Charles F. Day & Associates specializes in leveraging big data and state-of-the-art modeling and simulation for social good. We have developed these capabilities through our Purdue Research Park location in W. Lafayette, IN. Based in part on Intellectual Property developed by Purdue University, and extended through Small Business Innovative Research projects, with additional private development and investments, we have leading edge capabilities in Big Data – either in the technological approaches or in the cost effectiveness of our products.
In an era of shrinking public resources and complex and persistent policy changes, CFDay provides decision makers with the ability to develop and utilize actionable intelligence to make data-informed decisions and monitor real-time impacts of policy changes.
By leveraging leading-edge technology, CFDay targets policy and action interventions and provide comprehensive information to identify what interventions are needed, how to best apply, and measure the results. By modeling the impacts of the interventions prior to implementation, decision makers eliminate the need for costly and time-consuming policy experiments.
The document discusses proposals for strengthening cybersecurity of US government and critical infrastructure. It recommends developing a robust cyber policy, securing federal networks, and engaging internationally. The government needs to work with critical infrastructure owners to assess threats, develop protective measures, and integrate intelligence sharing. Research should promote secure infrastructure design and modeling of incident impacts. Communication systems must enable real-time information access across government levels using accurate data.
Introduction to National Critical Infrastructure Cyber Security: Background a...Jack Whitsitt
Given at SOURCE Boston 2013, this presentation is one of the only places you will find the conceptual and policy underpinnings of U.S. national cyber security and critical infrastructure protection efforts and information about the recent White House Cyber Executive Order
Cyber risk challenge and the role of insuranceMunich Re
This document summarizes a presentation on cyber risk challenges and the role of insurance. It discusses how the exponential growth of technology has led to growing cyber exposures. Cyber risks are different from traditional risks because exposure grows unexpectedly with new technologies, and customer perception of risk changes rapidly with each technology cycle. This drives demand for cyber insurance to also evolve quickly. The insurance market for cyber risk is estimated to grow exponentially from $3-3.2 billion currently to $6-8 billion by 2020. The presentation outlines key challenges for insurers in pricing, risk assessment, and claims handling in this dynamic environment. It proposes tools and services insurers can provide to help clients manage cyber risks and accumulation scenarios.
Il World Energy Focus, nuovo mensile online della WEC's community, una e-publication gratuita per essere sempre aggiornato sugli sviluppi del settore energetico. Il World Energy Focus contiene news, interviste esclusive e uno spazio dedicato agli eventi promossi dai singoli Comitati Nazionali.
Smart Sensors and the Evolution of Holistic, Personalized Wellness Ashok Nare
Smart Sensors and the Evolution of Holistic, Personalized Wellness - a presentation by Ashok Nare, Founder & CEO of Kollabio, at the Heart & Stroke Innovation Forum in New York.
Today's threats demand a more active role in detecting and isolating sophisticated attacks. This must-see presentation provides practical guidance on modernizing your SOC and building out an effective threat hunting program. Ed Amoroso and David Bianco discuss best practices for developing and staffing a modern SOC, including the essential shifts in how to think about threat detection.
Watch the presentation with audio here: http://info.sqrrl.com/webinar-modernizing-your-security-operations
“Fairness Cases as an Accelerant and Enabler for Cognitive Assistance Adoption”diannepatricia
Chuck Howell, Chief Engineer for Intelligence Programs and Integration at the MITRE Corporation, presentation “Fairness Cases as an Accelerant and Enabler for Cognitive Assistance Adoption” as part of the Cognitive Systems Institute Speaker Series.
1) The document discusses various AI technologies like machine learning, deep learning, natural language processing and how they are being applied across industries for tasks like predictive analytics, automation, translation, and more.
2) Use cases are provided that demonstrate how companies are using AI to improve operations, customer experiences, and gain insights. This includes improving knowledge retention, personalized healthcare, space exploration collaboration, predictive maintenance, and more.
3) The role of the CIO is expected to shift dramatically over the next 2-3 years as AI becomes both a tool and enabler. CIOs will need to embrace practices like cross-functional teams, continuous planning, a data-driven view, and dedicating resources to agility
The document discusses proposals for strengthening cybersecurity of US government and critical infrastructure. It recommends developing a robust cyber policy, securing federal networks, and engaging internationally. The government needs to work with critical infrastructure owners to assess threats, develop protective measures, and integrate intelligence sharing. Research should promote secure infrastructure design and modeling of incident impacts. Communication systems must enable real-time information access across government levels using accurate data.
Introduction to National Critical Infrastructure Cyber Security: Background a...Jack Whitsitt
Given at SOURCE Boston 2013, this presentation is one of the only places you will find the conceptual and policy underpinnings of U.S. national cyber security and critical infrastructure protection efforts and information about the recent White House Cyber Executive Order
Cyber risk challenge and the role of insuranceMunich Re
This document summarizes a presentation on cyber risk challenges and the role of insurance. It discusses how the exponential growth of technology has led to growing cyber exposures. Cyber risks are different from traditional risks because exposure grows unexpectedly with new technologies, and customer perception of risk changes rapidly with each technology cycle. This drives demand for cyber insurance to also evolve quickly. The insurance market for cyber risk is estimated to grow exponentially from $3-3.2 billion currently to $6-8 billion by 2020. The presentation outlines key challenges for insurers in pricing, risk assessment, and claims handling in this dynamic environment. It proposes tools and services insurers can provide to help clients manage cyber risks and accumulation scenarios.
Il World Energy Focus, nuovo mensile online della WEC's community, una e-publication gratuita per essere sempre aggiornato sugli sviluppi del settore energetico. Il World Energy Focus contiene news, interviste esclusive e uno spazio dedicato agli eventi promossi dai singoli Comitati Nazionali.
Smart Sensors and the Evolution of Holistic, Personalized Wellness Ashok Nare
Smart Sensors and the Evolution of Holistic, Personalized Wellness - a presentation by Ashok Nare, Founder & CEO of Kollabio, at the Heart & Stroke Innovation Forum in New York.
Today's threats demand a more active role in detecting and isolating sophisticated attacks. This must-see presentation provides practical guidance on modernizing your SOC and building out an effective threat hunting program. Ed Amoroso and David Bianco discuss best practices for developing and staffing a modern SOC, including the essential shifts in how to think about threat detection.
Watch the presentation with audio here: http://info.sqrrl.com/webinar-modernizing-your-security-operations
“Fairness Cases as an Accelerant and Enabler for Cognitive Assistance Adoption”diannepatricia
Chuck Howell, Chief Engineer for Intelligence Programs and Integration at the MITRE Corporation, presentation “Fairness Cases as an Accelerant and Enabler for Cognitive Assistance Adoption” as part of the Cognitive Systems Institute Speaker Series.
1) The document discusses various AI technologies like machine learning, deep learning, natural language processing and how they are being applied across industries for tasks like predictive analytics, automation, translation, and more.
2) Use cases are provided that demonstrate how companies are using AI to improve operations, customer experiences, and gain insights. This includes improving knowledge retention, personalized healthcare, space exploration collaboration, predictive maintenance, and more.
3) The role of the CIO is expected to shift dramatically over the next 2-3 years as AI becomes both a tool and enabler. CIOs will need to embrace practices like cross-functional teams, continuous planning, a data-driven view, and dedicating resources to agility
Learn from the experts! Tune into this webinar to hear Doug Copley, Deputy CISO/Security & Privacy Strategist for Forcepoint, talk about What It Takes to be a CISO in 2017: expectations, challenges, partnerships, the roadmap,critical activities and more.
CWIN17 New-York / earning the currency of trustCapgemini
This document discusses trends in cybersecurity and outlines Capgemini's cybersecurity portfolio. It notes that only 29% of organizations have strong data privacy policies and security frameworks in place. It also discusses evolving risks like regulatory pressure, digital transformation trends, and increasingly sophisticated cyber attacks. The document outlines Capgemini's managed security operations center (SOC) services and deployment options. It provides an overview of the upcoming GDPR regulations and principles of security and privacy, emphasizing the importance of trust, data governance, and monitoring cyber risks in real-time.
Smart Data Slides: Machine Learning - Case StudiesDATAVERSITY
The state of the art and practice for machine learning (ML) has matured rapidly in the past 3 years, making it an ideal time to take a look at what works and what doesn’t.
In this webinar, we will review case studies from 3 industries:
-Insurance
-Healthcare
-Pharma
Participants will learn to look for characteristics of business processes and of data that make them well - or ill - suited to augmentation or automation with ML.
This document discusses building risk scenarios. It provides examples of using risk scenario analysis for proactive risk assessments, audits, and management inquiries. It outlines steps for scoping a risk scenario, including identifying threats, assets, events, controls and assumptions. Data sources that can inform the analysis are described, such as private organizational data, industry reports, audits, and security tools. The webinar is the second in a three part series on scenario based risk analysis.
IQPC Enterprise IT Security Exchange, March 10, 2013
This presentation looks at the risks and rewards and security and privacy implications of Big Data Analytics.
The document discusses improving collaboration within and between organizations. It introduces a Collaboration Maturity Model that provides a scale to describe the nature and efficacy of interactions, from "conflicted" to "coordinated" to "collaborative" to "agile." The model considers factors like information distribution, shared awareness and understanding, and decision rights. The document suggests applying the model to better understand collaboration in situations like remote teams, virtual partnerships, and outsourced work.
Advanced Analytics for Investment Firms and Machine LearningCloudera, Inc.
Learn how Cloudera Data Science Workbench helps you to:
Accelerate analytics projects from data exploration to production
Create a self-service data science platform
Deploy your models faster and share them with other data scientists
Included
SLEPT FACTORS
Social and legal factors
Economic and competitive factors
Political factors
E-government
Technological innovation and technology assessment
E-commerce and globalization
SHORT TERMS RELATED TO ECOMMERCE
REFERENCES: E-Business and E-Commerce Management Strategy, Implementation and Practice by Dave Chaffey
Presentation slides used for OECD Tokyo conference, explaining how Japanese insurance community tacke insurtech and the big picture for future of insurtech
The document discusses various risks faced by foreign investors in emerging markets, including political, economic, and policy risks. It provides examples of how policy risks, such as changes to regulations or failure to enforce contracts, can impact returns on investments. Additionally, the document outlines challenges in hedging against policy risks and recommends strategies foreign investors can use to manage risks, including building political influence and relationships, gathering intelligence on local conditions, and using analytical tools to model policy outcomes and identify leverage points. Overall, the document advocates that foreign investors can make emerging market investments more manageable by properly recognizing dynamic risks and implementing tailored risk management strategies.
Data Collaboration in Healthcare -- presented at VLDB 2018Anand Deshpande
These are the slides from my VLDB 2018 presentation.
Shares what we are doing in healthcare and also shares research opportunities in data and healthcare.
Ethical, Social, and Political Issues in E-commerceNor Ayuzi Deraman
Internet, like other technologies, can:
Enable new crimes
Affect environment
Threaten social values
Costs and benefits must be carefully considered, especially when there are no clear-cut legal or cultural guidelines
ERM partnered with a range of leading experts and institutions in June 2019 to bring the latest ESG and sustainability information to the Asian markets. Partners in this tour included, the Stock Exchange of Thailand (SET); Hong Kong Stock Exchange (HKEX); Bloomberg; Citi; Robeco; The Economist; and CDP.
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...University of Maribor
Slides from talk:
Aleš Zamuda: Remote Sensing and Computational, Evolutionary, Supercomputing, and Intelligent Systems.
11th International Conference on Electrical, Electronics and Computer Engineering (IcETRAN), Niš, 3-6 June 2024
Inter-Society Networking Panel GRSS/MTT-S/CIS Panel Session: Promoting Connection and Cooperation
https://www.etran.rs/2024/en/home-english/
Learn from the experts! Tune into this webinar to hear Doug Copley, Deputy CISO/Security & Privacy Strategist for Forcepoint, talk about What It Takes to be a CISO in 2017: expectations, challenges, partnerships, the roadmap,critical activities and more.
CWIN17 New-York / earning the currency of trustCapgemini
This document discusses trends in cybersecurity and outlines Capgemini's cybersecurity portfolio. It notes that only 29% of organizations have strong data privacy policies and security frameworks in place. It also discusses evolving risks like regulatory pressure, digital transformation trends, and increasingly sophisticated cyber attacks. The document outlines Capgemini's managed security operations center (SOC) services and deployment options. It provides an overview of the upcoming GDPR regulations and principles of security and privacy, emphasizing the importance of trust, data governance, and monitoring cyber risks in real-time.
Smart Data Slides: Machine Learning - Case StudiesDATAVERSITY
The state of the art and practice for machine learning (ML) has matured rapidly in the past 3 years, making it an ideal time to take a look at what works and what doesn’t.
In this webinar, we will review case studies from 3 industries:
-Insurance
-Healthcare
-Pharma
Participants will learn to look for characteristics of business processes and of data that make them well - or ill - suited to augmentation or automation with ML.
This document discusses building risk scenarios. It provides examples of using risk scenario analysis for proactive risk assessments, audits, and management inquiries. It outlines steps for scoping a risk scenario, including identifying threats, assets, events, controls and assumptions. Data sources that can inform the analysis are described, such as private organizational data, industry reports, audits, and security tools. The webinar is the second in a three part series on scenario based risk analysis.
IQPC Enterprise IT Security Exchange, March 10, 2013
This presentation looks at the risks and rewards and security and privacy implications of Big Data Analytics.
The document discusses improving collaboration within and between organizations. It introduces a Collaboration Maturity Model that provides a scale to describe the nature and efficacy of interactions, from "conflicted" to "coordinated" to "collaborative" to "agile." The model considers factors like information distribution, shared awareness and understanding, and decision rights. The document suggests applying the model to better understand collaboration in situations like remote teams, virtual partnerships, and outsourced work.
Advanced Analytics for Investment Firms and Machine LearningCloudera, Inc.
Learn how Cloudera Data Science Workbench helps you to:
Accelerate analytics projects from data exploration to production
Create a self-service data science platform
Deploy your models faster and share them with other data scientists
Included
SLEPT FACTORS
Social and legal factors
Economic and competitive factors
Political factors
E-government
Technological innovation and technology assessment
E-commerce and globalization
SHORT TERMS RELATED TO ECOMMERCE
REFERENCES: E-Business and E-Commerce Management Strategy, Implementation and Practice by Dave Chaffey
Presentation slides used for OECD Tokyo conference, explaining how Japanese insurance community tacke insurtech and the big picture for future of insurtech
The document discusses various risks faced by foreign investors in emerging markets, including political, economic, and policy risks. It provides examples of how policy risks, such as changes to regulations or failure to enforce contracts, can impact returns on investments. Additionally, the document outlines challenges in hedging against policy risks and recommends strategies foreign investors can use to manage risks, including building political influence and relationships, gathering intelligence on local conditions, and using analytical tools to model policy outcomes and identify leverage points. Overall, the document advocates that foreign investors can make emerging market investments more manageable by properly recognizing dynamic risks and implementing tailored risk management strategies.
Data Collaboration in Healthcare -- presented at VLDB 2018Anand Deshpande
These are the slides from my VLDB 2018 presentation.
Shares what we are doing in healthcare and also shares research opportunities in data and healthcare.
Ethical, Social, and Political Issues in E-commerceNor Ayuzi Deraman
Internet, like other technologies, can:
Enable new crimes
Affect environment
Threaten social values
Costs and benefits must be carefully considered, especially when there are no clear-cut legal or cultural guidelines
ERM partnered with a range of leading experts and institutions in June 2019 to bring the latest ESG and sustainability information to the Asian markets. Partners in this tour included, the Stock Exchange of Thailand (SET); Hong Kong Stock Exchange (HKEX); Bloomberg; Citi; Robeco; The Economist; and CDP.
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...University of Maribor
Slides from talk:
Aleš Zamuda: Remote Sensing and Computational, Evolutionary, Supercomputing, and Intelligent Systems.
11th International Conference on Electrical, Electronics and Computer Engineering (IcETRAN), Niš, 3-6 June 2024
Inter-Society Networking Panel GRSS/MTT-S/CIS Panel Session: Promoting Connection and Cooperation
https://www.etran.rs/2024/en/home-english/
Authoring a personal GPT for your research and practice: How we created the Q...Leonel Morgado
Thematic analysis in qualitative research is a time-consuming and systematic task, typically done using teams. Team members must ground their activities on common understandings of the major concepts underlying the thematic analysis, and define criteria for its development. However, conceptual misunderstandings, equivocations, and lack of adherence to criteria are challenges to the quality and speed of this process. Given the distributed and uncertain nature of this process, we wondered if the tasks in thematic analysis could be supported by readily available artificial intelligence chatbots. Our early efforts point to potential benefits: not just saving time in the coding process but better adherence to criteria and grounding, by increasing triangulation between humans and artificial intelligence. This tutorial will provide a description and demonstration of the process we followed, as two academic researchers, to develop a custom ChatGPT to assist with qualitative coding in the thematic data analysis process of immersive learning accounts in a survey of the academic literature: QUAL-E Immersive Learning Thematic Analysis Helper. In the hands-on time, participants will try out QUAL-E and develop their ideas for their own qualitative coding ChatGPT. Participants that have the paid ChatGPT Plus subscription can create a draft of their assistants. The organizers will provide course materials and slide deck that participants will be able to utilize to continue development of their custom GPT. The paid subscription to ChatGPT Plus is not required to participate in this workshop, just for trying out personal GPTs during it.
Immersive Learning That Works: Research Grounding and Paths ForwardLeonel Morgado
We will metaverse into the essence of immersive learning, into its three dimensions and conceptual models. This approach encompasses elements from teaching methodologies to social involvement, through organizational concerns and technologies. Challenging the perception of learning as knowledge transfer, we introduce a 'Uses, Practices & Strategies' model operationalized by the 'Immersive Learning Brain' and ‘Immersion Cube’ frameworks. This approach offers a comprehensive guide through the intricacies of immersive educational experiences and spotlighting research frontiers, along the immersion dimensions of system, narrative, and agency. Our discourse extends to stakeholders beyond the academic sphere, addressing the interests of technologists, instructional designers, and policymakers. We span various contexts, from formal education to organizational transformation to the new horizon of an AI-pervasive society. This keynote aims to unite the iLRN community in a collaborative journey towards a future where immersive learning research and practice coalesce, paving the way for innovative educational research and practice landscapes.
The cost of acquiring information by natural selectionCarl Bergstrom
This is a short talk that I gave at the Banff International Research Station workshop on Modeling and Theory in Population Biology. The idea is to try to understand how the burden of natural selection relates to the amount of information that selection puts into the genome.
It's based on the first part of this research paper:
The cost of information acquisition by natural selection
Ryan Seamus McGee, Olivia Kosterlitz, Artem Kaznatcheev, Benjamin Kerr, Carl T. Bergstrom
bioRxiv 2022.07.02.498577; doi: https://doi.org/10.1101/2022.07.02.498577
When I was asked to give a companion lecture in support of ‘The Philosophy of Science’ (https://shorturl.at/4pUXz) I decided not to walk through the detail of the many methodologies in order of use. Instead, I chose to employ a long standing, and ongoing, scientific development as an exemplar. And so, I chose the ever evolving story of Thermodynamics as a scientific investigation at its best.
Conducted over a period of >200 years, Thermodynamics R&D, and application, benefitted from the highest levels of professionalism, collaboration, and technical thoroughness. New layers of application, methodology, and practice were made possible by the progressive advance of technology. In turn, this has seen measurement and modelling accuracy continually improved at a micro and macro level.
Perhaps most importantly, Thermodynamics rapidly became a primary tool in the advance of applied science/engineering/technology, spanning micro-tech, to aerospace and cosmology. I can think of no better a story to illustrate the breadth of scientific methodologies and applications at their best.
The technology uses reclaimed CO₂ as the dyeing medium in a closed loop process. When pressurized, CO₂ becomes supercritical (SC-CO₂). In this state CO₂ has a very high solvent power, allowing the dye to dissolve easily.
The debris of the ‘last major merger’ is dynamically youngSérgio Sacani
The Milky Way’s (MW) inner stellar halo contains an [Fe/H]-rich component with highly eccentric orbits, often referred to as the
‘last major merger.’ Hypotheses for the origin of this component include Gaia-Sausage/Enceladus (GSE), where the progenitor
collided with the MW proto-disc 8–11 Gyr ago, and the Virgo Radial Merger (VRM), where the progenitor collided with the
MW disc within the last 3 Gyr. These two scenarios make different predictions about observable structure in local phase space,
because the morphology of debris depends on how long it has had to phase mix. The recently identified phase-space folds in Gaia
DR3 have positive caustic velocities, making them fundamentally different than the phase-mixed chevrons found in simulations
at late times. Roughly 20 per cent of the stars in the prograde local stellar halo are associated with the observed caustics. Based
on a simple phase-mixing model, the observed number of caustics are consistent with a merger that occurred 1–2 Gyr ago.
We also compare the observed phase-space distribution to FIRE-2 Latte simulations of GSE-like mergers, using a quantitative
measurement of phase mixing (2D causticality). The observed local phase-space distribution best matches the simulated data
1–2 Gyr after collision, and certainly not later than 3 Gyr. This is further evidence that the progenitor of the ‘last major merger’
did not collide with the MW proto-disc at early times, as is thought for the GSE, but instead collided with the MW disc within
the last few Gyr, consistent with the body of work surrounding the VRM.
The binding of cosmological structures by massless topological defectsSérgio Sacani
Assuming spherical symmetry and weak field, it is shown that if one solves the Poisson equation or the Einstein field
equations sourced by a topological defect, i.e. a singularity of a very specific form, the result is a localized gravitational
field capable of driving flat rotation (i.e. Keplerian circular orbits at a constant speed for all radii) of test masses on a thin
spherical shell without any underlying mass. Moreover, a large-scale structure which exploits this solution by assembling
concentrically a number of such topological defects can establish a flat stellar or galactic rotation curve, and can also deflect
light in the same manner as an equipotential (isothermal) sphere. Thus, the need for dark matter or modified gravity theory is
mitigated, at least in part.
Phenomics assisted breeding in crop improvementIshaGoswami9
As the population is increasing and will reach about 9 billion upto 2050. Also due to climate change, it is difficult to meet the food requirement of such a large population. Facing the challenges presented by resource shortages, climate
change, and increasing global population, crop yield and quality need to be improved in a sustainable way over the coming decades. Genetic improvement by breeding is the best way to increase crop productivity. With the rapid progression of functional
genomics, an increasing number of crop genomes have been sequenced and dozens of genes influencing key agronomic traits have been identified. However, current genome sequence information has not been adequately exploited for understanding
the complex characteristics of multiple gene, owing to a lack of crop phenotypic data. Efficient, automatic, and accurate technologies and platforms that can capture phenotypic data that can
be linked to genomics information for crop improvement at all growth stages have become as important as genotyping. Thus,
high-throughput phenotyping has become the major bottleneck restricting crop breeding. Plant phenomics has been defined as the high-throughput, accurate acquisition and analysis of multi-dimensional phenotypes
during crop growing stages at the organism level, including the cell, tissue, organ, individual plant, plot, and field levels. With the rapid development of novel sensors, imaging technology,
and analysis methods, numerous infrastructure platforms have been developed for phenotyping.
Current Ms word generated power point presentation covers major details about the micronuclei test. It's significance and assays to conduct it. It is used to detect the micronuclei formation inside the cells of nearly every multicellular organism. It's formation takes place during chromosomal sepration at metaphase.
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...Sérgio Sacani
Context. With a mass exceeding several 104 M⊙ and a rich and dense population of massive stars, supermassive young star clusters
represent the most massive star-forming environment that is dominated by the feedback from massive stars and gravitational interactions
among stars.
Aims. In this paper we present the Extended Westerlund 1 and 2 Open Clusters Survey (EWOCS) project, which aims to investigate
the influence of the starburst environment on the formation of stars and planets, and on the evolution of both low and high mass stars.
The primary targets of this project are Westerlund 1 and 2, the closest supermassive star clusters to the Sun.
Methods. The project is based primarily on recent observations conducted with the Chandra and JWST observatories. Specifically,
the Chandra survey of Westerlund 1 consists of 36 new ACIS-I observations, nearly co-pointed, for a total exposure time of 1 Msec.
Additionally, we included 8 archival Chandra/ACIS-S observations. This paper presents the resulting catalog of X-ray sources within
and around Westerlund 1. Sources were detected by combining various existing methods, and photon extraction and source validation
were carried out using the ACIS-Extract software.
Results. The EWOCS X-ray catalog comprises 5963 validated sources out of the 9420 initially provided to ACIS-Extract, reaching a
photon flux threshold of approximately 2 × 10−8 photons cm−2
s
−1
. The X-ray sources exhibit a highly concentrated spatial distribution,
with 1075 sources located within the central 1 arcmin. We have successfully detected X-ray emissions from 126 out of the 166 known
massive stars of the cluster, and we have collected over 71 000 photons from the magnetar CXO J164710.20-455217.