This post tests various embed blocks:
Tag Archives: China
Block category: Widgets
The shortcode widget:
The Archive Widget:
- November 2024 (8)
- October 2024 (18)
- September 2024 (19)
- July 2024 (20)
- June 2024 (21)
- April 2024 (37)
- February 2024 (24)
- January 2024 (23)
- December 2023 (1)
- November 2023 (17)
- October 2023 (20)
- August 2023 (23)
- July 2023 (1)
- June 2023 (23)
- May 2023 (20)
- April 2023 (23)
- March 2023 (31)
- February 2023 (26)
- January 2023 (38)
- November 2022 (25)
- October 2022 (21)
- September 2022 (21)
- August 2022 (23)
- July 2022 (24)
- June 2022 (22)
- May 2022 (25)
- April 2022 (24)
- March 2022 (25)
- February 2022 (22)
- January 2022 (25)
- October 2021 (1)
- May 2021 (3)
- April 2021 (3)
- March 2021 (2)
- January 2021 (1)
- November 2020 (1)
- October 2020 (2)
- September 2020 (1)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (1)
- March 2020 (2)
- December 2019 (1)
- August 2019 (1)
- November 2018 (11)
- October 2018 (1)
- May 2017 (3)
- May 2016 (1)
- May 2015 (1)
- May 2014 (1)
- January 2013 (7)
- May 2012 (2)
- March 2012 (5)
- January 2012 (6)
- May 2011 (2)
- March 2011 (1)
- October 2010 (1)
- September 2010 (2)
- August 2010 (3)
- July 2010 (1)
- June 2010 (2)
- May 2010 (2)
- April 2010 (1)
- March 2010 (1)
- February 2010 (1)
- January 2010 (1)
- October 2009 (1)
- September 2009 (1)
- August 2009 (1)
- July 2009 (1)
- June 2009 (1)
- May 2009 (3)
- May 2007 (2)
- August 2005 (1)
- May 2005 (1)
- May 2004 (1)
- May 1998 (1)
- August 1996 (1)
The same Archive widget but as a dropdown:
M | T | W | T | F | S | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | ||||
4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 | 16 | 17 |
18 | 19 | 20 | 21 | 22 | 23 | 24 |
25 | 26 | 27 | 28 | 29 | 30 |
The Category widget block has an additional option for showing category hierarchies:
The Latest Comments widget can display or hide the avatars, the date, and the comment excerpt:
… [Trackback] […] Read More Infos here: fmso.tradoc.army.mil/2024/rising-violence-prompts-ecuador-to-declare-internal-armed-conflict/ […]
Here is an example of the Comments widget with all the options disabled. The number of comments has been reduced to two.
And here is the Latest Posts widget in the list view, with dates:
- Iranian Military Equipment Integrating Artificial Intelligence
- China and Russia Expand Agreement for Arctic Strategic Resource Development
- Russian Security Forces Face Rise of Domestic Terrorism Threats
- Russia Creating New Officer Academies to Support Armed Forces Expansion
- China Introduces New Unmanned Systems in Combat Exercises
Grid view, now sorted from A -Z.
- (no title)
- “A Russian Military Framework for Understanding Influence in the Competition Period” by Tom Wilhelm (2020-10-05)
- “A Survey of Russia Security Topics for 2020 and Just Beyond” by BG (Ret.) Peter B. Zwack (2020-10-15)
- “Chronic Instability” Atop Algerian Military’s Foreign Intelligence and Security Directorate
- “Compendium of Central Asian Military and Security Activity v8” by Matthew Stein (2021-01-20)
You can also change the number of columns used to display the latest posts. The block below only displays posts from the Block category:
Search widget:
Tag Cloud widget:
Africa AFRICOM Al-Qaeda Algeria Arctic Armenia Asia Azerbaijan Burkina Faso CENTCOM China Colombia Drones EUCOM Gaza Global Operational Environment India INDOPACOM Iran IRGC Islamic Revolutionary Guard Corps Islamic State Israel Kremlin Latin America Mali Maximus Middle East NATO Niger Pakistan People’s Liberation Army PLA Rhoncus Russia Saudi Arabia Syria Taiwan Terrorism and Transnational Crime Turkey UAV UAVs Ukraine Venezuela Wagner Group
RSS Feed widget:
Block category: Layout Elements
The Layout Elements category includes the following blocks: Group, Button, Columns, Media & Text, separator, spacer, read more, and page break.
This group block has a light green background color.
The read more block should be right below this text, but only on list pages of themes that show the full content. It won’t show on the single page or on themes showing excerpts.
Block category: Formatting
The formatting category includes the following blocks:
The code block starts with
<!-- wp:code -->
<?php echo 'Hello World'; ?>
The classic block can have almost anything in it.
a heading
The preformatted block.
The Road Not Taken
Robert Frost
Two roads diverged in a yellow wood,
And sorry I could not travel both (\_/)
And be one traveler, long I stood (='.'=)
And looked down one as far as I could (")_(")
To where it bent in the undergrowth;
Then took the other, as just as fair,
And having perhaps the better claim, |\_/|
Because it was grassy and wanted wear; / @ @ \
Though as for that the passing there ( > º < )
Had worn them really about the same, `>>x<<´
/ O \
And both that morning equally lay
In leaves no step had trodden black.
Oh, I kept the first for another day!
Yet knowing how way leads on to way,
I doubted if I should ever come back.
I shall be telling this with a sigh
Somewhere ages and ages hence:
Two roads diverged in a wood, and I—
I took the one less traveled by,
And that has made all the difference.
and here's a line of some really, really, really, really long text, just to see how it is handled and to find out how it overflows;
The table block | This is the default style. |
The cell next to this is empty. | |
Cell #5 | Cell #6 |
This is the striped style. | This row should have a background color. |
The cell next to this is empty. | |
This table has fixed width table cells. | |
Make sure that the text wraps correctly. |
The Verse block
A block for haiku?
Why not?
Blocks for all the things!
China’s Military Strategy: Basic Conceptsand Examples of its Use (Timothy L. Thomas)
(Click image to download book.)
Chinese retired Lieutenant General Li Jijun noted in 2006 that, from the vantage point of the People’s Liberation Army (PLA), “Therefore, in war direction, understanding the adversary’s ideological culture and strategic thinking method is as important as finding out the adversary’s military deployment.” This book seeks to address the concept of China’s military strategy in order to help US analysts better understand PLA motives and intent. While the People’s Republic of China (PRC) is not an enemy, it has developed into a powerful competitor worthy of closer examination. If we (the US) are to follow the advice of PLA analysts, and do what they are doing, then we should be using peacetime to contemplate how their strategic thought is developed and implemented. Keeping a finger on the pulse of the PLA’s thought process as it proceeds with confidence (and some degree of arrogance) into the second decade of the 21st century will allow the US to assess the probable direction (or uncover purposeful misdirection) inherent in PLA strategy. Accordingly, any required adjustments to US military strategy can be formulated. The analysis merely suggests a way of considering or thinking about PLA strategy and not necessarily the way. The discussion and conclusions are almost solely based on the use of translated Chinese documents and, as such, attempt to offer a purely Chinese perspective on the content, goals, and implementation of strategy.
Three Faces of the Cyber Dragon: Cyber Peace Activist, Spook, Attacker (Timothy L. Thomas)
(Click image to download book.)
China’s cyber policy has become partly visible to foreign nations through observation, tracking, and inference. The policy appears to have three vectors. The first vector is in the public opinion or “soft power” arena, where China professes to be led by a policy of active defense and cooperation with other nations over cyber issues. The second and most prominent vector is China’s exhibited capability to conduct strong and stealthy intelligence and reconnaissance activities against nation’s worldwide, using the guise of anonymity to hide these efforts. The third vector is the offensive character of China’s cyber strategy. It contains the theoretical backing for preemptive cyber operations against other nations in times of crisis. These three aspects—peace activist, espionage activist, and attack planner—dominate China’s cyber policy. Some are always hidden from view while others are demonstrated daily. Three Faces of the Cyber Dragon is divided into sections that coincide with these vectors.
Passing It On: Fighting the Pushtun on Afghanistan’s Frontiers (General Sir Andrew Skeen. Les Grau and Robert Baer)
(Click image to download book.)
This is a reproduction of a 1932 book published by General Skeen, who began fighting the Pushtun in 1897. His military career took him to fighting Boxers in China, the “Mad Mullah” in Somaliland and Germans on the Western Front of World War I. He always returned to British India where fighting the fractious Pushtun continued to be a problem. He was a brigade commander during the Third-Anglo-Afghan War, commanded the Kohat-Kurran field force and fought in the Waziristan campaign. He commanded the Northwest Frontier District and in 1924-1928, served as the Chief of Staff of the Indian Army. He knew the Pushtun and frontier fighting better than almost any other British officer. He wrote this book as a guide for company-grade officers fighting the Pushtun. Les Grau had read General Skeen’s book during the Soviet-Afghan War and, after the United States invaded Afghanistan, decided that this would be a welcome addition to the field libraries of allied commanders who were fighting the Taliban-who are ethnic Pashtun. Les and Bob Baer added copious footnotes to General Skeen’s work to explain the “Britishisms” and terms and concepts. They also wrote an introduction to explain the history, context, geography and application of Skeen’s classic work.
The Dragon’s Quantum Leap: Transforming from a Mechanized to an Informatized Force (Timothy L. Thomas)
(Click image to download book.)
Chinese observations of warfare in the information age have resulted in a widespread transformation and metamorphosis of the People’s Liberation Army (PLA) from a mechanized to an informatized force. This transformation has affected nearly every aspect of China’s military from strategy to logistics to educational development.The Dragon’s Quantum Leap intends to peel back the transformation process and uncover the impact of new modes of thought on several key segments of military development (culture, stratagems, crisis management, deception, and reconnaissance among other elements) that digital-age thought is affecting. It expands the scope but not the basic theoretical theme of the author’s two previous works on Chinese information warfare concepts. They were Dragon Bytes, which covered Chinese IW activities from 1999-2003; and Decoding the Virtual Dragon, which covered Chinese IW activities from 2003-2006. The Dragon’s Quantum Leap updates these concepts and activities to mid-2009 and completes the author’s trilogy on the topic. As with the author’s previous works, this book primarily uses original Chinese source material.
Decoding the Virtual Dragon: Critical Evolutions in the Science and Philosophy of China’s Information Operations and Military Strategy (Timothy L. Thomas)
(Click image to download book.)
This book expands upon Dragon Bytes, the author’s earlier work on Chinese information warfare (IW) activities from 1999-2003. Decoding the Virtual Dragon explains how Chinese IW concepts since 2003 fit into the strategic outlook, practices, and activities of the People’s Liberation Army (PLA). The book offers IW explanations directly from the pens of Chinese experts. There are few intermediate filters. In some cases direct translations of key Chinese terms are offered. The Chinese authors discuss the application or relation of IW to strategic thought, the transformation plans of the People’s Liberation Army (PLA), the revolution in military affairs (RMA), and the revolution in knowledge warfare and cognition. The book thus serves as a source for the fundamentals of Chinese military thought and demonstrates how IW/IO has been integrated into the art of war and strategy.
The New Great Game: Chinese Views on Central Asia (Charles Hawkins and Robert Love)
(Click image to download book.)
In August 2005, ten top Chinese scholars traveled to the U.S. Naval Postgraduate School (NPS) to share their ideas with American participants during a symposium that was hosted by the U.S. Army’s Foreign Military Studies Office. These scholars brought with them their in-depth research and analysis on a host of topics that impact Central Asia, including energy security, border disputes, and the “three evils” (terrorism, separatism, and extremism), which have been a key objective in combatting by the Shanghai Cooperation Organization (SCO). They also addressed the role other countries, such as China, Russia, India, and Pakistan, have played in the region. The book is a compilation of the papers that made up the presentation from the visiting scholars. It includes a chapter written by Brigadier General (retired) Feroz Khan from the Pakistan Army, a keynote speaker during the symposium. It is broken down into three parts. The first part offers a framework of understanding of China’s Central Asia policy and relations. Part two covers specific issues and concerns. Part three covers the way ahead. The authors’ unique foreign perspectives on the issues that have drawn concern over Central Asia, give readers a more insightful and diverse view on the region.