SlideShare a Scribd company logo
Marketplace 2016
Dr Colin Singleton
CountingLab Limited
CountingLab
Translational data science –
creating, translating,
developing and applying next
generation mathematical
behavioural data sciences
from academia into
commercial solutions to solve
real world problems.
Trustworthiness of information for defence from big data sets: An autonomous approach based on
the analysis of the messages’ metadata, linguistic content and spread through social networks
• social media events
• veracity determination
• rapid assessment
• autonomous and efficient
• social media and modern
warfare
• containment
• communication
Success to date
What next?
Real-time, rapid response software system to identify and
autonomously and efficiently inform on incidents
• automatically identify top stories in a certain area or topic
• automatically collect social media content related to those rumours
and tag the content with relevant measures
• estimate confidence on modelled veracity
• provide insight into why some stories should be believed
• integrate into existing systems
Potential Markets
• defence, security, emergency services, financial sector, technology
companies, crowd management
We’re looking for…
• broad awareness of our work generally and this
project in particular
• potential investors for our software
• potential future users of our software
• potential buyers of our software
• raised awareness of the importance of social media
information in the defence and security context

More Related Content

What's hot

CDE Marketplace Sept 2016: RJD Technology Ltd (CDE projects)
CDE Marketplace Sept 2016: RJD Technology Ltd (CDE projects)CDE Marketplace Sept 2016: RJD Technology Ltd (CDE projects)
CDE Marketplace Sept 2016: RJD Technology Ltd (CDE projects)
Defence and Security Accelerator
 
CDE Marketplace Sept 2016: Stormcharge Ltd (Autonomy & Big Data)
CDE Marketplace Sept 2016: Stormcharge Ltd (Autonomy & Big Data)CDE Marketplace Sept 2016: Stormcharge Ltd (Autonomy & Big Data)
CDE Marketplace Sept 2016: Stormcharge Ltd (Autonomy & Big Data)
Defence and Security Accelerator
 
CDE Marketplace Sept 2016: QinetiQ (Autonomy & Big Data)
CDE Marketplace Sept 2016: QinetiQ (Autonomy & Big Data)CDE Marketplace Sept 2016: QinetiQ (Autonomy & Big Data)
CDE Marketplace Sept 2016: QinetiQ (Autonomy & Big Data)
Defence and Security Accelerator
 
CDE Marketplace Sept 2016: Leonardo (Autonomy & Big Data)
CDE Marketplace Sept 2016: Leonardo (Autonomy & Big Data)CDE Marketplace Sept 2016: Leonardo (Autonomy & Big Data)
CDE Marketplace Sept 2016: Leonardo (Autonomy & Big Data)
Defence and Security Accelerator
 
SC7 Hangout 1: Community Building and user requirements for Big Data in Secur...
SC7 Hangout 1: Community Building and user requirements for Big Data in Secur...SC7 Hangout 1: Community Building and user requirements for Big Data in Secur...
SC7 Hangout 1: Community Building and user requirements for Big Data in Secur...
BigData_Europe
 
SC7 Hangout 1: Pilot Development for Secure Societies and adopted technologies
SC7 Hangout 1: Pilot Development for Secure Societies and adopted technologiesSC7 Hangout 1: Pilot Development for Secure Societies and adopted technologies
SC7 Hangout 1: Pilot Development for Secure Societies and adopted technologies
BigData_Europe
 
GraphTour 2020 - Allianz: Empower your business with Graph Analytics
GraphTour 2020 - Allianz: Empower your business with Graph AnalyticsGraphTour 2020 - Allianz: Empower your business with Graph Analytics
GraphTour 2020 - Allianz: Empower your business with Graph Analytics
Neo4j
 
Icaro AI Pitch deck
Icaro AI Pitch deck Icaro AI Pitch deck
Icaro AI Pitch deck
Matteo Testi
 
GeNeura
GeNeuraGeNeura
Backend for fintech platform
Backend for fintech platformBackend for fintech platform
Backend for fintech platform
Innovecs
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn..."Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...
e-SIDES.eu
 
ICT 2018 Smart Parking (University of Murcia, OdinS)
ICT 2018 Smart Parking (University of Murcia, OdinS)ICT 2018 Smart Parking (University of Murcia, OdinS)
ICT 2018 Smart Parking (University of Murcia, OdinS)
IoTCrawler
 
Neo niche executes the gartner it infrastructure operations and data centre s...
Neo niche executes the gartner it infrastructure operations and data centre s...Neo niche executes the gartner it infrastructure operations and data centre s...
Neo niche executes the gartner it infrastructure operations and data centre s...
NeoNiche Integrated
 
SC7 Hangout 2: Community Building activities for Big Data in Secure Societies
SC7 Hangout 2: Community Building activities for Big Data in Secure SocietiesSC7 Hangout 2: Community Building activities for Big Data in Secure Societies
SC7 Hangout 2: Community Building activities for Big Data in Secure Societies
BigData_Europe
 
SC6 Workshop 1: From your data to data stories - BigDataEurope, SC6 Workshop
SC6 Workshop 1: From your data to data stories - BigDataEurope, SC6 WorkshopSC6 Workshop 1: From your data to data stories - BigDataEurope, SC6 Workshop
SC6 Workshop 1: From your data to data stories - BigDataEurope, SC6 Workshop
BigData_Europe
 
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
European Data Forum
 
ECAI 2014 Tutorial on a behavioral analysis tool for agent-based simulations ...
ECAI 2014 Tutorial on a behavioral analysis tool for agent-based simulations ...ECAI 2014 Tutorial on a behavioral analysis tool for agent-based simulations ...
ECAI 2014 Tutorial on a behavioral analysis tool for agent-based simulations ...
tamasmahr
 
Content Standardization Presentation
Content Standardization PresentationContent Standardization Presentation
Content Standardization PresentationSwitchPitch
 
SecureCloud - Concertation Meeting EUBrasilCloudFORUM
SecureCloud  - Concertation Meeting EUBrasilCloudFORUMSecureCloud  - Concertation Meeting EUBrasilCloudFORUM
SecureCloud - Concertation Meeting EUBrasilCloudFORUM
EUBrasilCloudFORUM .
 
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted CloudsSecure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
EUBrasilCloudFORUM .
 

What's hot (20)

CDE Marketplace Sept 2016: RJD Technology Ltd (CDE projects)
CDE Marketplace Sept 2016: RJD Technology Ltd (CDE projects)CDE Marketplace Sept 2016: RJD Technology Ltd (CDE projects)
CDE Marketplace Sept 2016: RJD Technology Ltd (CDE projects)
 
CDE Marketplace Sept 2016: Stormcharge Ltd (Autonomy & Big Data)
CDE Marketplace Sept 2016: Stormcharge Ltd (Autonomy & Big Data)CDE Marketplace Sept 2016: Stormcharge Ltd (Autonomy & Big Data)
CDE Marketplace Sept 2016: Stormcharge Ltd (Autonomy & Big Data)
 
CDE Marketplace Sept 2016: QinetiQ (Autonomy & Big Data)
CDE Marketplace Sept 2016: QinetiQ (Autonomy & Big Data)CDE Marketplace Sept 2016: QinetiQ (Autonomy & Big Data)
CDE Marketplace Sept 2016: QinetiQ (Autonomy & Big Data)
 
CDE Marketplace Sept 2016: Leonardo (Autonomy & Big Data)
CDE Marketplace Sept 2016: Leonardo (Autonomy & Big Data)CDE Marketplace Sept 2016: Leonardo (Autonomy & Big Data)
CDE Marketplace Sept 2016: Leonardo (Autonomy & Big Data)
 
SC7 Hangout 1: Community Building and user requirements for Big Data in Secur...
SC7 Hangout 1: Community Building and user requirements for Big Data in Secur...SC7 Hangout 1: Community Building and user requirements for Big Data in Secur...
SC7 Hangout 1: Community Building and user requirements for Big Data in Secur...
 
SC7 Hangout 1: Pilot Development for Secure Societies and adopted technologies
SC7 Hangout 1: Pilot Development for Secure Societies and adopted technologiesSC7 Hangout 1: Pilot Development for Secure Societies and adopted technologies
SC7 Hangout 1: Pilot Development for Secure Societies and adopted technologies
 
GraphTour 2020 - Allianz: Empower your business with Graph Analytics
GraphTour 2020 - Allianz: Empower your business with Graph AnalyticsGraphTour 2020 - Allianz: Empower your business with Graph Analytics
GraphTour 2020 - Allianz: Empower your business with Graph Analytics
 
Icaro AI Pitch deck
Icaro AI Pitch deck Icaro AI Pitch deck
Icaro AI Pitch deck
 
GeNeura
GeNeuraGeNeura
GeNeura
 
Backend for fintech platform
Backend for fintech platformBackend for fintech platform
Backend for fintech platform
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn..."Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...
 
ICT 2018 Smart Parking (University of Murcia, OdinS)
ICT 2018 Smart Parking (University of Murcia, OdinS)ICT 2018 Smart Parking (University of Murcia, OdinS)
ICT 2018 Smart Parking (University of Murcia, OdinS)
 
Neo niche executes the gartner it infrastructure operations and data centre s...
Neo niche executes the gartner it infrastructure operations and data centre s...Neo niche executes the gartner it infrastructure operations and data centre s...
Neo niche executes the gartner it infrastructure operations and data centre s...
 
SC7 Hangout 2: Community Building activities for Big Data in Secure Societies
SC7 Hangout 2: Community Building activities for Big Data in Secure SocietiesSC7 Hangout 2: Community Building activities for Big Data in Secure Societies
SC7 Hangout 2: Community Building activities for Big Data in Secure Societies
 
SC6 Workshop 1: From your data to data stories - BigDataEurope, SC6 Workshop
SC6 Workshop 1: From your data to data stories - BigDataEurope, SC6 WorkshopSC6 Workshop 1: From your data to data stories - BigDataEurope, SC6 Workshop
SC6 Workshop 1: From your data to data stories - BigDataEurope, SC6 Workshop
 
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
 
ECAI 2014 Tutorial on a behavioral analysis tool for agent-based simulations ...
ECAI 2014 Tutorial on a behavioral analysis tool for agent-based simulations ...ECAI 2014 Tutorial on a behavioral analysis tool for agent-based simulations ...
ECAI 2014 Tutorial on a behavioral analysis tool for agent-based simulations ...
 
Content Standardization Presentation
Content Standardization PresentationContent Standardization Presentation
Content Standardization Presentation
 
SecureCloud - Concertation Meeting EUBrasilCloudFORUM
SecureCloud  - Concertation Meeting EUBrasilCloudFORUMSecureCloud  - Concertation Meeting EUBrasilCloudFORUM
SecureCloud - Concertation Meeting EUBrasilCloudFORUM
 
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted CloudsSecure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
 

Similar to CDE Marketplace Sept 2016: CountingLab Ltd (Autonomy & Big Data

BizDay: The Path to The Risk Singularity, RiskStream
BizDay: The Path to The Risk Singularity, RiskStreamBizDay: The Path to The Risk Singularity, RiskStream
BizDay: The Path to The Risk Singularity, RiskStream
R3
 
Big data-analytics-changing-way-organizations-conducting-business
Big data-analytics-changing-way-organizations-conducting-businessBig data-analytics-changing-way-organizations-conducting-business
Big data-analytics-changing-way-organizations-conducting-business
Amit Bhargava
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
Security Innovation
 
Narrative Mind week 1 H4D Stanford 2016
Narrative Mind week 1 H4D Stanford 2016Narrative Mind week 1 H4D Stanford 2016
Narrative Mind week 1 H4D Stanford 2016
Stanford University
 
A_New_Perspective_Whitepaper_05122015
A_New_Perspective_Whitepaper_05122015A_New_Perspective_Whitepaper_05122015
A_New_Perspective_Whitepaper_05122015Scott Van Valkenburgh
 
Narrative Mind Week 3 H4D Stanford 2016
Narrative Mind Week 3 H4D Stanford 2016Narrative Mind Week 3 H4D Stanford 2016
Narrative Mind Week 3 H4D Stanford 2016
Stanford University
 
Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network
Why the DoD Uses Advanced Network-traffic Analytics to Secure its NetworkWhy the DoD Uses Advanced Network-traffic Analytics to Secure its Network
Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network
Novetta
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
Ahmed Banafa
 
Presentazione del Dott. Mangiavacchi_TIDS
Presentazione del Dott. Mangiavacchi_TIDSPresentazione del Dott. Mangiavacchi_TIDS
Presentazione del Dott. Mangiavacchi_TIDS
Nexo Corporation Srl
 
Technologies that will change The Future of Healthcare
Technologies that will change The Future of Healthcare Technologies that will change The Future of Healthcare
Technologies that will change The Future of Healthcare
Shan Sokhanvar (CISM, AWS-SAP, PMP, MCTS)
 
"Developments in Accessibility of Information" - Access Israel 's 6th Annual ...
"Developments in Accessibility of Information" - Access Israel 's 6th Annual ..."Developments in Accessibility of Information" - Access Israel 's 6th Annual ...
"Developments in Accessibility of Information" - Access Israel 's 6th Annual ...
Ricardo Garcia Bahamonde
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
inLabFIB
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
Matthew Rosenquist
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Jack Shaffer
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
University of Geneva
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
siswarren
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber Security
Saqib Chaudhry
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
BlackBerry
 

Similar to CDE Marketplace Sept 2016: CountingLab Ltd (Autonomy & Big Data (20)

BizDay: The Path to The Risk Singularity, RiskStream
BizDay: The Path to The Risk Singularity, RiskStreamBizDay: The Path to The Risk Singularity, RiskStream
BizDay: The Path to The Risk Singularity, RiskStream
 
Big data-analytics-changing-way-organizations-conducting-business
Big data-analytics-changing-way-organizations-conducting-businessBig data-analytics-changing-way-organizations-conducting-business
Big data-analytics-changing-way-organizations-conducting-business
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
Narrative Mind week 1 H4D Stanford 2016
Narrative Mind week 1 H4D Stanford 2016Narrative Mind week 1 H4D Stanford 2016
Narrative Mind week 1 H4D Stanford 2016
 
A_New_Perspective_Whitepaper_05122015
A_New_Perspective_Whitepaper_05122015A_New_Perspective_Whitepaper_05122015
A_New_Perspective_Whitepaper_05122015
 
Narrative Mind Week 3 H4D Stanford 2016
Narrative Mind Week 3 H4D Stanford 2016Narrative Mind Week 3 H4D Stanford 2016
Narrative Mind Week 3 H4D Stanford 2016
 
Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network
Why the DoD Uses Advanced Network-traffic Analytics to Secure its NetworkWhy the DoD Uses Advanced Network-traffic Analytics to Secure its Network
Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
Presentazione del Dott. Mangiavacchi_TIDS
Presentazione del Dott. Mangiavacchi_TIDSPresentazione del Dott. Mangiavacchi_TIDS
Presentazione del Dott. Mangiavacchi_TIDS
 
Technologies that will change The Future of Healthcare
Technologies that will change The Future of Healthcare Technologies that will change The Future of Healthcare
Technologies that will change The Future of Healthcare
 
"Developments in Accessibility of Information" - Access Israel 's 6th Annual ...
"Developments in Accessibility of Information" - Access Israel 's 6th Annual ..."Developments in Accessibility of Information" - Access Israel 's 6th Annual ...
"Developments in Accessibility of Information" - Access Israel 's 6th Annual ...
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber Security
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 

More from Defence and Security Accelerator

DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade Presentation
Defence and Security Accelerator
 
DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation
Defence and Security Accelerator
 
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office Presentation
Defence and Security Accelerator
 
DASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA PresentationDASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA Presentation
Defence and Security Accelerator
 
DASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England PresentationDASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England Presentation
Defence and Security Accelerator
 
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Defence and Security Accelerator
 
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
Defence and Security Accelerator
 
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal
Defence and Security Accelerator
 
27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator 27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator
Defence and Security Accelerator
 
Improving crowd resilience themed competition slides
Improving crowd resilience themed competition slidesImproving crowd resilience themed competition slides
Improving crowd resilience themed competition slides
Defence and Security Accelerator
 
Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1
Defence and Security Accelerator
 
CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2
Defence and Security Accelerator
 
CDE themed comp - synbio part 1
CDE themed comp  - synbio part 1CDE themed comp  - synbio part 1
CDE themed comp - synbio part 1
Defence and Security Accelerator
 
Beyond battery power: future autonomy
Beyond battery power: future autonomy Beyond battery power: future autonomy
Beyond battery power: future autonomy
Defence and Security Accelerator
 
CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...
Defence and Security Accelerator
 
Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2
Defence and Security Accelerator
 
Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1
Defence and Security Accelerator
 
Beyond battery power - how the competition will work
Beyond battery power - how the competition will workBeyond battery power - how the competition will work
Beyond battery power - how the competition will work
Defence and Security Accelerator
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Defence and Security Accelerator
 
CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1
Defence and Security Accelerator
 

More from Defence and Security Accelerator (20)

DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade Presentation
 
DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation
 
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office Presentation
 
DASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA PresentationDASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA Presentation
 
DASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England PresentationDASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England Presentation
 
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
 
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
 
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal
 
27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator 27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator
 
Improving crowd resilience themed competition slides
Improving crowd resilience themed competition slidesImproving crowd resilience themed competition slides
Improving crowd resilience themed competition slides
 
Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1
 
CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2
 
CDE themed comp - synbio part 1
CDE themed comp  - synbio part 1CDE themed comp  - synbio part 1
CDE themed comp - synbio part 1
 
Beyond battery power: future autonomy
Beyond battery power: future autonomy Beyond battery power: future autonomy
Beyond battery power: future autonomy
 
CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...
 
Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2
 
Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1
 
Beyond battery power - how the competition will work
Beyond battery power - how the competition will workBeyond battery power - how the competition will work
Beyond battery power - how the competition will work
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
 
CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

CDE Marketplace Sept 2016: CountingLab Ltd (Autonomy & Big Data

  • 1. Marketplace 2016 Dr Colin Singleton CountingLab Limited
  • 2. CountingLab Translational data science – creating, translating, developing and applying next generation mathematical behavioural data sciences from academia into commercial solutions to solve real world problems.
  • 3. Trustworthiness of information for defence from big data sets: An autonomous approach based on the analysis of the messages’ metadata, linguistic content and spread through social networks • social media events • veracity determination • rapid assessment • autonomous and efficient • social media and modern warfare • containment • communication
  • 5. What next? Real-time, rapid response software system to identify and autonomously and efficiently inform on incidents • automatically identify top stories in a certain area or topic • automatically collect social media content related to those rumours and tag the content with relevant measures • estimate confidence on modelled veracity • provide insight into why some stories should be believed • integrate into existing systems Potential Markets • defence, security, emergency services, financial sector, technology companies, crowd management
  • 6. We’re looking for… • broad awareness of our work generally and this project in particular • potential investors for our software • potential future users of our software • potential buyers of our software • raised awareness of the importance of social media information in the defence and security context