Lockheed Martin F35 Lightning II(Aerodynamics Presentation)SYEDMOEEDHUSSAIN1
Note: For best experience of animation, Proceed in Slide Show Mode Of MS Power Point
Lockheed Martin F35 Lightning II's
1. Brief History
2. Dimensions
3. Concept of Shockwave
4. Drag Coefficient
5. Reynold’s Number
6. Features
7. Capabilities
WHAT RIGHT LOOKED LIKE: M24 Chaffee Light Tanks + Light Infantry (Cavalry) Take Remagen Bridge
The Bridge at Remagen (1969)
youtube.com/watch?v=gN0VqyBqApc
What we Need Today:
combatreform.org/winningcityfights.htm
combatreform.org/lighttanks.htm
BVR combat was, for a long time, dream of both Western and Asian air forces. Today, it seems that the dream has been finally fulfilled; but is that really so?
Describes concepts and development of flying cars and other flying vehicles. Reference are given including to YouTube movies. At the end my view of Main Requirements and the related Design Requirements for a SkyCar are given. The main conclusion is that technologically we are ready to develop and product such a SkyCar in a few years.
For comments please contact me at solo.hermelin@gmail.com.
For more presentations on different subjects visit my website at http://www.solohermelin.com.
MULTI-MISSION DIVERSE-PAYLOAD VEHICLE
The MA THOR Intel is a versatile vehicle used in missions as diverse as remote sensing and mapping, land and maritime border patrol, sea and land search and rescue, long endurance intelligence and reconnaissance, surveillance of oil and gas installations, inspection of natural disasters, ecological work, environmental monitoring, wildlife surveys, precision agriculture aerial mapping, weather monitoring, communications relay, law enforcement, fire fighting, and many other. The vehicle accommodates a large variety of payload.
Lockheed Martin F35 Lightning II(Aerodynamics Presentation)SYEDMOEEDHUSSAIN1
Note: For best experience of animation, Proceed in Slide Show Mode Of MS Power Point
Lockheed Martin F35 Lightning II's
1. Brief History
2. Dimensions
3. Concept of Shockwave
4. Drag Coefficient
5. Reynold’s Number
6. Features
7. Capabilities
WHAT RIGHT LOOKED LIKE: M24 Chaffee Light Tanks + Light Infantry (Cavalry) Take Remagen Bridge
The Bridge at Remagen (1969)
youtube.com/watch?v=gN0VqyBqApc
What we Need Today:
combatreform.org/winningcityfights.htm
combatreform.org/lighttanks.htm
BVR combat was, for a long time, dream of both Western and Asian air forces. Today, it seems that the dream has been finally fulfilled; but is that really so?
Describes concepts and development of flying cars and other flying vehicles. Reference are given including to YouTube movies. At the end my view of Main Requirements and the related Design Requirements for a SkyCar are given. The main conclusion is that technologically we are ready to develop and product such a SkyCar in a few years.
For comments please contact me at solo.hermelin@gmail.com.
For more presentations on different subjects visit my website at http://www.solohermelin.com.
MULTI-MISSION DIVERSE-PAYLOAD VEHICLE
The MA THOR Intel is a versatile vehicle used in missions as diverse as remote sensing and mapping, land and maritime border patrol, sea and land search and rescue, long endurance intelligence and reconnaissance, surveillance of oil and gas installations, inspection of natural disasters, ecological work, environmental monitoring, wildlife surveys, precision agriculture aerial mapping, weather monitoring, communications relay, law enforcement, fire fighting, and many other. The vehicle accommodates a large variety of payload.
PERSISTENT SURVEILLANCE
The lightweight, solar-powered MA THOR SolarLight can loiter above regions under surveillance for several days. The platform uses solar panels on the wings which provide the aircraft with extreme endurance without the need for refuelling. The SolarLight is an ultra-lightweight carbon-fibre aircraft with a wingspan of 10 m but weighing just 70 kg.
Island Air Defence: Challenges, Novel Surveillance Concepts and Advanced Rada...Ashwin Samales
By Yeo Siew Yam, Yeo Jiunn Wah and Henry Yip
The present-day air defence surveillance system is designed to detect threats originating from external airspace in a conventional military conflict, such as one involving multiple fast-flying fighters, helicopters and missiles. However, the operational environment has evolved to be far more challenging and complex over the past decade, with the emergence of stealthier targets that make better use of terrain to avoid detection. At the same time, there is always a desire to see further than the enemy and to obtain more information about the target. This paper aims to identify the inadequacies of the present-day air defence radar system and to propose some novel sensor solutions which include Ultra High Frequency/ Very High Frequency radar, bi-static/multi-static and passive radar, elevated sensors, High Frequency surface wave radar and non-cooperative target recognition techniques. The advantages, challenges and cost effectiveness of these advanced techniques will be analysed to develop a picture of future surveillance systems.
Lt. Col. (USAF) of the Rover team explains the key role of Rover in the "democratization of the battlefield. The Rover system has evolved from video downlink into an interactive system. It allows the ground and air forces to operate significantly differently in what Secretary Wynne called close combat support.
This is a report on ‘drones-an introduction&design’.In this
report I tried to give an introduction about drones or unmanned
aerial vehicles (UAVs) and some preliminary design parameters.
Introduction portion consists of drone history, technology, uses,
and the current generation of drones. Design portion includes
parameters like aerodynamics, payload, endurance, speed and
range, navigation systems and communications.
The State of Drone Security – Analysing 1000+ drone incidents (Mike Monnik) -...DroneSec
Mike Monnik (DroneSec)
Talk Recording: https://www.youtube.com/watch?v=-zuJerGWTWs
The Global Drone Security Network (GDSN) is the only event of its kind focusing on Cyber-UAV security, Drone Threat Intelligence, Counter-UAS, and UTM security. Watch the full recording here: https://www.youtube.com/watch?v=vZ6sRr65cSk
Speaker: https://www.linkedin.com/in/mike-monnik-23026a75/
DroneSec is a cyber-uav security and threat intelligence company who hosted this second series of the GDSN community event.
https://dronesec.com/
stealth-technology-reportstealth-technology-reportstealth-technology-reportstealth-technology-reportstealth-technology-report stealth-technology-reportstealth-technology-reportstealth-technology-reportstealth-technology-reportstealth-technology-reportstealth-technology-reportstealth-technology-report stealth-technology-report . it ill help to understand stealth-technology-report stealth-technology-report stealth-technology-report stealth-technology-report
DRONE TECHNOLOGY PPT, which refers various types of drone385VigneshP
Drones, also known as Unmanned Aerial Vehicles (UAVs), have evolved significantly, becoming integral in various fields. Initially developed for military purposes, drones now find extensive applications in civilian domains, such as agriculture, surveillance, and entertainment. Their ability to operate autonomously or be remotely controlled makes them versatile tools.
In agriculture, drones aid farmers in crop monitoring, pest control, and precision agriculture. Equipped with sensors and cameras, they provide real-time data, optimizing crop yields and resource utilization. In the realm of surveillance, drones enhance security by monitoring large areas, facilitating search and rescue missions, and supporting disaster management.
Commercially, e-commerce companies explore drone delivery services, promising faster and more efficient distribution. The entertainment industry utilizes drones for aerial photography and light shows, creating captivating spectacles. However, these applications raise concerns about privacy, safety, and regulatory frameworks.
Advancements in drone technology include improved battery life, obstacle avoidance systems, and enhanced communication capabilities. Ongoing research focuses on developing swarming capabilities, enabling multiple drones to collaborate seamlessly. Nevertheless, challenges persist, including airspace regulations, public acceptance, and potential misuse.
Drones are poised to continue transforming industries, influencing sectors beyond their initial military applications. As technology progresses, the societal impact of drones will necessitate careful regulation and ethical considerations to harness their potential benefits responsibly.
Drones, also known as Unmanned Aerial Vehicles (UAVs), have evolved significantly, becoming integral in various fields. Initially developed for military purposes, drones now find extensive applications in civilian domains, such as agriculture, surveillance, and entertainment. Their ability to operate autonomously or be remotely controlled makes them versatile tools.
In agriculture, drones aid farmers in crop monitoring, pest control, and precision agriculture. Equipped with sensors and cameras, they provide real-time data, optimizing crop yields and resource utilization. In the realm of surveillance, drones enhance security by monitoring large areas, facilitating search and rescue missions, and supporting disaster management.
Commercially, e-commerce companies explore drone delivery services, promising faster and more efficient distribution. The entertainment industry utilizes drones for aerial photography and light shows, creating captivating spectacles. However, these applications raise concerns about privacy, safety, and regulatory frameworks.
Advancements in drone technology include improved battery life, obstacle avoidance systems, and enhanced communication capabilities. Ongoing research focuses on developing swarming capabilities, enabling multiple drones on.
ALPHA Intelligence is the exclusive agent of CORPRO anti-UAV system, which can do detecting and jamming of drones/UAV. frequency can be customized. welcome to contact Sophie for more technical details.
Similar to Mohawk Maneuver Air Support (MAS) v4.0 (20)
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Mohawk Maneuver Air Support (MAS) v4.0
1. PROPOSAL FOR EMPLOYING "MANEUVER AIR SUPPORT"
CONCEPTS TO PROTECT MAIN SUPPLY ROUTES, PIPELINES,
BORDERS, KEY INFRASTRUCTURE AND COALITION
PERIMETERS ON THE NON-LINEAR BATTLEFIELD OF IRAQ
Charles "Chuck" Myers, I-Cubed LLC, and Mohawk Technologies
June 2004
2. PROBLEM A: BATTLE AGAINST THE EARTH; IRAQ IS
A VERY LARGE COUNTRY THE SIZE OF CALIFORNIA. U.S.
FORCES HAVE 325,000 KILOMETERS OF MSRS TO SECURE
24/7/365 TO SUSTAIN U.S. PRESENCE IN-COUNTRY
3. PROBLEM B: BATTLE AGAINST MAN; 27,000,000 IRAQIS
DIVIDED INTO 3 VIOLENTLY HOSTILE ETHNO-RELIGIOUS
FACTIONS; 6-MONTH “HONEYMOON” OF EUPHORIA OVER
REMOVING SADDAM REGIME IS OVER
4. Oil Pipelines and Facilities
Nassiria - Baghdad gas trunk line 345 km long, 1,020 mm diameter,
compressor station 2 x 10 MW turbine, two gas measurement and
distribution stations.
Baghdad - Basra trunk oil and product pipeline, 250 km long, 584 mm
diameter, four pump stations.
700,000 m3 oil tank farms.
8. MSRs: threat #1: Roadside bombs/command-detonated
land mines
Actual Iraqi Highway to Fallujah
?
?
9. Problem is civilian contractor and military resupply
vehicles are WHEELED and must travel on paved
roads like the tractor-trailers as shown here
Where are the roadside bombs?
Where is the enemy hiding?
?
?
?
10. Without continuous fixed-wing manned aircraft
? surveillance overhead of the roads/shoulders of
Main Supply Routes (MSRs), enemy is free to
place road bombs at will….200+ KIA, 4,000
wounded from just roadside bombs
Enemy has many places along paved roads to “sap” (dig)
underneath the edges and hide explosives or lay bombs in trash on
road edges and detonate when U.S. Convoy passes
11. MSRs Threat #2: Rocket Propelled Grenades (RPGs)
IDF M113
Most wheeled vehicles cannot have sacrificial walls; to protect them we must
detect and suppress/kill RPG men beforehand from the air
12. MANEUVER AIR SUPPORT:
SOLUTION FOR EXPLOITING AIR BATTLE SPACES TO HELP
CONTROL THE GROUND BELOW
OV-1 Mohawk quiet & robust,
armed observation/attack aircraft
to constantly surveil large areas
24/7/365 with humans in the
loop to investigate and verify
suspicious activities
Advanced electro-optical/IR
sensors to aid human vision
for maximum situational
awareness and investigatory
powers possible from the air;
can see at night and in bad
weather robs enemy of
concealment
13. OV-1D Mohawk
The OV-1D is a twin-turbine former U.S. Army fixed-wing tactical observation
and reconnaissance platform with attack capabilities. Mohawk Technologies
has obtained the technical drawings from the company that formerly built and
maintained the airframe, that outlines the installation and testing of various
sensor packages on the aircraft. This data will preclude the need for
extensive certification and FAA approval to get the system ready to start
flying on the several OV-1 Mohawks we already own and operate within the
required six-month timeframe.
14. Upgrading to the EO-IR or hyper-spectral
platform the aircraft will have the following
characteristics:
Airframe Specifications
§ Maximum Speed: 390 knots.
§ Stall Speed: 72 knots.
§ Payload: 1000 lbs.
§ Service Ceiling: 25,000 feet
§ Crew: 2
§ Engines: (2) Lycoming T-53-L701 1400 Shaft Horse Power
§ Internal Fuel: 297 Gallons
§ External Fuel: 300 or 600 Gallons
§ Take off over 50' obstacle: 1,750 feet
§ Landing distance over 50' obstacle: 1,128 feet
§ Rate of Climb: 3,618 feet per minute
§ Range @ 20,000 feet with 10% fuel reserves: 938 N.M.
15. Airframe Equipment
§ Martin Baker MK-J5d Ejection Seats
§ 7 x External stores locations
§ AN/APR-39-44 Countermeasures receiving set
§ AN/ALQ-147 InfraRed CounterMeasures set
§ M-130 Flares and chaff capable
§ IR Gray low-visibility paint scheme
§ UHF-VHF-GPS-TACAN
§ Crew floor armor
§ Engines on top of wings shields heat signature
§ Engines toed-out for 1-engine out performance
§ Mission equipment as required
16. STOL
OV-1 Mohawk’s Short
Take-Off and Landing
enables it to operate from
anywhere in Iraq which
has many short runways
or stretches of highway
18. EO Sensors
The WESCAM MX-20 Sensor Pod
The MX-20 combines high magnification sensors with unsurpassed gyro-
stabilization, making it uniquely suited for surveillance and intelligence applications
over land or over sea. This mil-qualified turret has been designated AN/ASX-4 as
a proven asset recognized by all branches of the U.S. military. The turret's
5-axis gyro-stabilization and 6-axis vibration isolation achieves an
extremely low line-of-sight jitter in both fixed and rotary-wing aircraft. High
quality imagery is provided from the longest possible magnification ranges. The
largest aperture optics and 5 microradian stabilization put the highest resolution
on target.Step zoom lenses provide wider fields of view that allow the user to
perform both long-range surveillance and pinpoint identification without the
need for the aircraft to deviate from its flight path.
19. Specifications
Low magnification 3-chip color continuous zoom EO
o Spectral range - 450-650 nm
o 800 TV lines resolution
o FOV - 30-0.85 degree
o Digitization - 10 bit
· High magnification step zoom EO
o Spectral range - 450-650 nm, 3-chip color, 450-1000nm monochrome
o 570 - 800 TV lines resolution
o FOV - 0.6 - 0.09 degree
o Digitization - 10 bit
· MWIR sensor step zoom
o Spectral range - 3.4- 5 mm
o FOV - 22 - 0.29 degrees
o Sensitivity - 0.030 K
· Turret pointing stability - 5 mrad
· Pixel georeference error - 3m
22. 12 x OV-1s can
surveil hundreds of
square miles 24/7/365
@100 mph faster
speeds and quieter
than helicopters to
pounce on detected
enemies immediately
and relay locations
FLIR and image intensifier
360 degree surveillance
balls already in use on
OV-1 Mohawks
JTACs can laser target mark for guided 2.75” Hydra-70 mm rockets
23. Discussion
Aerocounsel: Chuck Myers
cmyersaero@aol.com
I-Cubed LLC: George Davis
gdavis@i-cubedwv.com
Mohawk Technologies: Paul Pefley
crystapaul@aol.com