This essay Technology has a total of 712 words and 4 pages.
The Technology Needs Survey (TNS) software program developed at HSC/XRE was originally intended to
provide a convenient vehicle by which the office’s engineers and scientists could enter and edit
environmental, safety and occupational health (ESOH) needs data into a database. The program provided
an interface that allowed the user to answer, or revise answers, to questions regarding the nature of the
ESOH technology needs of the customer. The database was originally installed on a local area network
(LAN) shared by the technical members of the HSC/XRE office.
The data in the database was used, in part, to rank the severity, impact and importance of technology needs
throughout the Air Force. HSC/XRE performed substantial analysis on the data prior to its presentation to
the ESOH TPIPT, Air Staff and others. Consequently, the database itself became a dumping ground for
temporary tables, queries and reports that were generated "on the fly" over time.
The structure of the underlying database is simple, as shown in Figure 1. The numerous queries, reports
and tables that are antidotal artifacts in the database are distractions to the underlying structure, and should
Creation of the Tri-Service TNS Database for FY97
The source data for the FY97 Tri-Service TNS database came from four sources:
· US Navy, by way of four MS WORD documents (segmented by pillar)
· US Army, by way of a TNS database that had been exported from a version of the software modified by
the US Army and/or their contractors
· USAF FY96 TNS database — last year’s USAF database, with needs updated as required
· USAF FY97 TNS database — current year’s new USAF technology, policy and training needs
The tasking from the HSC/XRE office was to consolidate the four data sources into a single database and
provide it to representatives of the Joint Engineering Management Panel (JEMP) on or before 31 Dec,
1996. Such a database would be known as the Tri-Service TNS Database for FY97.
The USAF FY97 database was considered the target into which the other three data sets were to be
consolidated. At this point in time (Dec, 1996), the FY97 database still contained "T-numbers", rather than
Tag integers. It appeared that there were printing difficulties with T-numbers in the Tag field, so they were
removed, and added as a prefix to the need Title. In their place, sequential integers, beginning with 3000,
were placed in the Tag field.
Next, the Navy needs, which consisted of 807 needs in four word documents, were manually added to the
FY97 database using the TNS software. This was a two man-day effort by a program support individual.
All attempts to successfully print all US Army needs failed. Most needs contained a data value that
exceeded TNS’s a single print page. A bug in TNS causes the first page to be printed OK; then, subsequent
lines are printed, one per page. It was decided that the US Army database would be provided to the
government as-is, with a suggestion that the government obtain the US Army’s TNS version to see if the
bug had been fixed by the Army.
The final step was to export the USAF FY96 TNS database, and import it into the FY97 database. This
presented something called the "Match Table Problem."
The Match table in TNS contains three columns — the need number, a category, and a pointer. Depending
upon the category, the category would represent a unique primary POC, technical POC, potential user,
regulation or contaminant. These pointers are not uniquely generated; therefore, a primary POC with a
pointer of 4254 might point to Smith in the FY96 database, while a primary POC with a pointer of 4254
might point to Jones in the FY97 database. The same corruption was possible for regulations and
contaminants, as well.
To resolve this problem, it was determined that the set of pointers in the FY97 database did not exceed
5000 for POC, regulations and contaminants. Consequently, the pointers in the Match table of the FY96
database were incremented by 5000, as were their corresponding targets in the POC, Regulation and
Contamination tables. This assured that there would be no overlap between the two databases.
The FY96 database was imported successfully into the FY97 database.
Topics Related to Technology
Essays Related to Technology
The History of DinosaursThe History of Dinosaurs The dinosaurs were reptiles that appeared about 230 million years ago. It\'s believed that they had scaly skin and some ate plants and others ate meat. Scientists don\'t know whether or not the dinosaurs were cold blooded, but they think the smaller ones were warm blooded, and the large ones were cold-blooded. In this report you\'ll learn about the earliest dinosaurs, the kinds of dinosaurs, and how the dinosaurs died. There are two main groups of the earliest dinosaurs:
Computer Based SystemsComputer Based Systems The system Development Cycle What is it? The system development cycle is a method used to create a system where none has existed before and/or modify an existing system. It is sometimes simply called System Development. It involves a number of stages representing a standard strategy for taking a problem from start to finish. Two approaches: 1. Conservative-working systematically through the steps. 2. Radical-Cycling through the cycle several times until the final result is
TechnologyTechnology Background The Technology Needs Survey (TNS) software program developed at HSC/XRE was originally intended to provide a convenient vehicle by which the office’s engineers and scientists could enter and edit environmental, safety and occupational health (ESOH) needs data into a database. The program provided an interface that allowed the user to answer, or revise answers, to questions regarding the nature of the ESOH technology needs of the customer. The database was originally install
Title of Paper : CASE toolsTitle of Paper : CASE tools Grade Received on Report : 95% CASE Tools What are CASE Tools ? Computer Aided Software Engineering (CASE) tools provide automated support for many of the systems analysis and design methods available to the information systems developer. CASE tools provide an environment which automates many time-consuming aspects of the systems development process, including: drawing and redrawing diagrams cross checking usage of elements across the system model generation of system
Ethics in the Age of InformationEthics in the Age of Information The information age is the age we live in today, and with the information age comes an age of ethics. When we deal with the new technologies introduced every day, we need to decide what we must consider ethical and unethical. We must consider all factors so that the use of the information readily available to many persons is not abused. Information technology will be the most fundamental area of ethical concern for business in the next decade (Houston 2). The m
Federal GovernmentFederal Government Electronic Commerce and - FACNET - Electronic Commerce Electronic Commerce (EC) is a concept whereby the acquisition of supplies and services is conducted via a paperless exchange of business information through computers. This new approach to procurement activity requires agreed upon formats and standards by which computers can communicate to each other and transfer information back and forth. This exchange of information is defined as Electronic Data Interchange, or EDI. The
INTERNET REGULATION: POLICING CYBERSPACEINTERNET REGULATION: POLICING CYBERSPACE The Internet is a method of communication and a source of information that is becoming more popular among those who are interested in, and have the time to surf the information superhighway. The problem with this much information being accessible to this many people is that some of it is deemed inappropriate for minors. The government wants censorship, but a segment of the population does not. Legislative regulation of the Internet would be an appropriate
· Other objects like lines (roads) and polygons (a· Other objects like lines (roads) and polygons (areas, minefields) are more complicated to handle and will need trained personal (if they\'re entered and maintained within the GIS). · If data concerning the state of roads and bridges is necessary to be easily retrieved it might be necessary to create a special form for handling such information. It shouldn\'t be in the existing reports, because they are snapshots of progress and are being used for documentation · The base coordinate system for
Computer EthicsComputer Ethics Abstract The computer is considered one of the most technological advances of the twentieth century. As the general public becomes increasingly ‘computer literate,\' the gap between technology and peoples\' intellect notably shrinks. The readily available computers, software, and assorted output devices have enlightened many but, in turn, have increased the using of computers for unethical activities, privacy invasion and illegal purposes. Legal sanctions against abusive use of c
Wireless communicationsWireless communications INTRODUCTION Wireless communications are becoming increasingly popular in today’s fast paced world. Mobility, portability, and instant access (via the Internet) to unlimited information have become the mantra of businesses and individuals alike. The evolution of wireless communications has been incredibly quick and the future of this technology is unlimited. The impact of this technology on our lives will be tremendous and allow us to do things we never imagined. What Is
Antony and CleopatraAntony and Cleopatra In Shakespeare\'s tragedy/history/Roman play Antony and Cleopatra, we are told the story of two passionate and power-hungry lovers. In the first two Acts of the play we are introduced to some of the problems and dilemmas facing the couple (such as the fact that they are entwined in an adulterous relationship, and that both of them are forced to show their devotion to Caesar). Along with being introduced to Antony and Cleopatra\'s strange love affair, we are introduced to som
CensorshipCensorship During the last decade, our society has become based on the sole ability to move large amounts of information across great distances quickly. Computerization has influenced everyone\'s life in numerous ways. The natural evolution of computer technology and this need for ultra-fast communications has caused a global network of interconnected computers to develop. This global network allows a person to send E-mail across the world in mere fractions of a second, and allows a common perso
Computer, Internet, PrivacyComputer, Internet, Privacy INTERNET REGULATION: POLICING CYBERSPACE The Internet is a method of communication and a source of information that is becoming more popular among those who are interested in, and have the time to surf the information superhighway. The problem with this much information being accessible to this many people is that some of it is deemed inappropriate for minors. The government wants censorship, but a segment of the population does not. Legislative regulation of the Inte
Computer Crimes on the InternetComputer Crimes on the Internet Thesis: Emerging with the Internet, a group of elite cyber-surfers have turned into todayís computer hackers. Software piracy is a major crime on the Net. $7.5 billion of American Software is stolen each year. Industrial Espionage is gaining access to remote sites illegally. Stealing of information from corporate sites is extremely illegal. Password Sniffers are used to get someoneís password. IP spoofers changes your identity. Many things can be stolen from compa