SlideShare une entreprise Scribd logo
1  sur  25
Don Adams CTO Worldwide Public Sector TIBCO Software Inc. Predictive Battlespace
Network Centric Warfare /Network Enabled Capabilities   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Network-Centric Enterprise Network-Centric Warfare Infostructure ,[object Object],[object Object],[object Object],Integrated Enterprise More TEETH Less Tail
PredictiveBusiness TM Source:  Ranadiv é , V.,  The Power to Predict , 2006.
What is Complex Event Processing? Detecting Threats and Opportunities with PredictiveBusiness®
Notional Predictive Battlespace Environment EVENT PRE-PROCESSING EVENT SOURCES .  .  .  LEVEL ONE EVENT REFINEMENT USER INTERFACE Predictive Battlespace Environment DB MANAGEMENT Historical Data Profile & Patterns DISTRIBUTED LOCAL EVENT SERVICES . . EVENT PROFILES . . DATA BASES . . OTHER DATA LEVEL TWO SITUATION REFINEMENT LEVEL THREE IMPACT ASSESSMENT LEVEL FOUR PROCESS REFINEMENT & SPECIALIZED ANALYSIS
A Traditional Event-Driven Architecture HTTP request / response  Structured messages Screen  Audit events Message Audit events Screen/ message  Audit events Indicator Detection Rules Indicator Detection Rules Queue Client/Server Channel Queue Indicator Detection Rules EMS Channel Queue Indicator Detection Rules Screen  Based Channel Indicator  Event Sensor Preprocessing Service API Queue Indicator Detection Rules HTTP Channel Queue Indicator Detection Rules API Channel … 1234Joe01021970….. Indicator  Event Indicator  Event Indicator  Event Indicator  Event Structured messages Queue Unix/ VT Channel Indicator Detection Rules Indicator Event Network TAP
Emerging Event-Decision Architecture POEI Profiles Purpose-Built Analytics Distributed Multisensor Infrastructure Joint/Coalition  Sensors Human  Sensors Edge Sensors Intel Watch Center  Order of Battle Predictive Battlespace Environment  Sensors are Everywhere!
Structured Processing for Complex Events ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Level of  Inference Low Med High
Example Bayesian Logic Hi-Res Imagery Linguist Grids Impact Assess Human Sources Alert Service VIQ Imagery Watch Center Known Terror Sites Multi-Int Correlate Thermal Imagery Watch Correlate Imagery analysis
TIBCO BusinessEvents™ Overview FDS/IDS Logfiles Edge Devs Collection, Normalization Metric of Managed Objects, Normalized Non-Contextual Events Metadata  Repository Semantic Model Events Rules Design Environment State Model Event Management, Correlation,  Aggregation, Inference and  Analysis Correlated, Analyzed, Contextual Dialogue Events   Rules, Knowledge,  Patterns, Models Visualization, Reporting, Alert Management Application Interface Feeds Visualization: Detection Metrics Sensors Agents Synthetic  Warehouse Visualization: Process View Dialogue Manager Inference Engine
A Scenario
Safe Haven
The convoy rushes off
AeroVironment Global Observer
Reaper
An out of the way restaurant
Chang Industries SkySeer
The Door of the Restaurant
Aurora Flight Sciences Excalibur
A bad day
 
Detailed Predictive Battlespace Environment
Example Publications, Webinars and Tools
Questions
Thank  You! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],

Contenu connexe

Tendances

Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat ModelingMarco Morana
 
How I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKWHow I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKWSounil Yu
 
Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016 Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016 Exclusive Networks ME
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkAndrew Gerber
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopDavid Sweigert
 
Incident Response: Validation, Containment & Forensics
 Incident Response: Validation, Containment & Forensics Incident Response: Validation, Containment & Forensics
Incident Response: Validation, Containment & ForensicsPriyanka Aash
 
What is Next-Generation Antivirus?
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?Ryan G. Murphy
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesSplunk
 
STRIDE And DREAD
STRIDE And DREADSTRIDE And DREAD
STRIDE And DREADchuckbt
 

Tendances (11)

Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
How I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKWHow I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKW
 
NetWitness
NetWitnessNetWitness
NetWitness
 
Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016 Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
 
Incident Response: Validation, Containment & Forensics
 Incident Response: Validation, Containment & Forensics Incident Response: Validation, Containment & Forensics
Incident Response: Validation, Containment & Forensics
 
What is Next-Generation Antivirus?
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting Breaches
 
Owasp top 10 2013
Owasp top 10 2013Owasp top 10 2013
Owasp top 10 2013
 
STRIDE And DREAD
STRIDE And DREADSTRIDE And DREAD
STRIDE And DREAD
 

Similaire à The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architecture in Defense

Processing Patterns for Predictive Business
Processing Patterns for Predictive BusinessProcessing Patterns for Predictive Business
Processing Patterns for Predictive BusinessTim Bass
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessTim Bass
 
Combating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event ProcessingCombating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event ProcessingTim Bass
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityTim Bass
 
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006Tim Bass
 
Complex Event Processing (CEP) for Next-Generation Security Event Management,...
Complex Event Processing (CEP) for Next-Generation Security Event Management,...Complex Event Processing (CEP) for Next-Generation Security Event Management,...
Complex Event Processing (CEP) for Next-Generation Security Event Management,...Tim Bass
 
Optimizing Your SOA with Event Processing
Optimizing Your SOA with Event ProcessingOptimizing Your SOA with Event Processing
Optimizing Your SOA with Event ProcessingTim Bass
 
CEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementCEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementTim Bass
 
Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006Tim Bass
 
Complex Event Processing
Complex Event ProcessingComplex Event Processing
Complex Event ProcessingJohn Plummer
 
Mythbusters: Event Stream Processing v. Complex Event Processing
Mythbusters: Event Stream Processing v. Complex Event ProcessingMythbusters: Event Stream Processing v. Complex Event Processing
Mythbusters: Event Stream Processing v. Complex Event ProcessingTim Bass
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Tim Bass
 
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksHow to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksMicrosoft
 
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin
 
Event mesh api meetup AsyncAPI Singapore
Event mesh api meetup AsyncAPI SingaporeEvent mesh api meetup AsyncAPI Singapore
Event mesh api meetup AsyncAPI SingaporePhil Scanlon
 
Fraud detection system
Fraud detection systemFraud detection system
Fraud detection systembaladutt
 
Log Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinLog Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinAnton Chuvakin
 
Next-Generation IDS: A CEP Use Case in 10 Minutes
Next-Generation IDS: A CEP Use Case in 10 MinutesNext-Generation IDS: A CEP Use Case in 10 Minutes
Next-Generation IDS: A CEP Use Case in 10 MinutesTim Bass
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityRobert Herjavec
 
Guido schmutz-jax2011-event-driven soa
Guido schmutz-jax2011-event-driven soaGuido schmutz-jax2011-event-driven soa
Guido schmutz-jax2011-event-driven soaGuido Schmutz
 

Similaire à The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architecture in Defense (20)

Processing Patterns for Predictive Business
Processing Patterns for Predictive BusinessProcessing Patterns for Predictive Business
Processing Patterns for Predictive Business
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusiness
 
Combating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event ProcessingCombating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event Processing
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise Security
 
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
 
Complex Event Processing (CEP) for Next-Generation Security Event Management,...
Complex Event Processing (CEP) for Next-Generation Security Event Management,...Complex Event Processing (CEP) for Next-Generation Security Event Management,...
Complex Event Processing (CEP) for Next-Generation Security Event Management,...
 
Optimizing Your SOA with Event Processing
Optimizing Your SOA with Event ProcessingOptimizing Your SOA with Event Processing
Optimizing Your SOA with Event Processing
 
CEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementCEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk Management
 
Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006
 
Complex Event Processing
Complex Event ProcessingComplex Event Processing
Complex Event Processing
 
Mythbusters: Event Stream Processing v. Complex Event Processing
Mythbusters: Event Stream Processing v. Complex Event ProcessingMythbusters: Event Stream Processing v. Complex Event Processing
Mythbusters: Event Stream Processing v. Complex Event Processing
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...
 
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksHow to protect your corporate from advanced attacks
How to protect your corporate from advanced attacks
 
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability Intelligence
 
Event mesh api meetup AsyncAPI Singapore
Event mesh api meetup AsyncAPI SingaporeEvent mesh api meetup AsyncAPI Singapore
Event mesh api meetup AsyncAPI Singapore
 
Fraud detection system
Fraud detection systemFraud detection system
Fraud detection system
 
Log Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinLog Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton Chuvakin
 
Next-Generation IDS: A CEP Use Case in 10 Minutes
Next-Generation IDS: A CEP Use Case in 10 MinutesNext-Generation IDS: A CEP Use Case in 10 Minutes
Next-Generation IDS: A CEP Use Case in 10 Minutes
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming Security
 
Guido schmutz-jax2011-event-driven soa
Guido schmutz-jax2011-event-driven soaGuido schmutz-jax2011-event-driven soa
Guido schmutz-jax2011-event-driven soa
 

Plus de Nathaniel Palmer

Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Nathaniel Palmer
 
The Future Of Bpm Six Trends Shaping Process Management
The Future Of Bpm Six Trends Shaping Process ManagementThe Future Of Bpm Six Trends Shaping Process Management
The Future Of Bpm Six Trends Shaping Process ManagementNathaniel Palmer
 
Open Philosophies for Associative Autopoietic Digital Ecosystems
Open Philosophies for Associative Autopoietic Digital EcosystemsOpen Philosophies for Associative Autopoietic Digital Ecosystems
Open Philosophies for Associative Autopoietic Digital EcosystemsNathaniel Palmer
 
Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Nathaniel Palmer
 
Improving Enterprise Performance using a Business Process Improvement Discipline
Improving Enterprise Performance using a Business Process Improvement DisciplineImproving Enterprise Performance using a Business Process Improvement Discipline
Improving Enterprise Performance using a Business Process Improvement DisciplineNathaniel Palmer
 
Understanding Business Process Architecture to Enable Operational Efficiency
Understanding Business Process Architecture to Enable Operational EfficiencyUnderstanding Business Process Architecture to Enable Operational Efficiency
Understanding Business Process Architecture to Enable Operational EfficiencyNathaniel Palmer
 
Applying Agile Development Strategies to BPM Initiatives
Applying Agile Development Strategies to BPM InitiativesApplying Agile Development Strategies to BPM Initiatives
Applying Agile Development Strategies to BPM InitiativesNathaniel Palmer
 
Governance and Business Participation: The Key Requirements for Effective SOA...
Governance and Business Participation: The Key Requirements for Effective SOA...Governance and Business Participation: The Key Requirements for Effective SOA...
Governance and Business Participation: The Key Requirements for Effective SOA...Nathaniel Palmer
 
Workforce Management & BPM Integration
Workforce Management & BPM IntegrationWorkforce Management & BPM Integration
Workforce Management & BPM IntegrationNathaniel Palmer
 
Delivering Process-Driven, Dynamic Applications
Delivering Process-Driven, Dynamic ApplicationsDelivering Process-Driven, Dynamic Applications
Delivering Process-Driven, Dynamic ApplicationsNathaniel Palmer
 
Realizing Successful Transformation Within Politically Charged Environments
Realizing Successful Transformation Within Politically Charged EnvironmentsRealizing Successful Transformation Within Politically Charged Environments
Realizing Successful Transformation Within Politically Charged EnvironmentsNathaniel Palmer
 
Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)Nathaniel Palmer
 
Why Enterprises Should Invest Money in EA Transformation Frameworks
Why Enterprises Should Invest Money in EA Transformation FrameworksWhy Enterprises Should Invest Money in EA Transformation Frameworks
Why Enterprises Should Invest Money in EA Transformation FrameworksNathaniel Palmer
 
Transitioning Enterprise Architectures to Service Oriented Architectures
Transitioning Enterprise Architectures to Service Oriented ArchitecturesTransitioning Enterprise Architectures to Service Oriented Architectures
Transitioning Enterprise Architectures to Service Oriented ArchitecturesNathaniel Palmer
 
BPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise ArchitectureBPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise ArchitectureNathaniel Palmer
 
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...Nathaniel Palmer
 
What Every Enterprise Architect Needs to Know About BPM
What Every Enterprise Architect Needs to Know About BPMWhat Every Enterprise Architect Needs to Know About BPM
What Every Enterprise Architect Needs to Know About BPMNathaniel Palmer
 
Department of the Interior’s Methodology for Business Transformation (MBT)
Department of the Interior’s Methodology for Business Transformation (MBT)Department of the Interior’s Methodology for Business Transformation (MBT)
Department of the Interior’s Methodology for Business Transformation (MBT)Nathaniel Palmer
 
The Construction of Emergency Interoperable Communications Architecture
The Construction of Emergency Interoperable Communications ArchitectureThe Construction of Emergency Interoperable Communications Architecture
The Construction of Emergency Interoperable Communications ArchitectureNathaniel Palmer
 
Getting From Understanding to Execution: Making Implicit Processes Actionable...
Getting From Understanding to Execution: Making Implicit Processes Actionable...Getting From Understanding to Execution: Making Implicit Processes Actionable...
Getting From Understanding to Execution: Making Implicit Processes Actionable...Nathaniel Palmer
 

Plus de Nathaniel Palmer (20)

Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?
 
The Future Of Bpm Six Trends Shaping Process Management
The Future Of Bpm Six Trends Shaping Process ManagementThe Future Of Bpm Six Trends Shaping Process Management
The Future Of Bpm Six Trends Shaping Process Management
 
Open Philosophies for Associative Autopoietic Digital Ecosystems
Open Philosophies for Associative Autopoietic Digital EcosystemsOpen Philosophies for Associative Autopoietic Digital Ecosystems
Open Philosophies for Associative Autopoietic Digital Ecosystems
 
Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?
 
Improving Enterprise Performance using a Business Process Improvement Discipline
Improving Enterprise Performance using a Business Process Improvement DisciplineImproving Enterprise Performance using a Business Process Improvement Discipline
Improving Enterprise Performance using a Business Process Improvement Discipline
 
Understanding Business Process Architecture to Enable Operational Efficiency
Understanding Business Process Architecture to Enable Operational EfficiencyUnderstanding Business Process Architecture to Enable Operational Efficiency
Understanding Business Process Architecture to Enable Operational Efficiency
 
Applying Agile Development Strategies to BPM Initiatives
Applying Agile Development Strategies to BPM InitiativesApplying Agile Development Strategies to BPM Initiatives
Applying Agile Development Strategies to BPM Initiatives
 
Governance and Business Participation: The Key Requirements for Effective SOA...
Governance and Business Participation: The Key Requirements for Effective SOA...Governance and Business Participation: The Key Requirements for Effective SOA...
Governance and Business Participation: The Key Requirements for Effective SOA...
 
Workforce Management & BPM Integration
Workforce Management & BPM IntegrationWorkforce Management & BPM Integration
Workforce Management & BPM Integration
 
Delivering Process-Driven, Dynamic Applications
Delivering Process-Driven, Dynamic ApplicationsDelivering Process-Driven, Dynamic Applications
Delivering Process-Driven, Dynamic Applications
 
Realizing Successful Transformation Within Politically Charged Environments
Realizing Successful Transformation Within Politically Charged EnvironmentsRealizing Successful Transformation Within Politically Charged Environments
Realizing Successful Transformation Within Politically Charged Environments
 
Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)
 
Why Enterprises Should Invest Money in EA Transformation Frameworks
Why Enterprises Should Invest Money in EA Transformation FrameworksWhy Enterprises Should Invest Money in EA Transformation Frameworks
Why Enterprises Should Invest Money in EA Transformation Frameworks
 
Transitioning Enterprise Architectures to Service Oriented Architectures
Transitioning Enterprise Architectures to Service Oriented ArchitecturesTransitioning Enterprise Architectures to Service Oriented Architectures
Transitioning Enterprise Architectures to Service Oriented Architectures
 
BPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise ArchitectureBPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise Architecture
 
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
 
What Every Enterprise Architect Needs to Know About BPM
What Every Enterprise Architect Needs to Know About BPMWhat Every Enterprise Architect Needs to Know About BPM
What Every Enterprise Architect Needs to Know About BPM
 
Department of the Interior’s Methodology for Business Transformation (MBT)
Department of the Interior’s Methodology for Business Transformation (MBT)Department of the Interior’s Methodology for Business Transformation (MBT)
Department of the Interior’s Methodology for Business Transformation (MBT)
 
The Construction of Emergency Interoperable Communications Architecture
The Construction of Emergency Interoperable Communications ArchitectureThe Construction of Emergency Interoperable Communications Architecture
The Construction of Emergency Interoperable Communications Architecture
 
Getting From Understanding to Execution: Making Implicit Processes Actionable...
Getting From Understanding to Execution: Making Implicit Processes Actionable...Getting From Understanding to Execution: Making Implicit Processes Actionable...
Getting From Understanding to Execution: Making Implicit Processes Actionable...
 

Dernier

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Dernier (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architecture in Defense

  • 1. Don Adams CTO Worldwide Public Sector TIBCO Software Inc. Predictive Battlespace
  • 2.
  • 3. PredictiveBusiness TM Source: Ranadiv é , V., The Power to Predict , 2006.
  • 4. What is Complex Event Processing? Detecting Threats and Opportunities with PredictiveBusiness®
  • 5. Notional Predictive Battlespace Environment EVENT PRE-PROCESSING EVENT SOURCES . . . LEVEL ONE EVENT REFINEMENT USER INTERFACE Predictive Battlespace Environment DB MANAGEMENT Historical Data Profile & Patterns DISTRIBUTED LOCAL EVENT SERVICES . . EVENT PROFILES . . DATA BASES . . OTHER DATA LEVEL TWO SITUATION REFINEMENT LEVEL THREE IMPACT ASSESSMENT LEVEL FOUR PROCESS REFINEMENT & SPECIALIZED ANALYSIS
  • 6. A Traditional Event-Driven Architecture HTTP request / response Structured messages Screen Audit events Message Audit events Screen/ message Audit events Indicator Detection Rules Indicator Detection Rules Queue Client/Server Channel Queue Indicator Detection Rules EMS Channel Queue Indicator Detection Rules Screen Based Channel Indicator Event Sensor Preprocessing Service API Queue Indicator Detection Rules HTTP Channel Queue Indicator Detection Rules API Channel … 1234Joe01021970….. Indicator Event Indicator Event Indicator Event Indicator Event Structured messages Queue Unix/ VT Channel Indicator Detection Rules Indicator Event Network TAP
  • 7. Emerging Event-Decision Architecture POEI Profiles Purpose-Built Analytics Distributed Multisensor Infrastructure Joint/Coalition Sensors Human Sensors Edge Sensors Intel Watch Center Order of Battle Predictive Battlespace Environment Sensors are Everywhere!
  • 8.
  • 9. Example Bayesian Logic Hi-Res Imagery Linguist Grids Impact Assess Human Sources Alert Service VIQ Imagery Watch Center Known Terror Sites Multi-Int Correlate Thermal Imagery Watch Correlate Imagery analysis
  • 10. TIBCO BusinessEvents™ Overview FDS/IDS Logfiles Edge Devs Collection, Normalization Metric of Managed Objects, Normalized Non-Contextual Events Metadata Repository Semantic Model Events Rules Design Environment State Model Event Management, Correlation, Aggregation, Inference and Analysis Correlated, Analyzed, Contextual Dialogue Events Rules, Knowledge, Patterns, Models Visualization, Reporting, Alert Management Application Interface Feeds Visualization: Detection Metrics Sensors Agents Synthetic Warehouse Visualization: Process View Dialogue Manager Inference Engine
  • 16. An out of the way restaurant
  • 18. The Door of the Restaurant
  • 21.  
  • 25.