The 90th Fighter Squadron has a long history beginning in World War I. It was initially activated in 1917 and participated in missions in France during WWI. After the war, the squadron adopted the "Pair o' Dice" emblem designed by its first commander. During WWII, the 90th flew missions in the Pacific with aircraft like the A-20 and B-25, playing an important role in battles like the Bismarck Sea. The squadron later participated in the Vietnam War and subsequent Cold War era, flying various aircraft types over the decades. In 2007, the 90th began transitioning to its current primary aircraft, the advanced F-22A Raptor.
US Navy in the Pacific, session x, part iiJim Powers
The final chapter. Okinawa, the Japanese preparations for Armageddon, the Soviet role, the decision to drop the bomb. An epilogue considers how American moral judgment has varied greatly as to the correctness of that final retribution.
US Navy in the Pacific, session x, part iiJim Powers
The final chapter. Okinawa, the Japanese preparations for Armageddon, the Soviet role, the decision to drop the bomb. An epilogue considers how American moral judgment has varied greatly as to the correctness of that final retribution.
The death & demise of a regiment by George Pace BalzanIvan Consiglio
The death & demise of a regiment by George Pace Balzan, Captain George Pace Balzan, recalls his memories of his army service in the 3rd LAA Regiment Royal Malta Artillery from 1941 to 1946.
Bio of Pakistan Air Force Air Commodore Abdul BasitAwais Imran
My grandfather Abdul Basit is a retired pilot officer of the Pakistan Air Force. This is his short biography, written by a writer from the PAF. It was included in a short book called Sentinels in the Sky, which documented stories of ace pilots in PAF's history, with a special focus on pilots who flew in Indo-Pak Wars of 1965 and 1971.
I'm uploading it here on Slideshare since documents posted here are generally more visible on Google search results.
USS Auk (AM-38) was an Lapwing-class minesweeper acquired by the U.S. Navy after World War I for the task of removing mines that had been placed during the war.
We know that mesothelioma patients would rather stay local when receiving treatment,rnso we will review options for private medical centers, surgical consultants, clinical trials,rnand match you up with friendly, local physicians wherever we can.
The death & demise of a regiment by George Pace BalzanIvan Consiglio
The death & demise of a regiment by George Pace Balzan, Captain George Pace Balzan, recalls his memories of his army service in the 3rd LAA Regiment Royal Malta Artillery from 1941 to 1946.
Bio of Pakistan Air Force Air Commodore Abdul BasitAwais Imran
My grandfather Abdul Basit is a retired pilot officer of the Pakistan Air Force. This is his short biography, written by a writer from the PAF. It was included in a short book called Sentinels in the Sky, which documented stories of ace pilots in PAF's history, with a special focus on pilots who flew in Indo-Pak Wars of 1965 and 1971.
I'm uploading it here on Slideshare since documents posted here are generally more visible on Google search results.
USS Auk (AM-38) was an Lapwing-class minesweeper acquired by the U.S. Navy after World War I for the task of removing mines that had been placed during the war.
We know that mesothelioma patients would rather stay local when receiving treatment,rnso we will review options for private medical centers, surgical consultants, clinical trials,rnand match you up with friendly, local physicians wherever we can.
Gave a talk at StartCon about the future of Growth. I touch on viral marketing / referral marketing, fake news and social media, and marketplaces. Finally, the slides go through future technology platforms and how things might evolve there.
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
If your B2B blogging goals include earning social media shares and backlinks to boost your search rankings, this infographic lists the size best approaches.
Each technological age has been marked by a shift in how the industrial platform enables companies to rethink their business processes and create wealth. In the talk I argue that we are limiting our view of what this next industrial/digital age can offer because of how we read, measure and through that perceive the world (how we cherry pick data). Companies are locked in metrics and quantitative measures, data that can fit into a spreadsheet. And by that they see the digital transformation merely as an efficiency tool to the fossil fuel age. But we need to stretch further…
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
How can a digital marketing consultant help your business? In this resource we'll count the ways. 24 additional marketing resources are bundled for free.
This slide show of Selfridge AFB has been going around in emails along with being on a few web sites that pertains to the history of Selfridge Base. Well I decided to change the history of Selfridge and add the Navy to it since it was left out in the original slide show. So here is the "real" history of Selfridge that does include the NAVY. Yep, we were there too and proud of it!!!
Aviation basic aviation history one perspective for Air Force Cadetsoldcramo2009
This is a look at aviation history with a differed perspective from the syllabus. I am adding this file for individual use rather than classroom. I've included the history that I believe is relevant
World War II; America Fights Back in the PacificWayne Williams
World War Ii in the Pacific Theater; pivotal battles, leapfrogging strategies, Bataan Death March, Iwo Jima, Battle of Okinawa, Kamikaze strategy following the Battle of Leyte Gulf, damage to the USS LaGrange at Okinawa
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
90th F S
1. 90 th Fighter Squadron
Home of the Diceman
By John Williams
2. History of the 90th FS
What is now the 90th Fighter Squadron was
initially activated Aug. 20, 1917, as the 90th Aero
Squadron. Its first location was at Kelly Field, San
Antonio, Texas. The first few months of its
existence were consumed by the necessary training
to prepare the men for operations in France during
World War I. On Nov. 12, 1917, the men of the 90th
arrived at Le Havre, France. The initial cadre of
officers and enlisted men began preparing the
infrastructure necessary to support their flying
mission. The air contingent arrived soon after this
first group
3. History of the Dice
The 90th earned a positive reputation for its
ground attack missions during its continuous
participation in the air offensive over St. Mihiel. Its
first commander, 1st Lt. William G.
Schauffler, designed the 90th's Pair o' Dice emblem
displaying natural sevens during this campaign.
After the war, 90th alumni commissioned Tiffany's
of New York to design a silver pin with the
squadron logo. (The Air Force subsequently
disallowed portrayals of games of chance as unit
emblems. However, since the 90th's was designed
long before this rule, the pair-o-dice emblem has
remained.)
5. Sopwith TF-1
The squadron's first aircraft
were the Sopwith TF-1 ground
attack aircraft
6. 90th FS and WWII
During World War II, the 90th Squadron, now a Bombardment
Squadron, operated in the South Pacific, flying A-20 Havoc and B-25 Mitchell
aircraft. Their main mission involved highly dangerous skip bombings. In an
effort to improve the effectiveness and protection of the 3rd Bombardment
Group's pilots, Maj. Paul 'Pappy' Gunn, 3rd Bombardment Group engineering
officer, devised a modification of the B-25C. The modification replaced the
forward bombardier with four forwards firing .50 caliber machine
guns, supplemented with two twin .50 caliber gun packages side mounted on
the fuselage. The lower turret was discarded. The A-20s received similar
modifications. The modified aircraft were first employed by the 90th and
proved lethal ship killing machines, receiving the nickname 'commerce
destroyers.' During the Battle of the Bismarck Sea, every aircraft in the 90th
scored a hit on the Japanese convoy of 18 ships. It was the first sea-level attack
by B-25 strafers in World War II and demonstrated that this tactic was
extremely effective. The squadron also participated in the raids on
Wewak, New Guinea, which were preemptive strikes that virtually ended the
threat of enemy offensive air capabilities.
9. Post WWII to Viet Nam
After the war, the 90th moved with the 3rd Bombardment
Group to Johnson Air Base, Japan, on Oct. 1, 1954. In
January 1956, the unit transitioned to the B-57C Night
Intruder. In October 1957, the 3rd Bombardment Group
inactivated and its heritage transferred to the 3rd
Bombardment Wing, as did the 90th Bombardment
Squadron. In 1960, the wing and squadron transferred to
Yokota Air Base, where it trained in
bombardment, reconnaissance and aerial refueling. It also
served nuclear alert during this period as well. In the mid-
60s, however, the squadron underwent significant
changes.
10. Viet Nam
At the beginning of the Vietnam War, the 3rd Bombardment Wing
began deploying units to Vietnam on a rotational basis, while the
remainder continued training in their ground support role. In
November 1965, the wing moved to Bien Hoa Air Base, Vietnam,
during the buildup of forces. The 90th flew close air support
missions from Bien Hoa through tens of thousands of sorties. At the
base, a tattered pair-o-dice flag flew outside the squadron operations
area. In 1969, the 90th Tactical Fighter Squadron reverted to its pre-
World War II designation of 90th Attack Squadron. On Oct. 31, 1970,
the 3rd Tactical Fighter Wing ended its duties in Vietnam and
remained active in 'paper' status until it moved to Kunsan Air Base,
Korea, in March 1971. The 90th Attack Squadron was reassigned to
the 14th Special Operations Wing on Oct. 31, 1970 and was
redesignated the 90th Special Operations Squadron and remained in
Vietnam at Nha Trang Air Base
12. 90th FS Post Viet Nam
From late 1970 until 1974, the 90th underwent several
command reassignments. It remained with the 14th
Special Operations Wing until Sept. 1, 1971, when it
moved to the 483rd Tactical Fighter Wing and remained
at Nha Trang Air Base. On April 15, 1972, the 90th moved
again, this time to the 18th Tactical Fighter Wing at
Kadena Air Base, Okinawa, Japan. This assignment
lasted only a few months, as the unit was assigned to the
405th Fighter Wing in December 1972 and moved to
Clark Air Base, Philippines. The squadron was
redesignated the 90th Tactical Fighter Squadron on July
8, 1973, and began to fly F-4s. In September of the
following year, the 90th returned once again to the 3rd
Tactical Fighter Wing, when it relocated to Clark Air Base
after the 405th Fighter Wing was inactivated. In 1975, the
90th converted to the F-4E and participated in combat
training and providing air defense for the Philippines.
14. 90th FS Finding Home
In June 1991, Mount Pinatubo erupted in the
Philippines and the Air Force quickly decided to
evacuate its personnel and equipment from Clark AB.
The
3rd Tactical Fighter Wing remained in the Philippines
during Desert Shield and Desert Storm due to
instability in the Philippines. However, it was not going
to remain in the islands for very long. It became a
'paper' unit briefly while the Chief of Staff, Gen. Merrill
McPeak, decided where to send the wing. He decided
on Elmendorf AFB. The 21st Tactical Fighter Wing was
inactivated and the 3rd Wing replaced it as the lead
wing at Elmendorf AFB on Dec. 19, 1991. With the
establishment of the 3rd Wing on Elmendorf, the 90th
Fighter Squadron was once again reunited with its old
wing
15. Missions of the 90th FS
In addition to exercises, the 90th Fighter
Squadron also undertook real-world
deployments during the 1990s and early
2000s. From October 1995 until January
1996, the squadron deployed 8 F-15Es and
193 personnel to Aviano AB, Italy in
support of Operation DENY FLIGHT
JOINT ENDEAVOR. In February 1998, the
squadron deployed 18 F-15Es and over 200
personnel to Kwangju Air Base and Taegu
Air Base, both in Korea. While there, the
unit flew 1200 joint combat training sorties.
Personnel and aircraft redeployed in June
1998.
16. Missions of the 90th FS
In 2001 the 90th began a series of deployments which took
members of the squadron to the Middle East and
Southwest Asia. In March of that year, the 90th participated
in a 90-day AEF deployment in support of Operation
NORTHERN WATCH, patrolling the northern No-fly zone
in Iraq. The squadron sent 154 personnel and 10 F-15Es to
Icirlik AB, Turkey and returned to Elmendorf AFB on 9
June 2001. Later that year, in October, 18 F-15Es were
deployed to Kwangju AB, Korea, in support of Afghanistan
operations. While deployed pilots flew practice strike
missions and provided long-range interdiction strike
capability in the region during the absence of the USS Kitty
Hawk, they also flew missions over South Korea and
repaired base infrastructure while there. The squadron
redeployed from the 20-23 of December
18. New Day = New 90th FS
As 2006 progressed, the 90th Fighter
Squadron began to prepare for significant
changes in its mission and weapons
system. The F-15Es were scheduled to
relocate to Mountain Home AFB, Idaho,
through the BRAC decisions in 2005.
Replacing those F-15Es, the 90th began
receiving the advanced F-22A Raptor in
August 2007, which would greatly enhance
the 90th Fighter Squadron's ability to
perform its duties.