Com Application Package Shipping &Amp: Fill & Download for Free

GET FORM

Download the form

How to Edit The Com Application Package Shipping &Amp freely Online

Start on editing, signing and sharing your Com Application Package Shipping &Amp online refering to these easy steps:

  • Click on the Get Form or Get Form Now button on the current page to direct to the PDF editor.
  • Give it a little time before the Com Application Package Shipping &Amp is loaded
  • Use the tools in the top toolbar to edit the file, and the edited content will be saved automatically
  • Download your edited file.
Get Form

Download the form

The best-reviewed Tool to Edit and Sign the Com Application Package Shipping &Amp

Start editing a Com Application Package Shipping &Amp right now

Get Form

Download the form

A simple guide on editing Com Application Package Shipping &Amp Online

It has become quite simple recently to edit your PDF files online, and CocoDoc is the best free web app you have ever used to make some changes to your file and save it. Follow our simple tutorial to start!

  • Click the Get Form or Get Form Now button on the current page to start modifying your PDF
  • Create or modify your content using the editing tools on the toolbar on the top.
  • Affter changing your content, put the date on and make a signature to finish it.
  • Go over it agian your form before you click and download it

How to add a signature on your Com Application Package Shipping &Amp

Though most people are accustomed to signing paper documents by writing, electronic signatures are becoming more accepted, follow these steps to sign PDF online!

  • Click the Get Form or Get Form Now button to begin editing on Com Application Package Shipping &Amp in CocoDoc PDF editor.
  • Click on Sign in the tool menu on the top
  • A popup will open, click Add new signature button and you'll be given three choices—Type, Draw, and Upload. Once you're done, click the Save button.
  • Drag, resize and position the signature inside your PDF file

How to add a textbox on your Com Application Package Shipping &Amp

If you have the need to add a text box on your PDF in order to customize your special content, follow the guide to carry it throuth.

  • Open the PDF file in CocoDoc PDF editor.
  • Click Text Box on the top toolbar and move your mouse to drag it wherever you want to put it.
  • Write down the text you need to insert. After you’ve typed the text, you can use the text editing tools to resize, color or bold the text.
  • When you're done, click OK to save it. If you’re not satisfied with the text, click on the trash can icon to delete it and start again.

A simple guide to Edit Your Com Application Package Shipping &Amp on G Suite

If you are finding a solution for PDF editing on G suite, CocoDoc PDF editor is a suggested tool that can be used directly from Google Drive to create or edit files.

  • Find CocoDoc PDF editor and set up the add-on for google drive.
  • Right-click on a PDF file in your Google Drive and choose Open With.
  • Select CocoDoc PDF on the popup list to open your file with and give CocoDoc access to your google account.
  • Edit PDF documents, adding text, images, editing existing text, highlight important part, fullly polish the texts in CocoDoc PDF editor before saving and downloading it.

PDF Editor FAQ

What are some of the problems that dropshipping entrepreneurs face?

My company has supplied 100s of drop ship entrepreneurs with the products they need to get off the ground without investing capital in a warehouse, inventory or staff. Some of the problems I have seen are:1) Recognizing that having product is not the same as having traffic, and having traffic is not the same as sales. You need to have a strategy to get traffic to your online store. You may be a small bricks and mortar retailer with a built in customer base and referral base with an good sized email list and Facebook/Twitter following, or you may be a blogger with a specialized following among, say, new moms. You may be good at SEO/SEM or how to bid cheaply for keywords at Google, Bing, etc. You may know the ins and outs of Amazon Marketplace or eBay and how to get into the Buy Box and get good customer reviews....Whatever your strategy (and there are a bunch more), you have to be able to bring traffic. That is the secret sauce. That is where you add value. If you cant do this, or don't want to learn how to, then save yourself the energy and cost of launching an eCommerce business.2) Product cost. It is naive to think that if you buy 1 bottle of dish soap on drop ship (returnable) you will pay the same unit price as if you buy a pallet of that dish soap for your own inventory (non returnable). The volume of your purchases affect your cost. Since you will be competing in the marketplace with etailers who stock inventory and buy on deal, you need to focus on products with good drop ship margins and promote those items where you have good drop ship margins to work with. For example, Honest Green puts 2,000 skus a month on sale 10-40% off to our drop shippers which gives them a lot of room to be aggressive on price for those skus to attract traffic and convert traffic to sales.3) Shipping. There is no such thing as free shipping from your drop shipper. But you are under pressure to offer free shipping to your end consumers since, after all Amazon offers it for purchases over $25. When you are an etailer using the drop ship model you have to be careful about your shipping tiers to reduce the chance of having a negative gross margin sale (for example, when someone buys $25 worth of items and you give them free shipping, which really costs you $9 by UPS and you may have a negative gross margin transaction. A sale is not the same as a positive gross margin sale. Honest Green offers 15,000 + skus in one warehouse, which gives you a better chance of increasing your basket size with related products and getting to a $50, $75 sale where free shipping is financially feasible for you as an option.4) Unreliable drop ship partners. If you have an unreliable partner your reputation will suffer and in marketplaces like Amazon Marketplace you will be penalized. It is frustrating as a drop ship entrepreneur to have so many elements of your business out of your control. Just last week we saw Alice. com abruptly shut down despite a reported $18 million in VC funding. They did the consumer drop shipping for many consumer package goods brands, leaving them all in a lurch with no way to fulfill their orders to end consumers.5) Not updating Inventory on Hand each day from your drop ship partners. If you neglect to do this, you will "sell" items your drop ship supplier is out of stock on. It causes bad feelings with your customers and lots of customer service headaches. There are good tools to automate this, such as Inventory Source and eComm Hub. It is worth a dollar a day to make sure you are selling items which are in stock and ready to ship.6) Choice of e Commerce platform. I have seen some really bad choices for e commerce platforms by drop ship entrepreneurs. I am a fan of launching with cloud based SAAS (software as a service) solutions like Magento Go, Shopify, Big Commerce. The big names are more likely to have big eco systems to make it easier to add on features, such as Inventory Source and eComm Hub, two name just a couple. If you have a great add on tool, you are much more likely to build APIs (Application Programming Interfaces) to the main shopping cart platforms.7) Basic tech prowess. If you dont know how to sort a product feed in Excel by margin percentage (to find high margin products) or upload your products to your shopping cart, crop a product photo or other basic e commerce tasks, you really need to ask yourself if you should be an ecommerce entrepreneur. When I started my first web company in 1993 (The Internet Factory) there were no "shopping carts". Everything had to be custom built. You had to be technically inclined to launch a e Commerce business. Now you can be MUCH less tech saavy, but I run across way too many people who think they can be successful as a solo drop ship entrepreneur without some basic skills to manage a online store.8) Taking FOREVER to launch and trying to get it perfect. SALES cures most problems and it is a lot easier to get moving faster once you are rolling : -) I have seen people pain over their first web store for 6 months before they launch it, trying to get it perfect. A big hurdle is collecting images and descriptions and getting them into your catalog as a drop shipper. Honest Green not only offers a full product feed ready to upload to your cart, we also offer a turn key store, based on Zen Cart, that you can be up selling in a week or two. If you own your domain you can always point it to an improved e commerce platform six months later after you have started generating sales.9) Domain choice. Please get a .com and make it a good one, even if you have to buy it from someone for $250 or $500 or so. I have seen so many bad domains, hard to spell, or using a .net or .org when you don't own the .com. Your domain is your real estate. Stake out a good corner location for your store!10) You dont have to have a website ! You can be successful by starting at high traffic marketplaces like Amazon, ebay, buy .com or niche marketplaces like OpenSky. It goes back to #1: You need traffic and if you dont have a way to drive it you should be in a place that has a lot of built in traffic. The issue is that pricing is competitive at those marketplaces and you may not have low enough costs to offer prices low enough to win the sale. Honest Green recognizes this "chicken and egg" problem and offers a pricing buy down program to drop shippers to get lower pricing before you have the proven volume to earn it.Drop shipping is not an automatic path to success. However, renting a warehouse and stocking it with products in the hope that you may build a successful etail business is very risky. That risk is multiplied when you have products that have expiration dates! Drop shipping may be a good solution not only at your start up, but as a complement to a stocking etailer (as a way to extend product selection with no cost). You would be astonished at how many of the top 100 Internet Retailers use drop shipping as part of their supply chain strategy. Just look at the customer list of Commerce Hub (software than helps large etailers manage their drop ship supply base) and you will get a sense of what I am talking about.PJ StaffordCo-PresidentHonest GreenThe eCommerce Division of UNFI

What is the future of war?

The next twenty years are going to showcase some of the most monstrously terrifying while holistically awe-inspiring feats of engineering in the history of warfare.To set the scene, imagine a time in the not so distant future. A despotic regime in the Horn of Africa is growing wealthy as their people toil though life in comparatively medieval conditions. A once nameless local warlord has grown to become a regional threat, disturbing the balance of power and trade from Central Africa to the waters on the far end of the Indian Ocean. He is backed by powerful Eastern allies caring enough for his nation's mineral wealth to ignore his history of human rights violations to the neighboring peoples who have fallen under his shadow. Emboldened by the regime's newly acquired military hardware, the dictator invades his neighbor to the South.AirSatellite imaging has shown diplomatic initiatives to prevent the invasion have failed. The dictator has already started his attack. Ground forces have crossed the border simultaneously with a series of air strikes. Armed with next generation aircraft, they are an imposing threat to dated military of their targets. As the air raid sirens blow, they scramble to arm and launch their small force of outdated warplanes built more than 40 years ago. In previous wars these planes were considered to be invincible, but today many of the pilots wonder if they now are little more than their own glorified coffins.Elsewhere, on a base in the the Arabian Sea the order has been given to launch a squadron of hypersonic fighter drones.Son of the BlackbirdEnvisioned as an unmanned aircraft, the SR-72 would fly at speeds up to Mach 6, or six times the speed of sound. At this speed, the aircraft would be so fast, an adversary would have no time to react or hide.“Hypersonic aircraft, coupled with hypersonic missiles, could penetrate denied airspace and strike at nearly any location across a continent in less than an hour,” said Brad Leland, Lockheed Martin program manager, Hypersonics. “Speed is the next aviation advancement to counter emerging threats in the next several decades. The technology would be a game-changer in theater, similar to how stealth is changing the battlespace today.”A hypersonic plane does not have to be an expensive, distant possibility. In fact, an SR-72 could be operational by 2030. For the past several years, Lockheed Martin Skunk Works® has been working with Aerojet Rocketdyne to develop a method to integrate an off-the-shelf turbine with a supersonic combustion ramjet air breathing jet engine to power the aircraft from standstill to Mach 6. The result is the SR-72 that Aviation Week has dubbed “son of Blackbird,” and integrated engine and airframe that is optimized at the system level for high performance and affordability."Meet the SR-72" - Lockheed Martin Press ReleaseAs the drones take off a nervous international film crew in a hotel more than 3200 km away prepare for the impending attack. As the minutes tick by a lucky cameraman on the balcony spots the enemy's planes in the distance. The tiny specs of silver grows ever more dangerous in the sky as four squadrons of enemy fighters become visible. Twenty six minutes after the invasion began the warplanes are now visible to the capitol city. As their profile becomes clearer the camera captures something its operator can't even see. He sees the jets in the distance and then a flash of light and smoke - first the lead plane followed soon after by all of the other fifteen in his formation. He thinks that they have fired their missiles, but then sees in the distance through his camera's zoom the puffs of smoke were actually explosions in the sky. Sixteen white clouds were showering debris on the city outskirts. A few moments later the city is rocked by a violent tremor and the deafening roar of a thousand screaming lions as windows throughout the city shatter and fall to the ground. No enemy planes are anywhere to be seen as the clouds of fallen invaders dissipates into nothingness. A few minutes later a second boom can be heard, this time much more faint. As its echoes fade the sirens are quieted and silence is all that is heard throughout the city.CyberspaceThe dictator sat at the head of a granite top table in the situation room of the jewel of his domain, the Republican Guard Headquarters Building with his most accomplished and senior staff to either side. They looked above the massive table to monitors on the far wall. As their forward strike fighters continued on their doomed mission, little did these leaders know that an enemy agent had already infiltrated the deepest recesses of their most guarded strongholds, and in fact, that very room. As they gleefully watched their monitors in the situation room, expecting to see the results of a stunning victory, the room abruptly went dark. Sudden night fell on the leadership with the deafening silence of the sudden halting of every light, screen, computer, and air vent in the building. The after image of the screens in the pitch blackness of the room was the only thing the dictator and his Generals could see. As the dim green square in their vision faded, fear and confusion took over when they realize that they are cut off from their information of the battlefield and their command over it."United States Cyber Command (USCYBERCOM) plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries."Stuxnet is a computer worm that was discovered in June 2010. It was designed to attack industrial Programmable Logic Controllers or PLCs. PLCs allow the automation of electromechanical processes such as those used to control machinery on factory assembly lines, amusement rides, or (most infamously) centrifuges for separating nuclear material. Exploiting four zero-day flaws, Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks, then seeking out Siemens Step7 software. Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart. Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges. Stuxnet has three modules: a worm that executes all routines related to the main payload of the attack; a link file that automatically executes the propagated copies of the worm; and a rootkit component responsible for hiding all malicious files and processes, preventing detection of the presence of Stuxnet. Israel, through Unit 8200, has been speculated to be the country behind Stuxnet in many media reports and by experts such as Richard A. Falkenrath, former Senior Director for Policy and Plans within the U.S. Office of Homeland Security.The helpless dictator and his highest ranking officials clumsily scurry and stumble amid the confusion and chaos of the situation room. Groping in the darkness one finally reaches the door, opening to reveal a likewise dimmed out hallway, stirring with frightened secretaries and officials. So deep in the building was the central administration section of the Republican Guard Headquarters that natural light from the outside had no chance of reaching them. The first few minutes ticked away as they fingered their ways down the hall, led by the soft glow of lighters in their pockets and the few flashlights that had been found in the office. The dictator's security team stormed the room as they grabbed their leader to take him to his secure command center. The Generals, now left behind, guided themselves to a point of light at the end of the hall. An exit sign was visible at the end of a hall above a door, natural light peeking out from around its perimeter. They opened the door to the blinding light of the setting sun.As they regained themselves, they looked out over the balcony of the building. They could see their dictator being rushed into a car and it screaming into the street. Within the car the dictator desperately tried to regain control of his country. He and his closest secretaries pulled their phones from their pockets to realize all the devices were now dead. All communication lines had been lost. One of them screamed out to destroy their phones since they may be being tracked. Frustrated, he threw his phone to floorboard and stomped it with his foot, followed by all the rest. As his car made its way down the momentous parade route of the Ministry of Defenses's new complex of buildings he saw that none was lit as it should be at this hour. Each had gone dark. In the distance he could see only the dark silhouettes of the National Palace and the Headquarters of the National Police, contrasted greatly by the bright lights in full illumination of the city behind them. Behind him he saw his grand Republican Guard building, now just a shadow, backlit by the rising of the full moon.He could never have known that days before a secret agent had slipped deep into nation's defense system. It had arrived when he had made one of his grand propaganda broadcast in the days and weeks leading up to today's attack. After a digitally broadcast display of his army on parade he gave a speech, invigorating his populace. After the grandiose display a commercial was broadcast telling his citizens of a news application where they could learn more about their great leader's plan to empower the people of their nation. A link was displayed on the screen where his citizens were asked to download the free news and information source. Tens of thousands of his people did as they were instructed. Had he only known that the program they downloaded was not the one he had provided. Unbeknownst to anyone, they were redirected through a series of proxies to a new program, one similar in every way, from look to functionality to the one the dictator had mentioned... that is, except for major difference. Embedded in the program was a new process. This additional program tracked the information of everyone who downloaded it. From a base far away, an information network was being created with the ID's, contacts, messaging identifiers, locations, bank account activity, medical history and locations of thousands of different users. Subtle messages were being generated and sporadically sent out across all user's social media and email accounts. Faithful believe in the words of their friends, family and coworkers endorsement of the very real, well-known and verified national news source encouraged millions of people to download the application. This truly viral media campaign had, in fact, been among the nation's most successful advertising campaigns. His national secretaries believed the great success was due to the people's great faith in the dictator and his dream for their nation. In days building up to right now, a virtual map of all the most influential systems and people had been developed automatically by the intrusive worm. Information on millions of his people was now accessible, most importantly many of his top aides, officials and officers. Entrances had been created into the most important networks in his country, from his military networks, the national banking system, his secret police force and intelligence networks and even into the power and sewer grids. As darkness fell over his city, a shadow that had loomed in his presence began to rise.His car made its way to his secure bunker deep within the Ministry of Defense's Complex in the capital. Helplessly he looked out his window when his car came to a stop. He screamed at the driver for an explanation of the delay when he looked ahead to see the streets ahead in hopeless gridlock. As the lights when dark in the Ministry, so did the traffic lights throughout the entire city. Now there was nothing directing the millions of people heading home from work on what seemed like a normal day. It was the only civilian system affected, yet it left the entire city and all its people in a complete standstill. As he looked out he saw the line of cars clustered before him and the growing congestion building behind him. He was trapped and completely vulnerable. Most were just normal commuters but now many were desperate government officials fleeing the Ministry. Realizing the danger he was in, his security team opened his car door and rushed him out of the vehicle. They would have to make the rest of the three mile trip on foot.He wouldn't reach his destination though. Among his entourage was the driver of his vehicle and his personal confidant. Not realizing the danger it posed, he had never thought to destroy his phone. Though the device appeared to be broken and disabled, as he discovered when attempting to reach Central Command, a message was still being sent.........."9°00'49.2"N, 38°45'44.9"E"..."Heading North by Northwest"..."3.2 meters per second"...SpaceAn overland invasion force has yet to receive word of their forward air strike's failure and the collapse of the Ministry of Defense in the capital. They view the radio blackout as a temporary interruption and continue on their mission as ordered until command can come back online. Formations of tank and troop carriers storm in through the African savanna. They can be seen nearing a local village by villagers high in the mountains. The dust their convoy column has risen is visible for miles. As the village comes in sight from the top of the hill, their column reforms and goes offroad. Spread out across the valley they loom upon the frightened villagers.High in orbit above the continent a satellite shifts into position.Project Thor is an idea for a weapons system that launches kinetic projectiles from Earth orbit to damage targets on the ground. Jerry Pournelle originated the concept while working in operations research at Boeing in the 1950s before becoming a science-fiction writer.[1][2] The most described system is "an orbiting tungsten telephone pole with small fins and a computer in the back for guidance". The weapon can be down-scaled, an orbiting "crowbar" rather than a pole. The system described in the 2003 United States Air Force (USAF) report was that of 20-foot-long (6.1 m), 1-foot-diameter (0.30 m) tungsten rods, that are satellite controlled, and have global strike capability, with impact speeds of Mach 10.[3][4][5]The time between deorbiting and impact would only be a few minutes, and depending on the orbits and positions in the orbits, the system would have a world-wide range. There is no requirement to deploy missiles, aircraft or other vehicles. Although the SALT II (1979) prohibited the deployment of orbital weapons of mass destruction, it did not prohibit the deployment of conventional weapons. The system is prohibited by neither the Outer Space Treaty nor the Anti-Ballistic Missile Treaty.[4][6]The idea is that the weapon would inflict damage because it moves at orbital velocities, at least 9 kilometers per second. Smaller weapons can deliver measured amounts of energy as small as a 225 kg conventional bomb. Some systems are quoted as having the yield of a small tactical nuclear bomb.[5]In the case of the system mentioned in the 2003 USAF report above, a 6.1 m × 0.3 m tungsten cylinder impacting at Mach 10 has a kinetic energy equivalent to approximately 11.5 tons of TNT (or 7.2 tons of dynamite). The mass of such a cylinder is itself greater than 9 tons, so it is clear that the practical applications of such a system are limited to those situations where its other characteristics provide a decisive advantage. Some other sources suggest a speed of 36,000 ft/s (11,000 m/s),[8] which for the aforementioned rod would amount to a kinetic energy equivalent to 120 tons of TNT or 0.12 kt. With 6-8 satellites on a given orbit, a target could be hit within < 12–15 minutes from any given time, less than half the time taken by an ICBM and without the warning.As the raid nears the city, frightened villagers look back to their assailants. As they do they see a series of streaks dart across the sky. The momentary points of light rain havoc upon the enemy vehicles. Tanks are flattened and thrown across the landscape as troop vehicles disintegrate in plumes of dust. As they watch with awe three more flashes of light steak across the sky. They collide the Earth with a massive eruption of violence and astonished bewilderment. With fear and amazement, massive dust clouds rise from the impact sights as each eject a wave of force emanating from their points of impact. The waves spreads across the plain, felling trees and kicking up the grasses. The waves continue on towards the village, first one, then another and then another. They are knocked from their feet and look back on the blast. The area is nothing more than a massive cloud of dust which is now settling everywhere around them. Their attackers are all gone. [1]SeaCombating a rise in piracy within their maritime jurisdictions, various world governments have adapted to be responsive with faster, lighter navies armed with fleets of advanced new ships combining stealth capabilities with high fire power armaments and speeds outmatching their agile rivals.As the regime begins to breakdown in Africa weapons and soldiers flow out and join up with local pirate factions looting shipping lanes across the Indian ocean. Little did one ship know, that it was already being closely followed by the US Navy's next generation of naval weapons.The littoral combat ship (LCS) is a class of relatively small surface vessels intended for operations in the littoral zone (close to shore) by the United States Navy.[1] It was "envisioned to be a networked, agile, stealthy surface combatant capable of defeating anti-access and asymmetric threats in the littorals."[2]The Freedom class and the Independence class are the first two variants of LCS by the U.S. Navy. LCS designs are slightly smaller than the U.S. Navy's guided missile frigates, and have been likened to corvettes of other navies. However, the LCS designs add the capabilities of a small assault transport with a flight deck and hangar large enough to base two SH-60B/F or MH-60R/S Seahawk helicopters, the capability to recover and launch small boats from a stern ramp, and enough cargo volume and payload to deliver a small assault force with fighting vehicles to a roll-on/roll-off port facility. The standard armament for the LCS are Mk 110 57 mm guns and Rolling Airframe Missiles. It will also be able to launch autonomous air, surface, and underwater vehicles.[3] Although the LCS designs offer less air defense and surface-to-surface capabilities than comparable destroyers, the LCS concept emphasizes speed, flexible mission module space and a shallow draft.The concept behind the littoral combat ship, as described by former Secretary of the Navy Gordon R. England, is to "create a small, fast, maneuverable and relatively inexpensive member of the DD(X) family of ships." The ship is easy to reconfigure for different roles, including anti-submarine warfare, mine countermeasures, anti-surface warfare, intelligence, surveillance and reconnaissance, homeland defense, maritime intercept, special operations, and logistics. Due to its modular design, the LCS will be able to replace slower, more specialized ships such as minesweepers and larger assault ships.[11]The pirates are occupied hunting down civilian traffic in the area... to busy to notice the ship rapidly gaining on them. Traveling at more than 50 knots these next generation littoral ship is one of the fastest vessels in existence. In little time at all it has closed with the pirate's ship. Desperate to evade, the pirates attempt to flee. Wishing to avoid a confrontation the Captain issues an edict for the ship to shut off it's engines using its latest version of the Long Range Acoustic Device in twelve of the major languages of the region. Fearing capture and acting in desperation the pirates turned their boat towards the US Navy ships. It was clear that they were attempting to ram the vessel. Warning shots were fired from the 110 cannons across the enemy bow. The ship continued to close. The cannons were zeroed on the ship and with the Captain's command the ship was torn to shreds by successive bursts of the overwhelming cruiser.A life raft was spotted behind the wreckage. The XO informed the Captain that it appeared they had jumped ship hoping that the ramming would sink the LCS. If the pirates were able to get back home having captures a video sinking the US Navy ship they could become wealthy men for the bounties that circulated among the area's various black market cartels. Today, however, they wouldn't be so fortunate and tonight they would be spending the night in the ship's brig. This was the second such arrest this week by the fleet with another seven expected before the end of the month. [2]MedicineCorporal "Cy" Fannon is augmented with an artificial eye and hand after losing his in Venezuela. The "Cy" stands either for cyborg or cyclops. No one really knows which and no one is brave enough to ask. He's quiet, but when he looks at you with that creepy as hell robot eye, you'll do whatever he asks just to get him to stop eyeballin' you.After Venezuela, Fannon was given the opportunity to be med-sepped with full medical benefits from the VA. He was also presented with the opportunity to prototype some new of the DARPA tech ready for the field. He took the road of fool hardy and stayed in to be a human guinea pig for some robomed company's hopes of creating the future of robot warriors to put the rest of us out of a job.Futurists and researchers in prosthetic technology say that nearly everything depicted in [science fiction] films is possible; indeed, current advances in robotics, neuroscience, and microelectronics are bringing the visions of science fiction closer to reality every year. Over the next two decades, scientists expect to introduce bionic appendages that respond to thoughts, and chips implanted in the brain with the potential to download data directly into human memory banks.Devices including "neuroprosthetic" limbs for paralyzed people and "neurorobots" controlled by brain signals from human operators could be the ultimate applications of brain-machine interface technologies developed under a $26 million contract to Duke University sponsored by the Defense Advanced Research Projects Agency (DARPA). The contract is part of DARPA's Brain-Machine Interfaces Program (http://www.darpa.mil/dso/thrust/sp/bmi.htm), which seeks to develop new technologies for augmenting human performance by accessing the brain in real time and integrating the information into external devices.His first major augmentation was his neural unit installed into his skull. You can see the scar under his high reg, but it's not like the brick they've been installing in amputees for the past decade. Even if they don't have to move their arms and legs like robots anymore, half of them would fall over from the stupid giant controller unit. I don't even know how they sleep. Cy's got it all on the inside. I really don't know that all works. What powers the damn thing? Half of us wonder if the thing is fryin' his brain or something, either with microwave transmissions or just because he has a stinking computer console in his grape, but as long as he doesn't short circuit, I guess he's fine.Next, he got his arm. They've really perfected the art form with arms like his. Honestly, I didn't even know he had the thing until we went out to the bar one day back in San Diego. He crushed a beer can into a marble. I thought I was going to piss myself. It wasn't until he pulled off a flesh panel to show the gears, wires, and techogizzitry that I realized he had the prosthetic limb. It was all Star Wars or something. It's honestly a bit of an advantage. I know you're not supposed to say that a dude who got his hand blown off has an advantage, but as long as he keeps his arm still he always quals expert at the range and has the grip of a bear. Ok, he has to oil himself like some sort of freaky Marine Corps version of the Tin Man, but still I kind of wonder if he is better off with the robot arm.Lastly, and most obviously, is his freaky robot eye. He didn't take the natural ones. No, he went full Terminator. It's an on board camera with multiple sensors that far outperform us "norms". He can see with that thing far beyond normal people. He can focus the thing to full zoom at better than 20/1 vision, more than 20 times farther than any of the rest of us. What'll really freak you out is that he can see in infrared and night vision. It isn't as good as the installed unit of helmets, but he can see heat, which is so freaky. I don't really know what one would do with all that, but I suppose it's nice that he always knows which beer is coldest. I guess that is a good trade off. What's probably the most important though is that he can record everything. At night he'll go through and plug this cable into the port of his eye, review and upload all the important stuff he saw that day. I kind of wonder what he does with it. Makes me really worried to change in front of the guy, but oh well. His depth perception is still off though. When he is letting the system idle with the range finder off, Sergeant has fun throwin' stuff at him, knowin' that he has no hope of reacting correctly. In a way it helps us remember that he has vulnerabilities and isn't some sort of ubermensch gearing up to lead the robots in their take over of Earth. [3]Diagnosed with retinitis pigmentosa as a teenager, Pontz has been almost completely blind for years. Now, thanks to a high-tech procedure that involved the surgical implantation of a “bionic eye,” he’s regained enough of his eyesight to catch small glimpses of his wife, grandson and cat.The artificial implant in Pontz’s left eye is part of a system developed by Second Sight that includes a small video camera and transmitter housed in a pair of glasses. Images from the camera are converted into a series of electrical pulses that are transmitted wirelessly to an array of electrodes on the surface of the retina. The pulses stimulate the retina’s remaining healthy cells, causing them to relay the signal to the optic nerve. The visual information then moves to the brain, where it is translated into patterns of light that can be recognized and interpreted, allowing the patient to regain some visual function.In any case, Corporal Cy is one messed up freak, but he is a crazy good Marine. He's specialized in ways the rest of us couldn't compete with. He is special and a great asset to the squad. He's unique in the Corps and all his augments make him perfect for his role with the team... as the squad's field operator.LandIn a valley to the South of the recently created Camp Mēga a pack of autonomous robots maneuvers through the valley. They are delivering supplies to the recently activated forward operations base. The four robots run in line through the dry river beds and plains, navigating the rocky feet of mountain cliffs. These are the GammaDogs, the latest's version of transportation vehicles built by the robotics firm Boston Dynamics, a subsidiary of SoftBank. They make thousands of these runs delivering the gear and equipment across the thousands of miles of terrain in the scope of military operations. They deliver everything from gear and equipment to medical supplies and food for the local villages and even care packages from home. They also have specialized combat variants which support the front line patrols by carrying packs and heavy ordinance of the troops in the field. When on their own, each time they make the journey it is a new one, so that their patterns are never discovered by enemy insurgent forces.BigDog is funded by the Defense Advanced Research Projects Agency (DARPA) in the hopes that it will be able to serve as a robotic pack mule to accompany soldiers in terrain too rough for conventional vehicles. Instead of wheels or treads, BigDog uses four legs for movement, allowing it to move across surfaces that would defeat wheels. The legs contain a variety of sensors, including joint position and ground contact. BigDog also features a laser gyroscope and a stereo vision system.Built onto the actuators are sensors for joint position and force, and movement is ultimately controlled through an onboard computer which manages the sensors. Approximately 50 sensors are located on BigDog. These measure the attitude and acceleration of the body, motion and force of joint actuators as well as engine speed, temperature and hydraulic pressure inside the robot's internal engine. Low-level control, such as position and force of the joints, and high-level control such as velocity and altitude during locomotion, are both controlled through the onboard computer.On March 18, 2008, Boston Dynamics released video footage of a new generation of BigDog known as AlphaDog.[4] The footage shows BigDog's ability to walk on icy terrain and recover its balance when kicked from the side.[5] The refined equivalent has been designed by Boston Dynamics to exceed the BigDog in terms of capabilities and use to dismounted soldiers. In February 2012, with further DARPA support, the militarized Legged Squad Support System (LS3) variant of BigDog demonstrated its capabilities during a hike over tough terrain.Starting in the summer of 2012, DARPA planned to complete the overall development of the system and refine its key capabilities in 18 months, ensuring its worth to dismounted warfighters before it is rolled out to squads operating in theatre. BigDog must be able to demonstrate its ability to complete a 20 mi (32 km) trek within 24 hours without refuelling while carrying a load of 400 lb (180 kg), whereas a refinement of its vision sensors will also be conducted.From one of these cliffs a shepherd watches with amazement. These must have been the "mule cars" he had heard spoken of at the market the last time he visited the village. Now he could see them in his valley. He marveled how at times they reminded him of the bison stampeding as they maneuvered through the valley below. Only these bisons moved too perfectly. Every action was with intent and with purpose. In a perfect line they leaped, bound, climbed and ran faster than he could believe possible of a machine. The small train of robots continued without pause where there was no road nor trail, leaving only puffs of smoke where their feet impacted the dry earth. Wanting to show his friends and family the wonder he saw today, he pulled out the phone from his pocket to capture the moment. [4]IntelligenceAbove surveillance drones escort the train of GammaDog transport vehicles. They're armed with a battery of cameras and other detection equipment, able to see in 3D and infrared detection. Sonar systems allow them to make three dimensional maps of the area for battlefield planners. This latest model can fly in two modes, as a glider for endurance surveying or flapping its wings as a bird or, more precisely, as a bat. These bats measure just two feet in length. They are capable of surveillance silently from several hundred feet above the target to perching indiscriminately on the ledge of any building. It's powered through a solar membrane on its wings providing hours of additional flight time after the battery would have run dry. The COM-BATs are equipped with networking capabilities to share view points across multiple angles and a wide area. They communicate everything in real time to operators or higher level intelligence programs. Traveling in flights groups of four or more, they provide numerous layers of immediate information to troops in the field, war planners, and battlefield observers.Scientists at the University of Michigan College of Engineering are developing a six-inch robotic spy plane, modeled after a bat. Colloquially known as the COM-BAT program its purpose is gathering data such as sights, sounds, and smells in urban combat zones and transmitting the information back to combatants in real time. A $10 million grant was given for this project, which is being developed in the Center for Objective Microelectronics and Biomimetic Advanced Technology. The robotic bat is planned to perform short-term surveillance missions supporting advancing troops in the battlefield. It could perch at a street corner and send data regarding its immediate surroundings, or could land on a building for longer surveillance assignments. Real-time reports of its activity will constantly be sent to the commanding unit.The University of Michigan researchers are focusing on the microelectronics. They will develop sensors, communication tools, and batteries for the new “Bat” micro-aerial vehicle. Engineers envision tiny cameras for stereo vision, an array of mini microphones that could home in on sounds from different directions, and small detectors for nuclear radiation and poisonous gases. The robotic bat will also have the ability to navigate at night, using low-power miniaturized radar and a very sensitive navigation system. Its lithium battery will recharge using solar energy, wind, and vibrations, and the bat will communicate with the troops using radio signals.The robot’s body is designed to be about six inches long and to weigh about a quarter of a pound. Its expected energy consumption will be 1W. They will work to develop quantum dot solar cells that double the efficiency of current solar cells. Furthermore, they expect their autonomous navigation system, which would allow the robot to direct its own movements, to be 1,000 times smaller and more energy efficient than systems in use today. If the planned improvements will indeed be successful, the researchers believe they will provide the bat with a communication system ten times smaller, lighter and more energy efficient than currently available systems.Today, one of the tiny planes has spotted something through its on board infrared camera. There is a man on the ledge above the pass. One of the BATS leaves the group of escorts to investigate. With his cameras the plane circles above the unsuspecting man. The plane relays images to a remote operations intelligence server. The server's image recognition software sees that the target is a military aged male. He has with him an AK-47, though this is common in such a dangerous country. However now the man has pulled from his pocket a device the program recognizes from its database to be one of the old phones of a few decades ago. The system analyzes the angular projection and determines that this man could have attempting to capture images from the mule team down below. The event is flagged "Orange".The Orange rating triggers the server to initiate a series of queries to determine more information on the target. The GPS location was cross-referenced with the country's land listings and it was found that the land was leased to a family by their patriarch Solomon Selassie. Another query to the nation's record office of public health pulled a birth certificate and health care history information. That information indicated Solomon to be too old to be the man seen in the recording, however, Solomon had a son, Yared. Yared's age and medical information matched the apparent height and age of the target. Further investigation of his record showed school records with photos. Facial recognition with aging calculated a high probability that the target in question was indeed Yared Selassie. A search for information on Yared connected the search program to his account with the local phone company service provider. A data package had indeed just been sent from Yared's device to another device in Yared's network.Fortunately for Yared, he had no known background with the now displaced regime. He also had no criminal record and was not connected with any known agents of the regime in the last 10 years. His ID had not been one of those gathered during the initial cyber infiltration a few weeks ago so no logs of him existed yet in the military's watch list, which indicated that he had little contact with the rest of the world and with the regime at all. By all known accounts, the program results seemed to indicate that he was indeed a peaceful shepherd farmer living deep in the African savanna. The event would be logged as Yellow for cautionary and suspicious activity. He would have an identity file created under the database where his information would be easily accessible and the event would be called any time in the future if Yared may come into investigation. Any future suspicious actions by him would likely result in his apprehension.His GPS location was also flagged Yellow. In the event of future activity there, Yared would likely be a source of information if not also suspect. The Selassie home was also flagged White - for informational - along with the rest of the family and known contacts of Yared. If Yared were to ever become considered dangerous, they would be considered sources of potential information or potential accomplices and the house would be watched. Today, however, Yared was not in danger of arrest. Logs were created in all the relevant databases and a report was generated on Yared, the location and infraction in question. The report would be delivered to the Provisional Constable's email. The entire process up to this point had been automated and no human would have any knowledge of the event until the Constable read his email. It would be one of a few dozen he would receive that week. He would probably forward this one on to one of his deputies and in a few weeks the deputy would dispatch an officer with security detachment to investigate the Selassie house. They would discover the reason for taking the photo and if everything was determined to be all clear the family would be advised not to take any more photos of military equipment again. The family would be scanned with the Biometric Automated Toolset. Their photos, fingerprints, DNA and numerous other identifiers would be logged to their identifying files. After that the Selassie family's life would go back to normal, though a new mountain of information on them would be readily available for intelligence agencies and perhaps more dangerously, the new regime to come once the Americans left.As the report was generated and sent to the Constable, the BAT was directed to call off its surveillance of Yared and return to escorting the transports. Yared watched the train move out of the valley completely unaware of what had transpired. He returned his phone to his pocket, gathered his things and moved his small flock down the mountain back towards his home.Light InfantryCommand is nervous following an up-tic in civilian protests throughout the region. Numerous activist groups are coming out as they attempt of built something resembling a government to replace the shattered regime. Most are harmless and benevolent. Many want to bring about real change for the region and are anxiously seeking to take advantage of their first real chance at leadership roles in more than a decade. Others, however, push for more dangerous agendas. Remnant forces still vie for power, sometimes through democratic means and other times in the form of a new brewing insurgency. Many of the old leadership in the defunct regime escaped overseas and are now channeling money, and propaganda into the country. Enough of the old regime's officers saw the coming storm and saw to it that stockpiles of weapons and ammunition mysteriously disappeared prior to our arrival. Now, many of those weapons, along with thousands more are being smuggled in through the unregulated black market, and are finding their way to the quickly organizing insurgency forces.That's where we come in. We are Marines expeditionary rifle squad of the 31st Marine Expeditionary Unit, 2nd Battalion 5th Marines. We were stationed in the area to ensure that stability is maintained while a constitution is drafted. The squad's marching orders were to conduct an unmounted patrol through the city. Tensions are high since there is currently a massive rally taking place all along the parade route of the old Ministry of Defense's complex. The streets of the complex are crowded with tens of thousands of people. Marine platoons are on patrol in the event that this peaceful rally turns into something far worse. You'd probably have guessed that by now all military activity would have been replaced by all the drones flyin' around, but history has shown us that some jobs, just like these, you just can't trust a rumba to replace boots on the ground. Not that they haven't tried, but after the mess in 2022, they realized the only real future was one that married the drones with infantry into a holistic combat unit. So that explains why there are still morons like me trudging around in places like this.Marine Expeditionary Rifle SquadPurpose: Significantly increase future Marine Air Ground Task Force (MAGTF) ability to conduct squad level combat operations in an uncertain environment across the ROMO for the Joint Force. Improved ability to operate in both traditional and irregular warfare environments while retaining the ability to conduct forcible entry operations from the sea.Attributesgreater lethalityaccurate identification and classification of targetsunencumbered mobilitysecure, reliable, MAGTF- integrated command and controlballistic and fragmentation protectionclimate and terrain protectionability to administer low level medical aidimproved training and leadershipProvide greater improvement to the current rifle squad’s ability as a total package to engage the enemy across a wider range of operations with an increase in survivability and better access to support forces.- LtCol Chris Woodburn, USMCThe squad was composed of the ten of us, nine Marines and a doc in two fire teams and the Staff Sergeant.Our fire team leaders are Sergeant Nguyen and Corporal Piers. They each carry an M-35 Infantry Automatic Rifle attached with M-207 grenade launchers. For the 207, they carry an assortment of goodies they can launch depending on the mission requirements. For today, they are armed with tear gas, flares, and one grenade that can be fired above, through a window or into a dark alley, bursts open and out pops a tiny little drone cam to check out what overhead drones might miss. They also have regular explosive varieties and incendiaries, but today is just supposed to be a routine patrol. More important than their armaments, they're also equipped with networked Tee-Cud helmets. Tee-Cuds are the common name for the Tactical Command Heads Up Display integrated combat helmet systems. They are complete helmet systems with a ballistic visor that covers their entire face. Inside is a broad spectrum networking node that communicates information to and from the higher ups. This feeds into a heads up display that projects an augmented reality layer over everything they see. Team members, allies, non-combatants and enemies are highlighted with a colored filter to seek to avoid identity confusion in the heat of battle. They also have combat relevant data on each of the members of their team from ammunition count to a 3D geographic mapping projection complete with possible fields of fire. The Tee-Cuds run off of the Layar based MZ Scout Systems. Scout is an augmented reality browser and AI that coordinates all the networked visual data. The entire system is voice activated, sensitive enough to a whisper, so different commands will initiate different actions from Scout. Each Marine goes through a certification week where they have to speak a ton of random lines and sentences to create a unique voice ID and only the ID's on the team can operate the system. The team leaders can say "Squad" which will temporarily open a channel with their squad. "View..." can open any viewpoint from different squad members to overhead observation or strike drones, as well as other personnel within the area of operations. Saying, "Command" or the command's designation can open a direct channel with command headquarters for requests of information, backup or to send out a nine line request. The Tee-Cuds give the team leaders an unmatched view of the battlespace and their own team's condition warfighters of only a few decades prior would have died to get their hands on.Next, there are the SAW gunners. SAW stands for Squad Automatic Weapon, which used to be the name of an old weapon system the position used to use, but being that they even today they can somewhat reliably cut whatever they want to in half, the name stuck. That said, they are armed with M3, the largest non-crew served weapon in the Corps' history. The M3 is the automatic machine gun currently used for squad suppression fire. Depending on the situation, the M3 can fire a belt of high velocity rounds, or high mass yield rounds for heavy impact. In the semi-automatic setting it can fire a kinetic impact round that can punch through walls from six hundred yards. The gunners themselves would never be able to lift the damn thing, though, if it weren't for the exoskeleton assist. With the rigging the SAW gunners can carry a load of over 400 lbs for six hours and never break a sweat. SAW gunners, as well as the other members not equipped with Tee-Cuds, wear Scouters. Scouters are units that attach into the helmets over one ear and have a small ballistic visor that completely covers one eye. The Scouters operate on the same Layar based Scout system. It can project limited amounts of information in the same way as the Tee-Cuds on the ballistic lens, but with less detail and scope. It is also voice activated and the commands are all the same. The only difference between the leadership level Tee-Cuds and the scouters is that the scouters don't come with the full heads up display and can be worn separately without the helmet. [5]After the SAW gunners are the assistant light machine gunners. The A-gunners assist the the SAWs. They provide direct fire back-up and can provide emergency assistance to the SAW gunners' equipment in the field. They are armed with the M1300 CSASS, a compact semi-automatic sniper system rifle engineered for squad level sniper support. The weapon can deliver a variety of rounds to the enemy from sixteen hundred yards or deliver deadly fast accuracy with mid-range engagements.The newest members of the squads are designated riflemen. They are equipped with standard M-35 Infantry Automatic Rifles and extra ammo. They also carry the M-483 Light Infantry Missile System. It's a small pod you drop on the ground and arm. Once armed, the squad leader, or the operator, will designate a target and issue the command to fire. From there, the system will fire a self-guided missile about the size of two soda cans directly into the air before it directs itself to the target from above. Besides that, they are boots and if you're lucky they will only almost get you killed once a day. They're really good for getting ammo from the Heavy Dog and digging holes when you don't want to tire out the robots.Last are the field operators. In the mid to late 2020's infantry integration with drone warfare became paramount. As I mentioned before, militaries around the world realized that there are just too many things you can't do with a drone that require on the ground support to accomplish. Swarms of robot jets overhead and mini tank guns look cool in movies, but 90% of the time wars are fought by you actually walking up and asking a bystander if something jacked-up is going on that the good guys should know about. When the bean counters in Washington finally realized that a drone can't exactly prevent looting or arrest someone without having their onboard camera's kicked in by a six year old, they realized that next generation infantry integration was the way to go. With that came the field operators.Field-ops have constant command of drone escorts during patrols and missions. They are equipped with the same Tee-Cuds as the team leaders, but their systems are set up to direct the feeds of information from surveillance and attack drones overhead, paint targets as either hostile or non, coordinate battlefield intelligence with the squad and to also directly command drones in combat. They are equipped with sidearms for immediate emergency protection, but their main offensive weapons are their gloves. Hundreds of sensors in the gloves catch every subtle movement as a command to manipulate drone movement and observational capabilities. At any given moment, the Field-ops are overseeing dozens of nodes all around the battlefield. They are aware of hundreds of moving objects from people, vehicles and drones. They have as close to a complete holistic view of the battlefield as has ever been available to a frontline infantry unit. Working Field-ops is supposedly like nothing else. Even though they are right there with us, many describe their job as an out of body experience. The role used to go squad and fire team leaders, but the tsunami of data bombarding them left them unable to manage both the drones and their teams, so the tasks were delegated to the newly created unit. Their omnipotence is flushed down the toilet, though, when their focus is so deep on planes buzzing overhead that they completely lose track of where they are, trip, and fall flat on their face. Obstacle avoidance is their most requested new feature since they'll find themselves on the ground all the damn time. It's honestly a little embarrassing that they are the future of warfare. A field-ops' idea of a good day is hunkered on a rooftop or in the back of a vehicle controlling the battlefield without fear of tripping over a rock or something. They come off as clumsy and distracted, but when they get in their zone, they are the deadliest thing in the battlezone. They command the swarm and the respect of any enemy they might seek.Along with our doc, the last member of the squad is its leader, Staff Sergeant Ramirez. He's been to every major conflict in the last eleven years; Odessa, Yangong, Valencia. They say that back in the day a squad like ours would have been led by just a Sergeant or even a Corporal, but I guess with the modernization of the new Corps, this is what it takes. The Squad leader is armed identically to the Fire Team leaders. He carries the same M-35 with the 207 attachment and is equipped with the same Tee-Cuds as the others. Besides his experience, he doesn't differ greatly from the two team leaders. This was by design in case he should be incapacitated than one of them could be able to step into his role.This is the modern Marine Corps infantry unit. Two fire teams complete with leaders, SAW gunners, A-gunners and dedicated riflemen supplemented with corpsmen, Squad Leader and with the advent of the Field Operators, the eleven man Marine Expeditionary Rifle Squad was complete.We made our way down the street. Far off in the distance you could hear the sounds of the rally. Here though, all you could hear was Cpl. Fannon picking himself up off the ground again and the sound of the SAW gunner's hydraulic joints. Chatter over the inter squad channels reported the same quiet.We turned another corner into an alley. It was completely devoid of movement and deathly silent. As half the squad made their way into the alley, SSgt Ramirez turns the corner and calls for an all stop. The squad darts for cover along the alley. Fannon started a detailed scan of the area. From one view he noticed a small group of men on the next street. He could see inside a few windows and could see people shutting their windows. From one of his aerial units he noticed a window at the end of the alley with a suspicious pipe moving out of it. He flew the unit around the building to get a clearer view of the window. As his view became clearer he saw a man aiming his rifle on the squad."CONTACT FRONT! SECOND FLOOR!"Support"Contact". The term has been part of infantry training and battlefield tactics for a century. Now the word has evolved to much more. This single word initiates a mobilization of a vast movement of men and machines in a worldwide effort towards the acts of locating, closing with and eliminating the enemy through fire and maneuver.When Corporal "Cy" Fannon gave the call for Contact Front he initiated a command within MZ Scout System that forwarded the alert to seventeen other commands. These commands included Forward Operations North East Africa, the Coordinated Unmanned Asset Command, Marine Air Ground Task Force Central Command, and a myriad of other units. Alarm bells rang out and operators manning stations across the globe came online, now with all of their attention directed to a small alleyway in a small city and one particular squad of Marines. Monitors across the globe lit up with the view scopes of the Marine's Tee-Cuds. A voice came in through the NCO channel. It was a woman's voice.Corporal Piers was surprised. He was a newly promoted Corporal and unfamiliar with assaults from the NCO's point of view. He'd handled engagements before, but now the flood of information on his visor and responsibility to the Marines within his charge left him momentarily frozen. Her voice brought him back."This is the Operator. Standing by for SITREP."With her sudden call to awakening, his training kicked in. He knew of the operators and had experienced them in dozens of exercises when he was given his fire time, but he was still surprised by what he heard over his headset. Usually, everything in training is nothing like the real thing. Adrenaline and confusion are elements that are difficult to replicate in the training environments without Marines actually getting killed. Everything amps up, but this voice didn't. He knew it was their job to watch over the combat patrols and coordinate relief, reinforcements, or additional assets when need. She was calm and relaxed, like listening to the weather girl or the melodic tones of the host for some late night easy listen radio stream. She made it sound as if dropping in on Marines embraced in the heat of combat was something she did everyday. Perhaps she did. As Cpl Piers gathered himself in the midst of the chaos that was enveloping the Marines, she was calm, the collected voice of serenity reminding the Marines that they were not alone.Cpl Piers composed himself not a moment soon enough. What started as a single shooter foolish enough to get caught before the ambush, had in fact been a well orchestrated attack by more than a dozen insurgents. They had prepared the alleyway for what must have been some time in hopes of catching the Marines off guard. Such a defeat would be a massive symbolic victory for the insurgency, ushering in new recruits by the droves. As Piers and the others took up defendable locations in the alley, the scope of the danger became apparent to the Marines. Windows all along the narrow street were suddenly filled with men and metal. Bullets rained down like tears from heaven.Staff Sergeant Ramirez was already on the bounce. He knew something didn't feel right about this alley in the first place. The call for contact only confirmed what his instincts had prepared him for."Operator, this is Echo Six Romeo. Incoming SITREP..."... individual troops can look forward to the JTRS Handheld, Manpack and Small Form Fit AN/PRC-154 Rifleman radio. Developed by General Dynamics C4 Systems. Rifleman is designed to deliver networking connectivity to frontline troops in a lightweight, ruggedized, body worn device. The radio transmits voice and data simultaneously via SRW. Perhaps most importantly, Rifleman radios are capable of interfacing with smart phones.Cutting-edge wireless networking technologies, potentially capable of supporting both JTRS and smart phone devices, are now arriving in the form of mesh networks, including mobile ad hoc networks (MANETs) that can provide virtually instant high-bandwidth networking capabilities for handheld radios, ground and airborne vehicle communications and security and tactical wireless sensors. The military is increasingly turning to wireless mesh networks technology for sensor-driven environmental control, yard management, and security and tactical applications. A mesh network provides continuous asset visibility from any location in the system’s range, noted Mark Lieberman, automatic identification technology program manager for the Defense Logistics Agency, headquartered at Fort Belvoir, Va..John Edwards - Telecommunications Industry Analyst - Defense Systems[dot]comSSgt Ramirez listed relevant information in the hasty situation report. The operator, not flinching and with no obvious distress in her voice, replied back to the NCO channel,"Very well Echo Six Romeo. I've secured a roaming aerial interceptor squadron for your field operator. Echo Four Foxtrot, you should see the new units displayed on the Active Unit Window of your Tee-Cud. Do you see them?""Yes, Operator. I see them," Cpl. Fannon replied."Very well. They should be arriving in the next three minutes. Echo Six, I've opened a channel to higher command, designated "Snakepit". I've also opened a channel with the other patrol unit leaders in the city. CASEVAC has been alerted and are standing by. I'll be standing by for further assistance as needed.""Understood. Echo Six out."The squad was entrenched in the alleyway. Windows all along street slammed open to become places of cover for concealed insurgency forces, ducking away as quickly as they had appeared. They popped in and out to spray momentary bursts of fire on the Marines below, only to replaced by another in another window, and then another and another. The alley was unsecurable. The minimal cover and overhead deployment of enemy forces meant that the Marines would be chow in minutes if something wasn't done.Fannon was a bit occupied at the moment. He was the only one with a clear bird's eye view of the scene with aerial strike capabilities. His view, however, was obscured by the buildings. As he was trying to gain a clear sight on the window, a burst of rifle fire ricocheted next to his head. He ducked away in search of new cover. By the time he felt secure enough to focus on the drones, it had already moved on beyond view of the window. He would have to wait on the next one to make a pass. More rifle fire cracked as it struck the building next to him. The squad may lose its field operator if he didn't secure his most valuable asset: his life."Operator, I'm in heavy fire! I need to find cover and am requesting QRF assist!""Understood field op." She knew who had said it even though he hadn't said much by the indicator denoting which helmet made transition. "Patching in UAV Pilot Quick Reaction Force with special instructions to secure your immediate location."With a few adept keystrokes of the operator's hand, a red light lit in an installation in Colorado. A team of four pilots were already in their seats. They had been watching the feed and listening to the instructions. The operator opened a channel between them and the field op. As he scurried and dodged his way through the alley, he was relieved to see the individual units in his active asset window switch over from autonomous operation to full remote. One by one their icons switched from green to orange and faded to a translucent fuzz on the side of his display. He could now focus himself on finding a securable location for the time being. Fortunately for him, SSgt Ramirez was also aware of his desperation and had sent one of the squad's riflemen, LCpl Dodd, to secure him.As the two sought some mild semblance of safety, the drones above and all around came alive in a way not like before. Under normal operations, they circle around in simple methodically programmed patterns or hovering at points spherically encompassing the squad, waiting for the field op to call for them. Now, all of them were under the direct control of a team of remote pilots thousands of miles away.Interoperability Functional DescriptionThe ability of systems, units, or forces to provide services to and accept services from other systems, units, or forces and to make use of the services, units, or forces; and to use the services so exchanged to enable them to operate effectively together. An example for the use of this policy would be the condition achieved among communications-electronics systems or items of communications electronics equipment when information or services can be exchanged directly and satisfactorily between them and/or their users.Interoperability is integral to the continued success of missions using unmanned systems and represents a long-term objective of the Services and their stakeholders. The urgent needs in theater and corresponding rapid acquisition approach during recent years have resulted in thecurrent fleet of unmanned systems that generally do not interoperate with each other or with external systems. The combat development community is calling for interoperability as a critical element to the future unmanned systems fleet. The ability for manned and unmanned systems to share information will increase combat capability, enhance situational awareness, and improve flexibility of resources. Interoperability will improve the ability for unmanned systems to operate in synergy in the execution of assigned tasks. Properly stabilized, implemented, andmaintained, interoperability can serve as a force multiplier, improve warfighter capabilities, decrease integration timelines, simplify logistics, and reduce total ownership costs.Department of Defense - Unmanned Systems Integrated Roadmap FY2013-2038The individual birds started their maneuvers. They were each taking actions for the different specialties of each vehicle. Four target acquisition units were actively darting in and out of the building's windows seeking runaway insurgents, following them through hallways and as far as the trail would take them. When their scanners found something, other specialist operators were busy tagging each person as either friend or foe and adding an identifier so that the tracking system could keep watch as need be. Hunter strike craft pursued the insurgents relentlessly, able to dart in and out and descend from anywhere upon their targets. In the few seconds since the squad had taken fire, the alleyway had descended into a hornet's nest of firefighting from both man and machine.With the time bought by the swarm, Fannon and the other Marine were able to secure a location in the kitchen of one of the buildings along the alley. Fannon hunkered down in a back corner of the room. Dodd provided security for the two. He now posted himself along the window, regularly checking to make sure the two were safe while Cpl Fannon focused on the battle overhead.As he gained his bearing, Fannon began receiving instructions and information from the rest of the squad, along with communications from the other pilots. Now keyed back into the engagement at hand, he took control of the ships around him and began to coordinate his assets with the rest of the squad's counter offensive. He took back manual control of the remotely piloted unmanned assets as objective necessity dictated.One might wonder why Fannon would take back control at all. While the team back in CONUS was fully capable of carrying out the mission of taking down all enemies they saw with guns, explosive ordinance, and maneuver warfare, there was too much they could not know. They lacked the unit briefings on specific engagements for this particular region, since their area of operations was the entire planet as need be. They lacked a thorough understanding of the area, population centers, business centers and key hotspots and places to avoid fire. Mostly, they lacked clear communication with the entire squad. Fannon, more correctly, the Field Operator, did. What might be perceived as a design flaw was actually a well engineered aspect of the overall future of infantry warfare.They used to just have an open channel to everyone involved in the battles. The idea of a flat system of communication seemed a Utopian ideal. Any boots on the ground could speak directly with the people they needed to to get whatever assistance they would need. Anyone who might be able to help could just chime in if they thought they could be of service. On paper it is miraculous. So long as you were a part of the picture in the slightest your voice was overhead on the channel. Every command, every request, every observation, every opinion, every scream; everyone was talking and not enough were listening. It got to be a real nightmare scenario. Everyone from the General on down would be barking out conflicting orders to the troops on the ground. Debates out rules of engagement would clutter up the messages needing to be sent as terrified Marines lay frozen in forced inaction. Pilots for bombing runs and pilots for casualty evacuation were all speaking and yelling at the same time. Even engineering unit commanders would be giving his two cents on what to be be careful of so as not to blow up their precious fiber optic line more than two miles away. There might be as many as a hundred people squawking at once. And do you know who wasn't listened to at all? Why, it was that Lance Corporal Schmuckatelli on the ground, getting cut to pieces by machine gun fire in the jungle, the very Marine who started the conversation. It was a cluster.So they turned to the NCO's. The Non Commissioned Officers of the infantry squad were elevated to new levels of responsibility. Besides leading the fight, these warriors were now also the information hubs, directed to guide battlefield data and unit instructions from higher to the field troops assigned to them. At any given movement these troops may be relaying information from several different scopes and fields of view. They are now the levies holding back a paralyzing flood of information. The training necessary for their vocation puts them on par with any master level technician or specialty artisan in the world, not the least of which being the field operators. They are all career military and with their training, each holding the civilian equivalent to degrees in various fields from electrical engineering, telecommunications or logistics, they might be living easily overseeing some automated package delivery service, driverless taxi or even building the next gen automated warfare. At home they would have the life, but they chose something different. By being the channel through which all sources of information are funneled, their focused implementation of command and information allow them to direct the application of force on battlefield as if it were the strings of a marionette.Want more future of war? This answer has grown a full length novel mixing the same focus on technology and tactics while providing a character driven narrative I'm sure you will all enjoy. If you would like to check out my book inspired by this answer, The Next Warrior follow the blog The Next Warrior and follow this link to the start of the book.The Next Warrior by Jon DavisAirMeet the SR-72This Stealthy, Hypersonic Drone Could Become The Most Exotic Plane EverCyberspaceUnited States Cyber CommandStuxnetSpaceKinetic bombardmentRods From God - New York TimesU.S. Air Force Transformation Flight Plan, United States Air Force, November 2003 - http://www.au.af.mil/au/awc/awcgate/af/af_trans_flightplan_nov03.pdfSeaLittoral combat shipIndependence-class littoral combat shipMedicineNew Prosthetics Keep Amputee Soldiers on Active Duty - US NewsProsthetics in the VA: Past, Present, and FutureThe future of artificial limbsMichigan Man Among 1st In US To Get ‘Bionic Eye’ - CBS DetroitLandBigDogBigDog - The Most Advanced Rough-Terrain Robot on EarthIntelligenceBat-Inspired Spy Plane - The Future Of Things | Science and Technology of TomorrowLight InfantryHeadquarters Marine Corps - Combat Development and Integration: Marine Expeditionary Rifle SquadSupportA look at the future of mobile military communications on the battlefield -- Defense SystemsUnmanned Systems Integrated Roadmap FY2013-2038 - Page on defense.gov[1] - Kinetic Bombardment is currently still relegated to science fiction rather than actually being planned out for the future of warfare, though it was referrenced as a possible avenue in the U.S. Air Force Transformation Flight Plan , November 2003 linked above. The idea comes with massive logistical and engineering problems that are beyond our current reach. Most importantly is that the delivery of massive tungsten rods into space would be an impossibly costly endeavor and likely be more costly than any possible advantages gained from the practice. Given the recent advancements in the private space industry, however, the idea of space born military instruments like this becomes more a possibility every day.Also, I am still unclear if such a reaction would throw out nuclear fallout. Since there is no nuclear reaction taking place I don't see it happening. Of course I have also read that fallout comes from the churning of already radioactive material below the earth's surface which I really don't get. Either way, I'm not a physicist so if you physicists who have just been yearning to teach me a lesson, please clear that up in the comments. The fate of a fictitious village rests on your shoulders.[2] - The littoral combat ships are not actually the future of warfare. They are happening right now. The US Navy already has a fleet of these ships in deployment. My story involved an slightly exaggerated ship that is an update of the current version. The reason I didn't change the story to focus on some future super sub or next generation aircraft carrier is because of how speculative their future roles will be. What is certain is the role LCS's will play in the next several decades as an important element in ensuring peace along the world's coastal regions. That's why I wanted to focus on them, because no matter what happens, these are going to be a part of the Navy's future.[3] - OK. The eyeball thing is pretty weird. Truth be told, I borrowed the idea from Orson Scott Card's sequel to Ender's Game, Speaker for the Dead. All this to say the character who had one was freaky too. As far as Corporal Fannon's eye, I really don't even know if it will be close to possible to fit all those technologies into such a small platform whether in the next twenty years or ever. Every day tech is improving and bionic eyes are a reality even today, but heat vision, night vision and twenty times zoom, let alone the ability to record. Well I probably stretched my creative license on that one. Maybe making a Marine into a modern day Predator was asking too much, but don't even pretend that you don't want Cpl. Cy's cyborg eye.[4] - A lot of people may be curious why I chose to write a story surrounding a glorified pack mule, but in reality, I think this machine has a much more important role than any future weapon that we might be talking about today. More important than a new self guided rounds or a gun that shoots around corners is the logistical mastery of the field. Armies march on their stomach as it is said and the ability to deliver gear and supplies cheaply and safely will be a massive advantage from modern delivery systems. Add to this that the VA paid out about $57 billion on disability benefits last year and the most common injuries from veterans today are related to stress injuries of heavy, burdensome equipment. Given this information, it makes a lot of sense for the military to utilize a robot as a form of loss prevention on the bodies of future vets its going to provide medical care for otherwise. Finally, the ability of an autonomous system to maneuver through random routes, never taking the same one twice, illuminates the most deadly foe of the War on Terror, roadside bombs known as IED's. By avoiding the major arteries that roads are, logistical support can be delivered without the expense of air drop or helicopters. It provides an unimaginable scaling opportunity for the US military on many different fronts, providing the technology works as we all hope it does.[5] - Yeah, the Scouters are from Dragon Ball Z. That's over 9000! Thank you Google Glass for fulfilling my childhood fantasies that didn't include Bulma.[6] - Those of you who are sharp will have noticed another Easter Egg in this story. More than half the technologies mentioned are built of products and companies currently owned by Google.Liked this? You might also like my YouTube Channel. You can also connect with The War Elephant on Facebook. If you want to help me make more content like this, please visit my Patreon Page to find out more.

Why doesn't Linux have an executable (ELF or other) installer like Windows has the EXE installer?

I was not originally going to write an answer here, but after reading few other answers I found out that a lot of what has been said here strongly disagrees with what I understand. Thus I decided to join the discussion, with my own two cents.First, regarding the question asked, Linux does have executable installers. They are not (from my experience anyways) as popular as packages (.deb, .rpm), but they are out there. Quite often they follow a convention that such file extension is .run, but this is just a visual market for the end-user, not anything formal. Just that they do not seem very popular, and I will writ e more about this later.Next topic: “like Windows has the EXE installer” - this is perhaps just a phrasing problem, but EXE is not a sensu stricto installer per se. It is a generic format of an executable file, not necessarily an installer. Can well enough be just a simple executable, or a portable application. Early on there was a format called COM (*.com) on MS-DOS and MS Windows, which was quite popular, then EXE (*.exe) became more popular, but only the MSI format (*.msi) to me counts as an installer format. Because it was made especially with installation problem in mind, and addresses the situation where you want to install a program that lays on a network share. If you have, say, a setup.exe file on a remote machine, you browse to it’s directory via samba protocol (shared folder) and double click on it, it will not work. You will have to first copy the file to your local location (download the file) then run it. Differently with .msi file, if you see setup.msi, you can go ahead and install it directly from the network share. Should the question be phrased differently, asking why (or whether or not) Linux does not have an equivalent of Windows .MSI installer standard, then it would be very interesting and valid question, I wonder myself now, will have to study into it.Ok, now, I wand to argue with some other answers here, and later on add some insight from myself.Travis Casey’s answer (which I read first) has (at the time of writing) 30 upvotes and contains claims that I disagree with, so let me address this now:“In large part because executable installers are a bad idea in general” - this is subjective, I disagree with this statement, but Travis goes ahead and arguments this further so I will just argue with his arguments;“The installer program needs to be able to write to privileged locations, which means it needs to run as a privileged user. Executable installers therefore create a security problem: you’re running unknown code with privilege” - absolutely disagree. It is explicitly a design decision whether or not installer requires access to protected area of the OS. In fact in the past I remember a prominent example when I downloaded firefox installer onto a computer in a public library, on which I was working as a user without privilege to act as admin, and on which I was not allowed to write to Program Files folder or anywhere outside of my userspace (within my home folder). Firefox would install itself completely into my userspace, without any special permissions, and not as a portable application either, but full install, with shortcuts in the menu start, quick launch, file associations, etc.This is because Windows just as well as Linux allows to carry out full installation of a software entirely into the user’s home folder. In the user home folder there are special (often hidden) folders who mimic locations such as Program Files for example. On many installers there is a dialog box asking whether you are going to install the program for all the users on the computer or just you (the current user). Many people don’t really quite grasp the difference, but generally speaking “just you” is the installation entirely into your own home folder, thus this argument is false for both Windows and Linux“With an executable installer, there’s no simple way to check inside the installer to see what it’s actually going to do. You have to trust that the documentation is correct, and/or that whatever information the installer itself gives as it installs is correct.“ - two things I want to point out here. One: what is “installer”. In some cases you can if fact easily check what is happening inside. Again, this is a design decision, not a dogma. Two: as opposed to what other alternative? Would you argue that it is different with packaging formats on Linux such as .deb or .rpm? If so, then I want to say that it is not granted either. For starters, there is no easy way either, with these packages. Sure, once you know that these are compressed archives containing formalized folder structures with installation scripts within, to reverse engineer or just investigate it, is not simple at all. But I agree that may be order of magnitude easier than reverse engineering/investigating a binary .exe file. But the problem is not that EXE isn’t a compressed archive, often times files such as setup.exe contain compressed (or uncompressed) resources which you can extract with resource editors. The reason is that on Linux often script language is used inside the packages, while on Windows generally you will see compiled binary logic. But even this is not guaranteed on Linux that if you extract .deb or .rpm that inside you will find scripts. These portions may as well be binary executable files. They do not have to, nor do they also are (these so called installation scripts or triggers) plain bash scripts. Often it is a bit of both, plain text scripts (but not necessarily bash) and binary files. Again, it all has to do with a design decisions, not with general concept of installers as Travis suggests.“Without a centralized database that all the installers use (which is much easier to keep by using a single installer program and having the package files just keep the data), you have problems such as the installer overwriting libraries used by other programs with a different version, or removing a library when run to uninstall itself that is used by other programs.“ - no no no no, I can’t agree with this. This is touching a fashion in which programmers design and deploy their software on Linux, which again, is pure design decision, not a formal characteristic of either an “installer” nor an operating system. Also, the installer is not exclusive with a centralized database. Installer in form of an .exe or .msi file can also incorporate a central database for solving dependency problems. So no, all the arguments that Travis presented to protect his stance, I reject all of them. And I will also cover the dependency solving aspect later on.Travis also mentioned “DLL Hell”, and described problems like one installer overriding or deleting (upon removing application) DLL that something else depends on. Really, this is all nothing to do with a definition of an installer. It is purely the application’s developer design choice whether or not they install DLLs into, say c:/windows/ under common/original name (when such events as he described could happen), or in their own application-specific folder, or under an alternative application-specific name (in which case nothing mentioned will happen). Same is true with .so libraries on Linux.What Travis mention could partially relate to runtime environments, such as C++ Redistributables, .NET, etc., but that is not the same as “DLL hell” on WIndows or dependency hell on Linux. Linux also has runtime libraries, like Mono, which is .NET equivalent, and many others.Lee Hodson in his answer wrote that “Linux has installable packages similar to Windows .exe files. These include .deb, .rpm, snaps and executable installer scripts.”. I think I know what Lee wanted to say, but again, with all that I wrote above, the .exe files are not “similar” to Linux software packages. I would say, they belong to entirely different levels of abstractions. EXE is format for binary files, and DEB or RPM are bundles that internally contain binary files as well as other parts. So, in other words, it would be possible to implement RPM/DEB equivalents on Windows as well, and they would be on a higher level of abstraction than EXE files are. For reference please check wpkg - Wikipedia: “wpkg was created as a clone of dpkg that would run under the Microsoft Windows operating system.”. A bare .deb or .rpm file, is not an equivalent to Windows .exe file. Rather the later is equivalent to Linux ELF file. And the former, perhaps (I’m not 100% sure, but I think it may be approximately correct) just like Kevin Thorpe suggested in his answer, is equivalent to Windows MSI files. Just that he said “direct equivalent” in which case I don’t fully agree with him, because .deb or .rpm by themselves do depend on tools like dpkg or other package managers. MSI files are self-contained executables, rather than self-contained archives.Similarly, i see lot of confusion across other answers as well. But more or less I have already addressed what I wanted to in regards to where I disagree with other answers here.Now, I’d like to take a freedom to add something from my own. I want to share my views on Linux software packaging and distribution systems, and software distribution/deployment fashion on Linux in general.First of all, I am Ubuntu user and am most familiar with dpkg and .deb packages. Much less with RPM on Red Hat based systems. I will continue with reffering to dpkg/deb, but I know that this will mostly be representative to the Red Hat’s RPM as well.Linux does not hard limit you in how you can/must package your software for deployment. Mostly, some conventions took off, and people followed them, but it was not a matter of OS-level design or limitation. I personally detest the way Linux software commonly excretes files all over the filesystem. All of these rules: this will land in /usr/ that in /usr/lib, that in /var/lib, that in /opt, that in /etc/, this in /usr/share/…, why? With the advent of gnome and desktop environments, all this is really not necessary. Not to say that I would not follow some of these conventions myself, if I can justify it, but just out of a following of a cult - no. I remember when I was just starting making software for Linux, I would spend time reading and trying to “learn” where I should put what when I deploy my software. Now, from a retrospective, it was such a waste of time. These “rules” are not even clearly defined. If you really want to start, you think that you must follow these conventions, and you worry how much time you will have to spend before you understand the “proper” way. If I could give one advice to my younger self from the future, I would say: don’t worry, put everything in one folder of your application like you would on Windows. Put that folder either in /opt/, or in ~/ or ~/.local/, just put it all in one place. Then use LD_LIBRARY_PATH variable when needed, or just use dynamic linking over static linking, where you have 100% freedom with the library paths. Then learn Gnome special folders for both the home directory scenario, and outside of home directory scenarios. They mostly have equivalent in both portions of the filesystem. And that’s it!Back to topic. There is no OS-level limitation that would prevent you from deploying software on Linux in a fashion much more like on Windows: with all of the files that are dependencies to your software neatly organized within a single directory of your application. Linux certainly allows you to do that. And all of that, by the way, can perfectly fit within your home folder. It is all about a choice and following a general trend, that is not perfect.Some will defend against my critique above with an argument that Linux software makes strong use of shared libraries, and they are being strongly reused by other software, thus they belong to those “standard” locations like /usr/lib etc. To them I say two things:it doesn’t help anyways, because even though libraries are shared between applications, the applications depend on specific versions, and eventually you will end up in a situation when you need to ship a specific version of a shared library with your software in order for it to work properly, which (the version) is not what your other applications will expect. So the dpkg/deb model does not solve this problem in a clean manner anywaysall the fresh models being proposed as an alternative to dpkg/deb are doing exactly the opposite: flatpaks, snaps, clicks, and others, they all promote self-contained applications compete with all the dependencies bundled with the application itself, and independent from what is present or default on your OS. And increased storage requirement due to possible redundancy and the overhead of the container-based packaging standard, are all acceptable and still preferred to the dpkg/deb approach. Because currently the storage is cheap and available, and the dependency problem is hell on Linux.The only argument which I do find valid, in the defense of the standard locations for system-wide shared libraries (as opposed to bundling dependencies with your application even if it means redundancy) is licensing. Linux both takes advantage of and suffers from very limiting licensing standards like GPL (especially). It means, that while you are free to use plethora of fantastic libraries in your software, the deployment becomes all the more problematic. What can you and what you cannot to ship bundled with your software, when, how, this is a real headache. DPKG/DEB solves this because de facto you don’t ship dependencies within your bundle. You barely mention them as dependencies, and DPKG “solves” them by fetching what you need for you. But I am sure that if only you could, without a hint of confusion, include all of the dependencies with your application, ship without a hint of worry that you may be violating some licensing aspects, and give your en-user one clean, self contained entity that fits in one file/folder and includes everything within itself - you would gladly do so. Hey, isn’t this what all these flatpacsk/clicks/snaps do?And the most terrible crime that dpkg/deb committed is this: by design, it is a built-in limitation, that you cannot distribute software as .deb package in a way, that on a non-altered debian Linux system, a non-root user can install it wothout sudo. Not only that, but .deb is handicapped in the way that you cannot, even after elevating your permissions to root level, install software into the user’s home directory. Sure, in some hackinsh way, probably, but the dpkg does not offer any format to allow that. Once you execute “sudo dpkg -i ….deb” the dpkg no longer knows who you were before sudo. That information is not passed in the command line. So even if you have a super smart script/binary inside your deb, how will you know to whose home directory (which user) to make the userspace local installation to? This IMHO is the only unforgivable crime of the DPKG, and software makers just follow it. DEB packages by design prevent you from taking advantage of a feature that OS provides built-in: that installing software without sudo and entirely into your home directory is supported. I am not against ability of dpkg to install software as root, but against its inability to install software not as root.So now we see news about many new container-based packaging formats that solve precisely the problems I find with DPKG/DEB: containing all the dependencies within, even despite redundancy, allowing to install without sudo, and into the home directory. But the truth is, that there is nothing innovative or creative or new about the final outcome. The creative and innovative is how these new packaging formats work around the traditional way: with all of the overhead of containers, confinement, and integration layer to undo some of that confinement to the point where file exchange, system theming and other things that containers cut you off of, can be made available again. It is all great, and cool, but at the end of the day, even without all of that, you can in fact just make a non-root, non-sudo needing installer on Linux, that will install your application fully, with all the shortcuts and file associations, and blows and whistles, entirely into your home directory, and with all of your dependencies neatly contained within your application’s own folder. So why we don’t see many developers doing it this way? Well, someone came up with a way, and everyone followed, like sheep. That is the only reason why. I give my most sincere kudos to Telegram desktop app, or Shotcut video editor (the executable non-snap version) installers. If majority of software on Linux was done their way, it would truly be a better world. And for all I care, setup.exe type of user experience is one that is absolutely possible to have natively on Linux as well. It is all a design decision, and I have personally made native Linux programs with installers with exact the type of UX that you most commonly see on Windows.Final thought: your software should be capable of solving dependency problems also post-installation. It is perfectly possible for you during run-time to test against dependencies, to present suitable GUI dialogs to your user if any dependencies are unmet, and to provide a GUI for solving these dependency problems after the application has already been installed. So next time, remember, if you are a developer, that you may as well extract your own application somewhere under ~/.local/YourAppName and maybe just make few shortcuts here and there, like a launcher in ~/.local/share/applications/YourAppName.desktop, add some triggers to ~/.profile or ~/.bashrc or some similar place, and your user can have Windows-like experience, and without sudo.Cheers!

Comments from Our Customers

I would like it if you could have a price per document option. I very rarely need this app but when I do, it is very nice to have. I can't justify a monthly subscription but would pay $3 to $5/document. to use this app.

Justin Miller