SlideShare una empresa de Scribd logo
1 de 25
Don Adams CTO Worldwide Public Sector TIBCO Software Inc. Predictive Battlespace
Network Centric Warfare /Network Enabled Capabilities   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Network-Centric Enterprise Network-Centric Warfare Infostructure ,[object Object],[object Object],[object Object],Integrated Enterprise More TEETH Less Tail
PredictiveBusiness TM Source:  Ranadiv é , V.,  The Power to Predict , 2006.
What is Complex Event Processing? Detecting Threats and Opportunities with PredictiveBusiness®
Notional Predictive Battlespace Environment EVENT PRE-PROCESSING EVENT SOURCES .  .  .  LEVEL ONE EVENT REFINEMENT USER INTERFACE Predictive Battlespace Environment DB MANAGEMENT Historical Data Profile & Patterns DISTRIBUTED LOCAL EVENT SERVICES . . EVENT PROFILES . . DATA BASES . . OTHER DATA LEVEL TWO SITUATION REFINEMENT LEVEL THREE IMPACT ASSESSMENT LEVEL FOUR PROCESS REFINEMENT & SPECIALIZED ANALYSIS
A Traditional Event-Driven Architecture HTTP request / response  Structured messages Screen  Audit events Message Audit events Screen/ message  Audit events Indicator Detection Rules Indicator Detection Rules Queue Client/Server Channel Queue Indicator Detection Rules EMS Channel Queue Indicator Detection Rules Screen  Based Channel Indicator  Event Sensor Preprocessing Service API Queue Indicator Detection Rules HTTP Channel Queue Indicator Detection Rules API Channel … 1234Joe01021970….. Indicator  Event Indicator  Event Indicator  Event Indicator  Event Structured messages Queue Unix/ VT Channel Indicator Detection Rules Indicator Event Network TAP
Emerging Event-Decision Architecture POEI Profiles Purpose-Built Analytics Distributed Multisensor Infrastructure Joint/Coalition  Sensors Human  Sensors Edge Sensors Intel Watch Center  Order of Battle Predictive Battlespace Environment  Sensors are Everywhere!
Structured Processing for Complex Events ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Level of  Inference Low Med High
Example Bayesian Logic Hi-Res Imagery Linguist Grids Impact Assess Human Sources Alert Service VIQ Imagery Watch Center Known Terror Sites Multi-Int Correlate Thermal Imagery Watch Correlate Imagery analysis
TIBCO BusinessEvents™ Overview FDS/IDS Logfiles Edge Devs Collection, Normalization Metric of Managed Objects, Normalized Non-Contextual Events Metadata  Repository Semantic Model Events Rules Design Environment State Model Event Management, Correlation,  Aggregation, Inference and  Analysis Correlated, Analyzed, Contextual Dialogue Events   Rules, Knowledge,  Patterns, Models Visualization, Reporting, Alert Management Application Interface Feeds Visualization: Detection Metrics Sensors Agents Synthetic  Warehouse Visualization: Process View Dialogue Manager Inference Engine
A Scenario
Safe Haven
The convoy rushes off
AeroVironment Global Observer
Reaper
An out of the way restaurant
Chang Industries SkySeer
The Door of the Restaurant
Aurora Flight Sciences Excalibur
A bad day
 
Detailed Predictive Battlespace Environment
Example Publications, Webinars and Tools
Questions
Thank  You! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],

Más contenido relacionado

La actualidad más candente

Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat ModelingMarco Morana
 
How I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKWHow I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKWSounil Yu
 
Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016 Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016 Exclusive Networks ME
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkAndrew Gerber
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopDavid Sweigert
 
Incident Response: Validation, Containment & Forensics
 Incident Response: Validation, Containment & Forensics Incident Response: Validation, Containment & Forensics
Incident Response: Validation, Containment & ForensicsPriyanka Aash
 
What is Next-Generation Antivirus?
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?Ryan G. Murphy
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesSplunk
 
STRIDE And DREAD
STRIDE And DREADSTRIDE And DREAD
STRIDE And DREADchuckbt
 

La actualidad más candente (11)

Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
How I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKWHow I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKW
 
NetWitness
NetWitnessNetWitness
NetWitness
 
Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016 Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
 
Incident Response: Validation, Containment & Forensics
 Incident Response: Validation, Containment & Forensics Incident Response: Validation, Containment & Forensics
Incident Response: Validation, Containment & Forensics
 
What is Next-Generation Antivirus?
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting Breaches
 
Owasp top 10 2013
Owasp top 10 2013Owasp top 10 2013
Owasp top 10 2013
 
STRIDE And DREAD
STRIDE And DREADSTRIDE And DREAD
STRIDE And DREAD
 

Similar a The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architecture in Defense

Processing Patterns for Predictive Business
Processing Patterns for Predictive BusinessProcessing Patterns for Predictive Business
Processing Patterns for Predictive BusinessTim Bass
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessTim Bass
 
Combating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event ProcessingCombating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event ProcessingTim Bass
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityTim Bass
 
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006Tim Bass
 
Complex Event Processing (CEP) for Next-Generation Security Event Management,...
Complex Event Processing (CEP) for Next-Generation Security Event Management,...Complex Event Processing (CEP) for Next-Generation Security Event Management,...
Complex Event Processing (CEP) for Next-Generation Security Event Management,...Tim Bass
 
Optimizing Your SOA with Event Processing
Optimizing Your SOA with Event ProcessingOptimizing Your SOA with Event Processing
Optimizing Your SOA with Event ProcessingTim Bass
 
CEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementCEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementTim Bass
 
Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006Tim Bass
 
Complex Event Processing
Complex Event ProcessingComplex Event Processing
Complex Event ProcessingJohn Plummer
 
Mythbusters: Event Stream Processing v. Complex Event Processing
Mythbusters: Event Stream Processing v. Complex Event ProcessingMythbusters: Event Stream Processing v. Complex Event Processing
Mythbusters: Event Stream Processing v. Complex Event ProcessingTim Bass
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Tim Bass
 
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksHow to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksMicrosoft
 
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin
 
Event mesh api meetup AsyncAPI Singapore
Event mesh api meetup AsyncAPI SingaporeEvent mesh api meetup AsyncAPI Singapore
Event mesh api meetup AsyncAPI SingaporePhil Scanlon
 
Fraud detection system
Fraud detection systemFraud detection system
Fraud detection systembaladutt
 
Log Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinLog Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinAnton Chuvakin
 
Next-Generation IDS: A CEP Use Case in 10 Minutes
Next-Generation IDS: A CEP Use Case in 10 MinutesNext-Generation IDS: A CEP Use Case in 10 Minutes
Next-Generation IDS: A CEP Use Case in 10 MinutesTim Bass
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityRobert Herjavec
 
Guido schmutz-jax2011-event-driven soa
Guido schmutz-jax2011-event-driven soaGuido schmutz-jax2011-event-driven soa
Guido schmutz-jax2011-event-driven soaGuido Schmutz
 

Similar a The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architecture in Defense (20)

Processing Patterns for Predictive Business
Processing Patterns for Predictive BusinessProcessing Patterns for Predictive Business
Processing Patterns for Predictive Business
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusiness
 
Combating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event ProcessingCombating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event Processing
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise Security
 
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
 
Complex Event Processing (CEP) for Next-Generation Security Event Management,...
Complex Event Processing (CEP) for Next-Generation Security Event Management,...Complex Event Processing (CEP) for Next-Generation Security Event Management,...
Complex Event Processing (CEP) for Next-Generation Security Event Management,...
 
Optimizing Your SOA with Event Processing
Optimizing Your SOA with Event ProcessingOptimizing Your SOA with Event Processing
Optimizing Your SOA with Event Processing
 
CEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementCEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk Management
 
Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006
 
Complex Event Processing
Complex Event ProcessingComplex Event Processing
Complex Event Processing
 
Mythbusters: Event Stream Processing v. Complex Event Processing
Mythbusters: Event Stream Processing v. Complex Event ProcessingMythbusters: Event Stream Processing v. Complex Event Processing
Mythbusters: Event Stream Processing v. Complex Event Processing
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...
 
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksHow to protect your corporate from advanced attacks
How to protect your corporate from advanced attacks
 
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability Intelligence
 
Event mesh api meetup AsyncAPI Singapore
Event mesh api meetup AsyncAPI SingaporeEvent mesh api meetup AsyncAPI Singapore
Event mesh api meetup AsyncAPI Singapore
 
Fraud detection system
Fraud detection systemFraud detection system
Fraud detection system
 
Log Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinLog Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton Chuvakin
 
Next-Generation IDS: A CEP Use Case in 10 Minutes
Next-Generation IDS: A CEP Use Case in 10 MinutesNext-Generation IDS: A CEP Use Case in 10 Minutes
Next-Generation IDS: A CEP Use Case in 10 Minutes
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming Security
 
Guido schmutz-jax2011-event-driven soa
Guido schmutz-jax2011-event-driven soaGuido schmutz-jax2011-event-driven soa
Guido schmutz-jax2011-event-driven soa
 

Más de Nathaniel Palmer

Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Nathaniel Palmer
 
The Future Of Bpm Six Trends Shaping Process Management
The Future Of Bpm Six Trends Shaping Process ManagementThe Future Of Bpm Six Trends Shaping Process Management
The Future Of Bpm Six Trends Shaping Process ManagementNathaniel Palmer
 
Open Philosophies for Associative Autopoietic Digital Ecosystems
Open Philosophies for Associative Autopoietic Digital EcosystemsOpen Philosophies for Associative Autopoietic Digital Ecosystems
Open Philosophies for Associative Autopoietic Digital EcosystemsNathaniel Palmer
 
Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Nathaniel Palmer
 
Improving Enterprise Performance using a Business Process Improvement Discipline
Improving Enterprise Performance using a Business Process Improvement DisciplineImproving Enterprise Performance using a Business Process Improvement Discipline
Improving Enterprise Performance using a Business Process Improvement DisciplineNathaniel Palmer
 
Understanding Business Process Architecture to Enable Operational Efficiency
Understanding Business Process Architecture to Enable Operational EfficiencyUnderstanding Business Process Architecture to Enable Operational Efficiency
Understanding Business Process Architecture to Enable Operational EfficiencyNathaniel Palmer
 
Applying Agile Development Strategies to BPM Initiatives
Applying Agile Development Strategies to BPM InitiativesApplying Agile Development Strategies to BPM Initiatives
Applying Agile Development Strategies to BPM InitiativesNathaniel Palmer
 
Governance and Business Participation: The Key Requirements for Effective SOA...
Governance and Business Participation: The Key Requirements for Effective SOA...Governance and Business Participation: The Key Requirements for Effective SOA...
Governance and Business Participation: The Key Requirements for Effective SOA...Nathaniel Palmer
 
Workforce Management & BPM Integration
Workforce Management & BPM IntegrationWorkforce Management & BPM Integration
Workforce Management & BPM IntegrationNathaniel Palmer
 
Delivering Process-Driven, Dynamic Applications
Delivering Process-Driven, Dynamic ApplicationsDelivering Process-Driven, Dynamic Applications
Delivering Process-Driven, Dynamic ApplicationsNathaniel Palmer
 
Realizing Successful Transformation Within Politically Charged Environments
Realizing Successful Transformation Within Politically Charged EnvironmentsRealizing Successful Transformation Within Politically Charged Environments
Realizing Successful Transformation Within Politically Charged EnvironmentsNathaniel Palmer
 
Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)Nathaniel Palmer
 
Why Enterprises Should Invest Money in EA Transformation Frameworks
Why Enterprises Should Invest Money in EA Transformation FrameworksWhy Enterprises Should Invest Money in EA Transformation Frameworks
Why Enterprises Should Invest Money in EA Transformation FrameworksNathaniel Palmer
 
Transitioning Enterprise Architectures to Service Oriented Architectures
Transitioning Enterprise Architectures to Service Oriented ArchitecturesTransitioning Enterprise Architectures to Service Oriented Architectures
Transitioning Enterprise Architectures to Service Oriented ArchitecturesNathaniel Palmer
 
BPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise ArchitectureBPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise ArchitectureNathaniel Palmer
 
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...Nathaniel Palmer
 
What Every Enterprise Architect Needs to Know About BPM
What Every Enterprise Architect Needs to Know About BPMWhat Every Enterprise Architect Needs to Know About BPM
What Every Enterprise Architect Needs to Know About BPMNathaniel Palmer
 
Department of the Interior’s Methodology for Business Transformation (MBT)
Department of the Interior’s Methodology for Business Transformation (MBT)Department of the Interior’s Methodology for Business Transformation (MBT)
Department of the Interior’s Methodology for Business Transformation (MBT)Nathaniel Palmer
 
The Construction of Emergency Interoperable Communications Architecture
The Construction of Emergency Interoperable Communications ArchitectureThe Construction of Emergency Interoperable Communications Architecture
The Construction of Emergency Interoperable Communications ArchitectureNathaniel Palmer
 
Getting From Understanding to Execution: Making Implicit Processes Actionable...
Getting From Understanding to Execution: Making Implicit Processes Actionable...Getting From Understanding to Execution: Making Implicit Processes Actionable...
Getting From Understanding to Execution: Making Implicit Processes Actionable...Nathaniel Palmer
 

Más de Nathaniel Palmer (20)

Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?
 
The Future Of Bpm Six Trends Shaping Process Management
The Future Of Bpm Six Trends Shaping Process ManagementThe Future Of Bpm Six Trends Shaping Process Management
The Future Of Bpm Six Trends Shaping Process Management
 
Open Philosophies for Associative Autopoietic Digital Ecosystems
Open Philosophies for Associative Autopoietic Digital EcosystemsOpen Philosophies for Associative Autopoietic Digital Ecosystems
Open Philosophies for Associative Autopoietic Digital Ecosystems
 
Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?Is there a Role for Patterns in Enterprise Architecture?
Is there a Role for Patterns in Enterprise Architecture?
 
Improving Enterprise Performance using a Business Process Improvement Discipline
Improving Enterprise Performance using a Business Process Improvement DisciplineImproving Enterprise Performance using a Business Process Improvement Discipline
Improving Enterprise Performance using a Business Process Improvement Discipline
 
Understanding Business Process Architecture to Enable Operational Efficiency
Understanding Business Process Architecture to Enable Operational EfficiencyUnderstanding Business Process Architecture to Enable Operational Efficiency
Understanding Business Process Architecture to Enable Operational Efficiency
 
Applying Agile Development Strategies to BPM Initiatives
Applying Agile Development Strategies to BPM InitiativesApplying Agile Development Strategies to BPM Initiatives
Applying Agile Development Strategies to BPM Initiatives
 
Governance and Business Participation: The Key Requirements for Effective SOA...
Governance and Business Participation: The Key Requirements for Effective SOA...Governance and Business Participation: The Key Requirements for Effective SOA...
Governance and Business Participation: The Key Requirements for Effective SOA...
 
Workforce Management & BPM Integration
Workforce Management & BPM IntegrationWorkforce Management & BPM Integration
Workforce Management & BPM Integration
 
Delivering Process-Driven, Dynamic Applications
Delivering Process-Driven, Dynamic ApplicationsDelivering Process-Driven, Dynamic Applications
Delivering Process-Driven, Dynamic Applications
 
Realizing Successful Transformation Within Politically Charged Environments
Realizing Successful Transformation Within Politically Charged EnvironmentsRealizing Successful Transformation Within Politically Charged Environments
Realizing Successful Transformation Within Politically Charged Environments
 
Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)Understanding and Applying The Open Group Architecture Framework (TOGAF)
Understanding and Applying The Open Group Architecture Framework (TOGAF)
 
Why Enterprises Should Invest Money in EA Transformation Frameworks
Why Enterprises Should Invest Money in EA Transformation FrameworksWhy Enterprises Should Invest Money in EA Transformation Frameworks
Why Enterprises Should Invest Money in EA Transformation Frameworks
 
Transitioning Enterprise Architectures to Service Oriented Architectures
Transitioning Enterprise Architectures to Service Oriented ArchitecturesTransitioning Enterprise Architectures to Service Oriented Architectures
Transitioning Enterprise Architectures to Service Oriented Architectures
 
BPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise ArchitectureBPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise Architecture
 
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
 
What Every Enterprise Architect Needs to Know About BPM
What Every Enterprise Architect Needs to Know About BPMWhat Every Enterprise Architect Needs to Know About BPM
What Every Enterprise Architect Needs to Know About BPM
 
Department of the Interior’s Methodology for Business Transformation (MBT)
Department of the Interior’s Methodology for Business Transformation (MBT)Department of the Interior’s Methodology for Business Transformation (MBT)
Department of the Interior’s Methodology for Business Transformation (MBT)
 
The Construction of Emergency Interoperable Communications Architecture
The Construction of Emergency Interoperable Communications ArchitectureThe Construction of Emergency Interoperable Communications Architecture
The Construction of Emergency Interoperable Communications Architecture
 
Getting From Understanding to Execution: Making Implicit Processes Actionable...
Getting From Understanding to Execution: Making Implicit Processes Actionable...Getting From Understanding to Execution: Making Implicit Processes Actionable...
Getting From Understanding to Execution: Making Implicit Processes Actionable...
 

Último

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architecture in Defense

  • 1. Don Adams CTO Worldwide Public Sector TIBCO Software Inc. Predictive Battlespace
  • 2.
  • 3. PredictiveBusiness TM Source: Ranadiv é , V., The Power to Predict , 2006.
  • 4. What is Complex Event Processing? Detecting Threats and Opportunities with PredictiveBusiness®
  • 5. Notional Predictive Battlespace Environment EVENT PRE-PROCESSING EVENT SOURCES . . . LEVEL ONE EVENT REFINEMENT USER INTERFACE Predictive Battlespace Environment DB MANAGEMENT Historical Data Profile & Patterns DISTRIBUTED LOCAL EVENT SERVICES . . EVENT PROFILES . . DATA BASES . . OTHER DATA LEVEL TWO SITUATION REFINEMENT LEVEL THREE IMPACT ASSESSMENT LEVEL FOUR PROCESS REFINEMENT & SPECIALIZED ANALYSIS
  • 6. A Traditional Event-Driven Architecture HTTP request / response Structured messages Screen Audit events Message Audit events Screen/ message Audit events Indicator Detection Rules Indicator Detection Rules Queue Client/Server Channel Queue Indicator Detection Rules EMS Channel Queue Indicator Detection Rules Screen Based Channel Indicator Event Sensor Preprocessing Service API Queue Indicator Detection Rules HTTP Channel Queue Indicator Detection Rules API Channel … 1234Joe01021970….. Indicator Event Indicator Event Indicator Event Indicator Event Structured messages Queue Unix/ VT Channel Indicator Detection Rules Indicator Event Network TAP
  • 7. Emerging Event-Decision Architecture POEI Profiles Purpose-Built Analytics Distributed Multisensor Infrastructure Joint/Coalition Sensors Human Sensors Edge Sensors Intel Watch Center Order of Battle Predictive Battlespace Environment Sensors are Everywhere!
  • 8.
  • 9. Example Bayesian Logic Hi-Res Imagery Linguist Grids Impact Assess Human Sources Alert Service VIQ Imagery Watch Center Known Terror Sites Multi-Int Correlate Thermal Imagery Watch Correlate Imagery analysis
  • 10. TIBCO BusinessEvents™ Overview FDS/IDS Logfiles Edge Devs Collection, Normalization Metric of Managed Objects, Normalized Non-Contextual Events Metadata Repository Semantic Model Events Rules Design Environment State Model Event Management, Correlation, Aggregation, Inference and Analysis Correlated, Analyzed, Contextual Dialogue Events Rules, Knowledge, Patterns, Models Visualization, Reporting, Alert Management Application Interface Feeds Visualization: Detection Metrics Sensors Agents Synthetic Warehouse Visualization: Process View Dialogue Manager Inference Engine
  • 16. An out of the way restaurant
  • 18. The Door of the Restaurant
  • 21.  
  • 25.