SlideShare uma empresa Scribd logo
1 de 25
Don Adams CTO Worldwide Public Sector TIBCO Software Inc. Predictive Battlespace
Network Centric Warfare /Network Enabled Capabilities   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Network-Centric Enterprise Network-Centric Warfare Infostructure ,[object Object],[object Object],[object Object],Integrated Enterprise More TEETH Less Tail
PredictiveBusiness TM Source:  Ranadiv é , V.,  The Power to Predict , 2006.
What is Complex Event Processing? Detecting Threats and Opportunities with PredictiveBusiness®
Notional Predictive Battlespace Environment EVENT PRE-PROCESSING EVENT SOURCES .  .  .  LEVEL ONE EVENT REFINEMENT USER INTERFACE Predictive Battlespace Environment DB MANAGEMENT Historical Data Profile & Patterns DISTRIBUTED LOCAL EVENT SERVICES . . EVENT PROFILES . . DATA BASES . . OTHER DATA LEVEL TWO SITUATION REFINEMENT LEVEL THREE IMPACT ASSESSMENT LEVEL FOUR PROCESS REFINEMENT & SPECIALIZED ANALYSIS
A Traditional Event-Driven Architecture HTTP request / response  Structured messages Screen  Audit events Message Audit events Screen/ message  Audit events Indicator Detection Rules Indicator Detection Rules Queue Client/Server Channel Queue Indicator Detection Rules EMS Channel Queue Indicator Detection Rules Screen  Based Channel Indicator  Event Sensor Preprocessing Service API Queue Indicator Detection Rules HTTP Channel Queue Indicator Detection Rules API Channel … 1234Joe01021970….. Indicator  Event Indicator  Event Indicator  Event Indicator  Event Structured messages Queue Unix/ VT Channel Indicator Detection Rules Indicator Event Network TAP
Emerging Event-Decision Architecture POEI Profiles Purpose-Built Analytics Distributed Multisensor Infrastructure Joint/Coalition  Sensors Human  Sensors Edge Sensors Intel Watch Center  Order of Battle Predictive Battlespace Environment  Sensors are Everywhere!
Structured Processing for Complex Events ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Level of  Inference Low Med High
Example Bayesian Logic Hi-Res Imagery Linguist Grids Impact Assess Human Sources Alert Service VIQ Imagery Watch Center Known Terror Sites Multi-Int Correlate Thermal Imagery Watch Correlate Imagery analysis
TIBCO BusinessEvents™ Overview FDS/IDS Logfiles Edge Devs Collection, Normalization Metric of Managed Objects, Normalized Non-Contextual Events Metadata  Repository Semantic Model Events Rules Design Environment State Model Event Management, Correlation,  Aggregation, Inference and  Analysis Correlated, Analyzed, Contextual Dialogue Events   Rules, Knowledge,  Patterns, Models Visualization, Reporting, Alert Management Application Interface Feeds Visualization: Detection Metrics Sensors Agents Synthetic  Warehouse Visualization: Process View Dialogue Manager Inference Engine
A Scenario
Safe Haven
The convoy rushes off
AeroVironment Global Observer
Reaper
An out of the way restaurant
Chang Industries SkySeer
The Door of the Restaurant
Aurora Flight Sciences Excalibur
A bad day
 
Detailed Predictive Battlespace Environment
Example Publications, Webinars and Tools
Questions
Thank  You! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],

Mais conteúdo relacionado

Mais procurados

Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat ModelingMarco Morana
 
How I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKWHow I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKWSounil Yu
 
Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016 Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016 Exclusive Networks ME
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkAndrew Gerber
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopDavid Sweigert
 
Incident Response: Validation, Containment & Forensics
 Incident Response: Validation, Containment & Forensics Incident Response: Validation, Containment & Forensics
Incident Response: Validation, Containment & ForensicsPriyanka Aash
 
What is Next-Generation Antivirus?
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?Ryan G. Murphy
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesSplunk
 
STRIDE And DREAD
STRIDE And DREADSTRIDE And DREAD
STRIDE And DREADchuckbt
 

Mais procurados (11)

Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
How I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKWHow I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKW
 
NetWitness
NetWitnessNetWitness
NetWitness
 
Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016 Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
 
Incident Response: Validation, Containment & Forensics
 Incident Response: Validation, Containment & Forensics Incident Response: Validation, Containment & Forensics
Incident Response: Validation, Containment & Forensics
 
What is Next-Generation Antivirus?
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting Breaches
 
Owasp top 10 2013
Owasp top 10 2013Owasp top 10 2013
Owasp top 10 2013
 
STRIDE And DREAD
STRIDE And DREADSTRIDE And DREAD
STRIDE And DREAD
 

Semelhante a The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architecture in Defense

Processing Patterns for Predictive Business
Processing Patterns for Predictive BusinessProcessing Patterns for Predictive Business
Processing Patterns for Predictive BusinessTim Bass
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessTim Bass
 
Combating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event ProcessingCombating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event ProcessingTim Bass
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityTim Bass
 
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006Tim Bass
 
Complex Event Processing (CEP) for Next-Generation Security Event Management,...
Complex Event Processing (CEP) for Next-Generation Security Event Management,...Complex Event Processing (CEP) for Next-Generation Security Event Management,...
Complex Event Processing (CEP) for Next-Generation Security Event Management,...Tim Bass
 
Optimizing Your SOA with Event Processing
Optimizing Your SOA with Event ProcessingOptimizing Your SOA with Event Processing
Optimizing Your SOA with Event ProcessingTim Bass
 
CEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementCEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementTim Bass
 
Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006Tim Bass
 
Complex Event Processing
Complex Event ProcessingComplex Event Processing
Complex Event ProcessingJohn Plummer
 
Mythbusters: Event Stream Processing v. Complex Event Processing
Mythbusters: Event Stream Processing v. Complex Event ProcessingMythbusters: Event Stream Processing v. Complex Event Processing
Mythbusters: Event Stream Processing v. Complex Event ProcessingTim Bass
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Tim Bass
 
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksHow to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksMicrosoft
 
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin
 
Event mesh api meetup AsyncAPI Singapore
Event mesh api meetup AsyncAPI SingaporeEvent mesh api meetup AsyncAPI Singapore
Event mesh api meetup AsyncAPI SingaporePhil Scanlon
 
Fraud detection system
Fraud detection systemFraud detection system
Fraud detection systembaladutt
 
Log Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinLog Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinAnton Chuvakin
 
Next-Generation IDS: A CEP Use Case in 10 Minutes
Next-Generation IDS: A CEP Use Case in 10 MinutesNext-Generation IDS: A CEP Use Case in 10 Minutes
Next-Generation IDS: A CEP Use Case in 10 MinutesTim Bass
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityRobert Herjavec
 
Guido schmutz-jax2011-event-driven soa
Guido schmutz-jax2011-event-driven soaGuido schmutz-jax2011-event-driven soa
Guido schmutz-jax2011-event-driven soaGuido Schmutz
 

Semelhante a The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architecture in Defense (20)

Processing Patterns for Predictive Business
Processing Patterns for Predictive BusinessProcessing Patterns for Predictive Business
Processing Patterns for Predictive Business
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusiness
 
Combating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event ProcessingCombating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event Processing
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise Security
 
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
 
Complex Event Processing (CEP) for Next-Generation Security Event Management,...
Complex Event Processing (CEP) for Next-Generation Security Event Management,...Complex Event Processing (CEP) for Next-Generation Security Event Management,...
Complex Event Processing (CEP) for Next-Generation Security Event Management,...
 
Optimizing Your SOA with Event Processing
Optimizing Your SOA with Event ProcessingOptimizing Your SOA with Event Processing
Optimizing Your SOA with Event Processing
 
CEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementCEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk Management
 
Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006
 
Complex Event Processing
Complex Event ProcessingComplex Event Processing
Complex Event Processing
 
Mythbusters: Event Stream Processing v. Complex Event Processing
Mythbusters: Event Stream Processing v. Complex Event ProcessingMythbusters: Event Stream Processing v. Complex Event Processing
Mythbusters: Event Stream Processing v. Complex Event Processing
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...
 
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksHow to protect your corporate from advanced attacks
How to protect your corporate from advanced attacks
 
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability Intelligence
 
Event mesh api meetup AsyncAPI Singapore
Event mesh api meetup AsyncAPI SingaporeEvent mesh api meetup AsyncAPI Singapore
Event mesh api meetup AsyncAPI Singapore
 
Fraud detection system
Fraud detection systemFraud detection system
Fraud detection system
 
Log Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinLog Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton Chuvakin
 
Next-Generation IDS: A CEP Use Case in 10 Minutes
Next-Generation IDS: A CEP Use Case in 10 MinutesNext-Generation IDS: A CEP Use Case in 10 Minutes
Next-Generation IDS: A CEP Use Case in 10 Minutes
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming Security
 
Guido schmutz-jax2011-event-driven soa
Guido schmutz-jax2011-event-driven soaGuido schmutz-jax2011-event-driven soa
Guido schmutz-jax2011-event-driven soa
 

Mais de Nathaniel Palmer

Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Nathaniel Palmer
 
The Future Of Bpm Six Trends Shaping Process Management
The Future Of Bpm Six Trends Shaping Process ManagementThe Future Of Bpm Six Trends Shaping Process Management
The Future Of Bpm Six Trends Shaping Process ManagementNathaniel Palmer
 
Open Philosophies for Associative Autopoietic Digital Ecosystems
Open Philosophies for Associative Autopoietic Digital EcosystemsOpen Philosophies for Associative Autopoietic Digital Ecosystems
Open Philosophies for Associative Autopoietic Digital EcosystemsNathaniel Palmer
 
Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Nathaniel Palmer
 
Improving Enterprise Performance using a Business Process Improvement Discipline
Improving Enterprise Performance using a Business Process Improvement DisciplineImproving Enterprise Performance using a Business Process Improvement Discipline
Improving Enterprise Performance using a Business Process Improvement DisciplineNathaniel Palmer
 
Understanding Business Process Architecture to Enable Operational Efficiency
Understanding Business Process Architecture to Enable Operational EfficiencyUnderstanding Business Process Architecture to Enable Operational Efficiency
Understanding Business Process Architecture to Enable Operational EfficiencyNathaniel Palmer
 
Applying Agile Development Strategies to BPM Initiatives
Applying Agile Development Strategies to BPM InitiativesApplying Agile Development Strategies to BPM Initiatives
Applying Agile Development Strategies to BPM InitiativesNathaniel Palmer
 
Governance and Business Participation: The Key Requirements for Effective SOA...
Governance and Business Participation: The Key Requirements for Effective SOA...Governance and Business Participation: The Key Requirements for Effective SOA...
Governance and Business Participation: The Key Requirements for Effective SOA...Nathaniel Palmer
 
Workforce Management & BPM Integration
Workforce Management & BPM IntegrationWorkforce Management & BPM Integration
Workforce Management & BPM IntegrationNathaniel Palmer
 
Delivering Process-Driven, Dynamic Applications
Delivering Process-Driven, Dynamic ApplicationsDelivering Process-Driven, Dynamic Applications
Delivering Process-Driven, Dynamic ApplicationsNathaniel Palmer
 
Realizing Successful Transformation Within Politically Charged Environments
Realizing Successful Transformation Within Politically Charged EnvironmentsRealizing Successful Transformation Within Politically Charged Environments
Realizing Successful Transformation Within Politically Charged EnvironmentsNathaniel Palmer
 
Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)Nathaniel Palmer
 
Why Enterprises Should Invest Money in EA Transformation Frameworks
Why Enterprises Should Invest Money in EA Transformation FrameworksWhy Enterprises Should Invest Money in EA Transformation Frameworks
Why Enterprises Should Invest Money in EA Transformation FrameworksNathaniel Palmer
 
Transitioning Enterprise Architectures to Service Oriented Architectures
Transitioning Enterprise Architectures to Service Oriented ArchitecturesTransitioning Enterprise Architectures to Service Oriented Architectures
Transitioning Enterprise Architectures to Service Oriented ArchitecturesNathaniel Palmer
 
BPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise ArchitectureBPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise ArchitectureNathaniel Palmer
 
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...Nathaniel Palmer
 
What Every Enterprise Architect Needs to Know About BPM
What Every Enterprise Architect Needs to Know About BPMWhat Every Enterprise Architect Needs to Know About BPM
What Every Enterprise Architect Needs to Know About BPMNathaniel Palmer
 
Department of the Interior’s Methodology for Business Transformation (MBT)
Department of the Interior’s Methodology for Business Transformation (MBT)Department of the Interior’s Methodology for Business Transformation (MBT)
Department of the Interior’s Methodology for Business Transformation (MBT)Nathaniel Palmer
 
The Construction of Emergency Interoperable Communications Architecture
The Construction of Emergency Interoperable Communications ArchitectureThe Construction of Emergency Interoperable Communications Architecture
The Construction of Emergency Interoperable Communications ArchitectureNathaniel Palmer
 
Getting From Understanding to Execution: Making Implicit Processes Actionable...
Getting From Understanding to Execution: Making Implicit Processes Actionable...Getting From Understanding to Execution: Making Implicit Processes Actionable...
Getting From Understanding to Execution: Making Implicit Processes Actionable...Nathaniel Palmer
 

Mais de Nathaniel Palmer (20)

Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?
 
The Future Of Bpm Six Trends Shaping Process Management
The Future Of Bpm Six Trends Shaping Process ManagementThe Future Of Bpm Six Trends Shaping Process Management
The Future Of Bpm Six Trends Shaping Process Management
 
Open Philosophies for Associative Autopoietic Digital Ecosystems
Open Philosophies for Associative Autopoietic Digital EcosystemsOpen Philosophies for Associative Autopoietic Digital Ecosystems
Open Philosophies for Associative Autopoietic Digital Ecosystems
 
Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?
 
Improving Enterprise Performance using a Business Process Improvement Discipline
Improving Enterprise Performance using a Business Process Improvement DisciplineImproving Enterprise Performance using a Business Process Improvement Discipline
Improving Enterprise Performance using a Business Process Improvement Discipline
 
Understanding Business Process Architecture to Enable Operational Efficiency
Understanding Business Process Architecture to Enable Operational EfficiencyUnderstanding Business Process Architecture to Enable Operational Efficiency
Understanding Business Process Architecture to Enable Operational Efficiency
 
Applying Agile Development Strategies to BPM Initiatives
Applying Agile Development Strategies to BPM InitiativesApplying Agile Development Strategies to BPM Initiatives
Applying Agile Development Strategies to BPM Initiatives
 
Governance and Business Participation: The Key Requirements for Effective SOA...
Governance and Business Participation: The Key Requirements for Effective SOA...Governance and Business Participation: The Key Requirements for Effective SOA...
Governance and Business Participation: The Key Requirements for Effective SOA...
 
Workforce Management & BPM Integration
Workforce Management & BPM IntegrationWorkforce Management & BPM Integration
Workforce Management & BPM Integration
 
Delivering Process-Driven, Dynamic Applications
Delivering Process-Driven, Dynamic ApplicationsDelivering Process-Driven, Dynamic Applications
Delivering Process-Driven, Dynamic Applications
 
Realizing Successful Transformation Within Politically Charged Environments
Realizing Successful Transformation Within Politically Charged EnvironmentsRealizing Successful Transformation Within Politically Charged Environments
Realizing Successful Transformation Within Politically Charged Environments
 
Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)
 
Why Enterprises Should Invest Money in EA Transformation Frameworks
Why Enterprises Should Invest Money in EA Transformation FrameworksWhy Enterprises Should Invest Money in EA Transformation Frameworks
Why Enterprises Should Invest Money in EA Transformation Frameworks
 
Transitioning Enterprise Architectures to Service Oriented Architectures
Transitioning Enterprise Architectures to Service Oriented ArchitecturesTransitioning Enterprise Architectures to Service Oriented Architectures
Transitioning Enterprise Architectures to Service Oriented Architectures
 
BPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise ArchitectureBPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise Architecture
 
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
 
What Every Enterprise Architect Needs to Know About BPM
What Every Enterprise Architect Needs to Know About BPMWhat Every Enterprise Architect Needs to Know About BPM
What Every Enterprise Architect Needs to Know About BPM
 
Department of the Interior’s Methodology for Business Transformation (MBT)
Department of the Interior’s Methodology for Business Transformation (MBT)Department of the Interior’s Methodology for Business Transformation (MBT)
Department of the Interior’s Methodology for Business Transformation (MBT)
 
The Construction of Emergency Interoperable Communications Architecture
The Construction of Emergency Interoperable Communications ArchitectureThe Construction of Emergency Interoperable Communications Architecture
The Construction of Emergency Interoperable Communications Architecture
 
Getting From Understanding to Execution: Making Implicit Processes Actionable...
Getting From Understanding to Execution: Making Implicit Processes Actionable...Getting From Understanding to Execution: Making Implicit Processes Actionable...
Getting From Understanding to Execution: Making Implicit Processes Actionable...
 

Último

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Último (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architecture in Defense

  • 1. Don Adams CTO Worldwide Public Sector TIBCO Software Inc. Predictive Battlespace
  • 2.
  • 3. PredictiveBusiness TM Source: Ranadiv é , V., The Power to Predict , 2006.
  • 4. What is Complex Event Processing? Detecting Threats and Opportunities with PredictiveBusiness®
  • 5. Notional Predictive Battlespace Environment EVENT PRE-PROCESSING EVENT SOURCES . . . LEVEL ONE EVENT REFINEMENT USER INTERFACE Predictive Battlespace Environment DB MANAGEMENT Historical Data Profile & Patterns DISTRIBUTED LOCAL EVENT SERVICES . . EVENT PROFILES . . DATA BASES . . OTHER DATA LEVEL TWO SITUATION REFINEMENT LEVEL THREE IMPACT ASSESSMENT LEVEL FOUR PROCESS REFINEMENT & SPECIALIZED ANALYSIS
  • 6. A Traditional Event-Driven Architecture HTTP request / response Structured messages Screen Audit events Message Audit events Screen/ message Audit events Indicator Detection Rules Indicator Detection Rules Queue Client/Server Channel Queue Indicator Detection Rules EMS Channel Queue Indicator Detection Rules Screen Based Channel Indicator Event Sensor Preprocessing Service API Queue Indicator Detection Rules HTTP Channel Queue Indicator Detection Rules API Channel … 1234Joe01021970….. Indicator Event Indicator Event Indicator Event Indicator Event Structured messages Queue Unix/ VT Channel Indicator Detection Rules Indicator Event Network TAP
  • 7. Emerging Event-Decision Architecture POEI Profiles Purpose-Built Analytics Distributed Multisensor Infrastructure Joint/Coalition Sensors Human Sensors Edge Sensors Intel Watch Center Order of Battle Predictive Battlespace Environment Sensors are Everywhere!
  • 8.
  • 9. Example Bayesian Logic Hi-Res Imagery Linguist Grids Impact Assess Human Sources Alert Service VIQ Imagery Watch Center Known Terror Sites Multi-Int Correlate Thermal Imagery Watch Correlate Imagery analysis
  • 10. TIBCO BusinessEvents™ Overview FDS/IDS Logfiles Edge Devs Collection, Normalization Metric of Managed Objects, Normalized Non-Contextual Events Metadata Repository Semantic Model Events Rules Design Environment State Model Event Management, Correlation, Aggregation, Inference and Analysis Correlated, Analyzed, Contextual Dialogue Events Rules, Knowledge, Patterns, Models Visualization, Reporting, Alert Management Application Interface Feeds Visualization: Detection Metrics Sensors Agents Synthetic Warehouse Visualization: Process View Dialogue Manager Inference Engine
  • 16. An out of the way restaurant
  • 18. The Door of the Restaurant
  • 21.  
  • 25.