Transition from industrial to network age means Army IT isn't just about doing C2 better, it's about enabling internal small world networks and emergence.
This document discusses building open source software in the Department of Defense and encourages contractors to adopt more open source practices. It outlines three ways that government-funded source code could be made openly available, including having the government assert rights and share the code. Contractors are encouraged to release their copyrights to open source communities to delight customers, do more with less, and hire great developers. Examples are given of projects that benefited from becoming more open source. The document raises questions about whether adopting open source means complying with community processes, being prepared to work with people who see an ethical dimension, and how to deal with other groups forking openly released code.
The document discusses several key points about cyber warfare and coding:
1. Coding is a form of maneuver in cyber warfare, as code can be changed and adapted quickly to respond to new threats or vulnerabilities. Technological agility will be important in cyber warfare where there are no compensating physical assets.
2. Cyber situational awareness is different than traditional battlespace awareness, but they should still be related. Integrating cyber and physical target data will be important for coordination.
3. Culture is important in cyber operations and cannot be done in isolation. Participating in communities of practice and using open source tools and techniques will be necessary to learn from others and adapt quickly to changes.
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Today’s digitally connected world presents a wide range of security challenges for enterprises. Insider security threats are particularly noteworthy because they have the potential to cause significant harm. Unlike external threats, insider risks originate from within the company, making them more subtle and challenging to identify. This blog aims to provide a comprehensive understanding of insider security threats, including their types, examples, effects, and mitigation techniques.
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization.
Key Takeaways:
* Understand why connection pooling is essential for high-traffic applications
* Explore various connection poolers available for PostgreSQL, including pgbouncer
* Learn the configuration options and functionalities of pgbouncer
* Discover best practices for monitoring and troubleshooting connection pooling setups
* Gain insights into real-world use cases and considerations for production environments
This presentation is ideal for:
* Database administrators (DBAs)
* Developers working with PostgreSQL
* DevOps engineers
* Anyone interested in optimizing PostgreSQL performance
Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services
Sustainability requires ingenuity and stewardship. Did you know Pigging Solutions pigging systems help you achieve your sustainable manufacturing goals AND provide rapid return on investment.
How? Our systems recover over 99% of product in transfer piping. Recovering trapped product from transfer lines that would otherwise become flush-waste, means you can increase batch yields and eliminate flush waste. From raw materials to finished product, if you can pump it, we can pig it.
Measuring the Impact of Network Latency at Twitter
Widya Salim and Victor Ma will outline the causal impact analysis, framework, and key learnings used to quantify the impact of reducing Twitter's network latency.
How RPA Help in the Transportation and Logistics Industry.pptx
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
Kief Morris rethinks the infrastructure code delivery lifecycle, advocating for a shift towards composable infrastructure systems. We should shift to designing around deployable components rather than code modules, use more useful levels of abstraction, and drive design and deployment from applications rather than bottom-up, monolithic architecture and delivery.
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Slide of the tutorial entitled "Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Emerging Trends" held at UMAP'24: 32nd ACM Conference on User Modeling, Adaptation and Personalization (July 1, 2024 | Cagliari, Italy)
Choose our Linux Web Hosting for a seamless and successful online presence
Our Linux Web Hosting plans offer unbeatable performance, security, and scalability, ensuring your website runs smoothly and efficiently.
Visit- https://onliveserver.com/linux-web-hosting/
This document discusses how corporations can leverage digital technologies to enhance their intelligence. It suggests that a corporation's intelligence (IQcorp) depends on factors like fluid intelligence (Gf), crystallized intelligence (Gc), quantitative reasoning (Gq), memory (Gsm/Glr), processing speed (Gs), and decision speed (Gt). While humans currently excel in areas like fluid intelligence, digital technologies can augment corporations in other factors like crystallized intelligence, memory, and processing speed through techniques such as analytics, machine learning, and collaborative workflows. The document argues that through a symbiotic human-machine relationship, corporations can develop super-human levels of intelligence.
The document discusses how corporations can become more innovative by adopting post-bureaucratic models that allow for emergent and networked behaviors. It argues that intentionally enabling emergence through open source practices, low barriers to participation, and generative systems can produce unanticipated innovation from broad audiences. The key is impedance matching organizations to the decentralized world through policies, architectures, and cultures that enhance long-tail contribution from self-organizing groups.
W-JAX Keynote - Big Data and Corporate Evolutionjstogdill
A look at corporate evolution from the industrial revolution to the information age - with a focus on how Big Data will make an impact.
Presented at W-JAX Java Conference in Munich Germany, 11-8-11
This document discusses building open source software in the Department of Defense and encourages contractors to adopt more open source practices. It outlines three ways that government-funded source code could be made openly available, including having the government assert rights and share the code. Contractors are encouraged to release their copyrights to open source communities to delight customers, do more with less, and hire great developers. Examples are given of projects that benefited from becoming more open source. The document raises questions about whether adopting open source means complying with community processes, being prepared to work with people who see an ethical dimension, and how to deal with other groups forking openly released code.
The document discusses several key points about cyber warfare and coding:
1. Coding is a form of maneuver in cyber warfare, as code can be changed and adapted quickly to respond to new threats or vulnerabilities. Technological agility will be important in cyber warfare where there are no compensating physical assets.
2. Cyber situational awareness is different than traditional battlespace awareness, but they should still be related. Integrating cyber and physical target data will be important for coordination.
3. Culture is important in cyber operations and cannot be done in isolation. Participating in communities of practice and using open source tools and techniques will be necessary to learn from others and adapt quickly to changes.
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Bert Blevins
Today’s digitally connected world presents a wide range of security challenges for enterprises. Insider security threats are particularly noteworthy because they have the potential to cause significant harm. Unlike external threats, insider risks originate from within the company, making them more subtle and challenging to identify. This blog aims to provide a comprehensive understanding of insider security threats, including their types, examples, effects, and mitigation techniques.
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsMydbops
This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization.
Key Takeaways:
* Understand why connection pooling is essential for high-traffic applications
* Explore various connection poolers available for PostgreSQL, including pgbouncer
* Learn the configuration options and functionalities of pgbouncer
* Discover best practices for monitoring and troubleshooting connection pooling setups
* Gain insights into real-world use cases and considerations for production environments
This presentation is ideal for:
* Database administrators (DBAs)
* Developers working with PostgreSQL
* DevOps engineers
* Anyone interested in optimizing PostgreSQL performance
Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services
Sustainability requires ingenuity and stewardship. Did you know Pigging Solutions pigging systems help you achieve your sustainable manufacturing goals AND provide rapid return on investment.
How? Our systems recover over 99% of product in transfer piping. Recovering trapped product from transfer lines that would otherwise become flush-waste, means you can increase batch yields and eliminate flush waste. From raw materials to finished product, if you can pump it, we can pig it.
Measuring the Impact of Network Latency at TwitterScyllaDB
Widya Salim and Victor Ma will outline the causal impact analysis, framework, and key learnings used to quantify the impact of reducing Twitter's network latency.
How RPA Help in the Transportation and Logistics Industry.pptxSynapseIndia
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
Kief Morris rethinks the infrastructure code delivery lifecycle, advocating for a shift towards composable infrastructure systems. We should shift to designing around deployable components rather than code modules, use more useful levels of abstraction, and drive design and deployment from applications rather than bottom-up, monolithic architecture and delivery.
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Erasmo Purificato
Slide of the tutorial entitled "Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Emerging Trends" held at UMAP'24: 32nd ACM Conference on User Modeling, Adaptation and Personalization (July 1, 2024 | Cagliari, Italy)
Choose our Linux Web Hosting for a seamless and successful online presencerajancomputerfbd
Our Linux Web Hosting plans offer unbeatable performance, security, and scalability, ensuring your website runs smoothly and efficiently.
Visit- https://onliveserver.com/linux-web-hosting/
Coordinate Systems in FME 101 - Webinar SlidesSafe Software
If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights.
During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to:
- Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value
- Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems
- Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors
- Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported
- Look Ahead: Gain insights into where FME is headed with coordinate systems in the future
Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!
An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)
Implementations of Fused Deposition Modeling in real worldEmerging Tech
The presentation showcases the diverse real-world applications of Fused Deposition Modeling (FDM) across multiple industries:
1. **Manufacturing**: FDM is utilized in manufacturing for rapid prototyping, creating custom tools and fixtures, and producing functional end-use parts. Companies leverage its cost-effectiveness and flexibility to streamline production processes.
2. **Medical**: In the medical field, FDM is used to create patient-specific anatomical models, surgical guides, and prosthetics. Its ability to produce precise and biocompatible parts supports advancements in personalized healthcare solutions.
3. **Education**: FDM plays a crucial role in education by enabling students to learn about design and engineering through hands-on 3D printing projects. It promotes innovation and practical skill development in STEM disciplines.
4. **Science**: Researchers use FDM to prototype equipment for scientific experiments, build custom laboratory tools, and create models for visualization and testing purposes. It facilitates rapid iteration and customization in scientific endeavors.
5. **Automotive**: Automotive manufacturers employ FDM for prototyping vehicle components, tooling for assembly lines, and customized parts. It speeds up the design validation process and enhances efficiency in automotive engineering.
6. **Consumer Electronics**: FDM is utilized in consumer electronics for designing and prototyping product enclosures, casings, and internal components. It enables rapid iteration and customization to meet evolving consumer demands.
7. **Robotics**: Robotics engineers leverage FDM to prototype robot parts, create lightweight and durable components, and customize robot designs for specific applications. It supports innovation and optimization in robotic systems.
8. **Aerospace**: In aerospace, FDM is used to manufacture lightweight parts, complex geometries, and prototypes of aircraft components. It contributes to cost reduction, faster production cycles, and weight savings in aerospace engineering.
9. **Architecture**: Architects utilize FDM for creating detailed architectural models, prototypes of building components, and intricate designs. It aids in visualizing concepts, testing structural integrity, and communicating design ideas effectively.
Each industry example demonstrates how FDM enhances innovation, accelerates product development, and addresses specific challenges through advanced manufacturing capabilities.
Blockchain technology is transforming industries and reshaping the way we conduct business, manage data, and secure transactions. Whether you're new to blockchain or looking to deepen your knowledge, our guidebook, "Blockchain for Dummies", is your ultimate resource.
Mitigating the Impact of State Management in Cloud Stream Processing SystemsScyllaDB
Stream processing is a crucial component of modern data infrastructure, but constructing an efficient and scalable stream processing system can be challenging. Decoupling compute and storage architecture has emerged as an effective solution to these challenges, but it can introduce high latency issues, especially when dealing with complex continuous queries that necessitate managing extra-large internal states.
In this talk, we focus on addressing the high latency issues associated with S3 storage in stream processing systems that employ a decoupled compute and storage architecture. We delve into the root causes of latency in this context and explore various techniques to minimize the impact of S3 latency on stream processing performance. Our proposed approach is to implement a tiered storage mechanism that leverages a blend of high-performance and low-cost storage tiers to reduce data movement between the compute and storage layers while maintaining efficient processing.
Throughout the talk, we will present experimental results that demonstrate the effectiveness of our approach in mitigating the impact of S3 latency on stream processing. By the end of the talk, attendees will have gained insights into how to optimize their stream processing systems for reduced latency and improved cost-efficiency.
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...Toru Tamaki
Jindong Gu, Zhen Han, Shuo Chen, Ahmad Beirami, Bailan He, Gengyuan Zhang, Ruotong Liao, Yao Qin, Volker Tresp, Philip Torr "A Systematic Survey of Prompt Engineering on Vision-Language Foundation Models" arXiv2023
https://arxiv.org/abs/2307.12980
20. “The test of a first-rate intelligence is the ability to hold two opposed ideas in the mind at the same time, and still retain the ability to function.” - F. Scott Fitzgerald
Editor's Notes
Army in the post industrial era
Napoleon was perhaps the first general of the industrial age. Not from how he equipped his army, but because it embodied the spirit of the age: concentration of people and power, hierarchy, and planning.
In his day Command and Control was exercised from the top of the nearest hill. He watched many battles unfold from some high ground. C2 was rudimentary and direct. He controlled the battle based on what he could see and signal.
Advances in communication and weapons technology made the battlefield much bigger. But it didn’t fundamentally change C2, it simply gave Napoleon’s descendents super powers. They could see and hear events that were well beyond their actual vision, and they could shout their orders for miles.
It’s as if the Hill Napoleon stood on was suddenly the tallest mountain in the world. In some sense nothing has really changed, Napoleon wouldn’t have understood the technology behind FBCB2, but he would immediately grasp how to use it. It is in a direct family line of from his way of doing command and control. He’s still on the hill, just a bit less fog.
But the industrial age is in transition. We are very rapidly entering the network age. Where computer networks make possible human networks unconstrained by time and distance. Where interests, intent, and ideology can coalesce without regard to geography or even language. The very notion of “signal” is going through a disruptive change.
This shift is causing other related shifts. In particular, the rise of emergent decentralized organizations that are coming into conflict with their planned, hierarchical, centralized predecessors.
Brafman and Beckstrom wrote a seminal piece describing these trends. Once you add the idea of decentralization to your set of mental filters, you see it everywhere, from how open source software is built to how the Iranian people are challenging their government.
One of the things this all adds up to, and what both Linux,wikileaks, Al Qaida, and Iranian protesters demonstrate equally well is that the network age is the age of the network empowered, self selected, five (six?) sigma individual (beliefs, skills, …). What craig’s list’s 40 employees are doing to the $B classified industry, the 20 or so people of wikileaks are looking to do to foreign policy.
The Army is taking advantage of this trend too. Apps for Army isn’t just a cute way to build apps for cell phones, it is a system for capturing passion, interest, and skills as a cognitive force multiplier.
From Napoleon standing on a hill to FBCB2 has been one long industrial age trajectory… but you are about to be asked to do something different. It’s not just about incremental improvement of C2 anymore.
You may think social networks are just the S2’s job. They analyze social networks of potential or actual adversaries and then we just exercise C2.
But as the French learned in Algiers, and we are learning in Asia now, it takes a network to fight a network. We have to build our own. The notion of NetCentricity started out with this understanding but got lost in the technology of systems integration and forgot the simple truth…
It’s about connections between people, irrespective of hierarchy. So, design systems for human connection, not for process. It’s no longer just about signals traversing hierarchy.
Sea Change: Signals are no longer just hierarchy-spanning C2; aninterface to the commander’s brain. They are a new brain, the neural connections of the collective trans-service consciousness.
At the risk of mixing my metaphors … and for that organization to be able to learn, they need to, like neurons, reconfigure quickly. Writing and deploying code in near real time is increasingly becoming maneuver in a way that even Napoleon would understand. This is most obvious in the context of cyber warfare, but it is applicable well beyond that.
Maneuvering in code requires the advent of the emergent enterprise. We still build “big C” capabilities based on CDD’s but we need platforms that support the emergent creation of “little c’s” in the field.
Of course, the difficult thing will be figuring out how to continue to do the traditional centralized stuff we do now, while adding in this new emergent / decentralized stuff.
But we have to focus on the emergent stuff to make it happen. We need to support open source, social coding, collaboration and presence, the creation of small world weak ties, …