There are two basic approaches to "managing" this problem: making COTS used by the DoD more secure; and learning to live with insecure COTS. There are initiatives that can be undertaken in both of these areas. The authors have identified a number of candidate elements supporting each of these approaches. Those specific elements can support a variety of overall solution strategies. An outline of a possible research agenda addressing this problem is presented
A qualitative methodology for the assessment of cyberspace-related risks by Richard O Hundley( Book )

4 editions published in 1996 in English and held by 78 WorldCat member libraries worldwide

The problem addressed here is assessing the risks to which some organization or activity is exposed as a result of some combination of cyberspace-related vulnerabilities and threats. It is an attempt to assess risk without resorting to quantitative methods, which can appear to offer more accuracy and precision than is in fact warranted. The methodology proposed, although a work in progress, has three favorable points: (1) it is transparent, in that the nature and substance of the judgments and combinatorial steps are apparent; (2) it does not pretend to greater accuracy than can be justified; and (3) it is believed to capture the key elements and interactions involved in assessing cyberspace risk. The methodology does, however, require the user to make a large number of qualitative judgments and to combine them in a subjective fashion. The paper is presented as an annotated briefing
Ultraviolet spectroscopy of the upper atmosphere by Richard O Hundley( Book )

1 edition published in 1964 in English and held by 18 WorldCat member libraries worldwide

Future technology-driven revolutions in military operations : results of a workshop by Richard O Hundley( Book )

3 editions published in 1994 in English and held by 10 WorldCat member libraries worldwide

Future breakthroughs in military technology will bestow an advantage on the first nation to apply them. Which technologies show enough promise to warrant greater U.S. defense R & D investment at this time? RAND hosted two workshops to address this question. Five promising program areas were identified: (1) development of insect-size flying and crawling systems capable of a wide variety of battlefield sensor missions; (2) use of techniques from molecular biology and biotechnology to develop new molecular electronic materials, components, and computational architectures; (3) use of modern microelectronic and information technologies as the basis for a new advanced-technology logistic system; (4) development of techniques and strategies to protect U.S. interests in "cyberspace"; and (5) use of a variety of technologies to enhance the survivability, mobility, and mission performance of individual soldiers
Jun shi shi wu ge ming yu mei jun zhuan xing by Richard O Hundley( Book )

2 editions published in 2001 in Chinese and held by 8 WorldCat member libraries worldwide

Ultraviolet spectroscopy of the upper atmosphere : (Part 1 of an examination of the application to satellite meteorology of various segments of the electromagnetic spectrum) by Richard O Hundley( Book )

1 edition published in 1963 in English and held by 8 WorldCat member libraries worldwide

Bremsstrahlung during the collision of low-energy electrons with neutral atoms and molecules by Richard O Hundley( Book )

1 edition published in 1962 in English and held by 6 WorldCat member libraries worldwide

Satellite charge-up in the outer Van Allen belt by Richard O Hundley( Book )

1 edition published in 1961 in English and held by 6 WorldCat member libraries worldwide

Air radiation from nonequilibrium wakes of blunt hypersonic reentry vehicles by Richard O Hundley( Book )

2 editions published in 1964 in English and held by 5 WorldCat member libraries worldwide

The wakes of reentry vehicles at altitudes of 100,000 ft or above will not be in chemical equilibrium. Under these conditions the wake radiation cannot be obtained from the ordinary equilibrium calculations, but a detailed study must be made of the chemical kinetics of the nonequilibrium wake. This memorandum presents the results of such a study for the case of a blunt, nonablating vehicle. Knowledge of the important chemical reactions for a pure air wake is fairly complete. However, large uncertainties exist with respect to hypersonic turbulence. For that reason, two recently proposed models of the turbulent mixing process are used in this memorandum: the inviscid random convection model, and the homogeneous mixing model. These two models give radiant intensities for the various chemiluminescent reactions that differ as much as several orders of magnitude. This large difference is another illustration of the importance of increasing our knowledge of hypersonic turbulence. The radiation estimates presented here show that the nonequilibrium wake radiation in the UV, visible, and near IR should dominate the gas cap and surface radiation at altitudes above about 100,000 ft. (Author)
A study of the feasibility of detecting nuclear explosions by means of antineutrinos by Richard O Hundley( Book )

1 edition published in 1960 in English and held by 4 WorldCat member libraries worldwide

The global course of the information revolution : recurring themes and regional variations( )

2 editions published in 2003 in English and held by 4 WorldCat member libraries worldwide

Emerging Challenge: Security and Safety in Cyberspace by Richard O Hundley( )

1 edition published in 1997 in English and held by 1 WorldCat member library worldwide

The global course of the information revolution : technological trends : proceedings of an international conference by Technological Trends Global Course of the Information Revolution( Book )

2 editions published in 2000 in English and held by 1 WorldCat member library worldwide

Reports on a conference sponsored by the National Intelligence Council in May 2000 that concentrated on technical trends in the information revolution, focusing in particular on the resulting new artifacts and services that might become widespread during the next 20 years. Participants saw a convergence of voice and data communications and a quantum jump in bandwidth during the next two decades, along with limited machine translation. A multitude of diverse, powerful, inexpensive sensors and devices capable of limited-distance wireless communications will come onto the market and computing and information systems will become much more ubiquitous, with convergence of wireless telephones, voice and e-mail messaging, and smart appliances. A likely shift in business emphasis from products to services will have an impact in such areas as health care, education, entertainment, and supply-chain management. Participants also discussed individual and societal tensions that could arise from these developments, such as battles between advocates of "open" and "closed" worlds of protocols and standards, and the threats to intellectual property rights and to individual privacy
An Assessment of Defense Nuclear Agency functions : pathways toward a new nuclear infrastructure for the nation by Richard O Hundley( Book )

2 editions published in 1994 in English and held by 1 WorldCat member library worldwide

This report documents the results of a congressionally directed study to evaluate alternative ways of accomplishing the functions currently performed by the Defense Nuclear Agency (DNA). The motivation for the request was a desire on the part of the Congress to substantially reduce the size and costs of programs associated with the Cold War era and to resolve two different congressional perspectives about meeting the nation's needs in areas associated with DNA. The result was a four-month RAND study sponsored by the Assistant to the Secretary of Defense for Atomic Energy (ATSD/AE)
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.36 (from 0.03 for Past revol ... to 0.96 for Emerging C ...)

The global course of the information revolution : recurring themes and regional variationsThe global course of the information revolution : recurring themes and regional variations
Alternative Names
Hundley, Richard

Languages
Covers
Past revolutions, future transformations : what can the history of revolutions in military affairs tell us about transforming the U.S. military?The global course of the information revolution : political, economic, and social consequences : proceedings of an international conferenceSecurity in cyberspace : challenges for society : proceedings of an international conferenceThe global course of the information revolution : recurring themes and regional variationsThe global course of the information revolution : technological trends : proceedings of an international conference