COMP 4010 Lecture 6 on Virtual Reality. This time focusing on Interaction Design for VR and rapid prototyping tools. Taught by Bruce Thomas at the University of South Australia on September 3rd 2019. Slides by Mark Billinghurst
In accordance with the present dependence on UAVs and Drones, these Unmanned Aerial Vehicles have proved them a great asset. These UAVs are expected to serve a great role in almost every field like military, agriculture, police, disaster management, industrial management, educational field etc. in the coming future which has been described in the given slides.
Civil aviation has, traditionally, been based on the notion of a pilot operating the aircraft from within the aircraft itself and more often than not with passengers on board. Rapid technological innovations have enabled pilotless aircraft which can be designed for specific applications that require precision or long duration which have been considered near impossible hitherto.
These aircraft also enable applications considered dull, dirty or dangerous, in other words, tasks that entail monotony or hazard for the pilot of a manned aircraft. Such pilotless aircraft make use of a ground-based or pre-programmed automatic controllers to manoeuvre the aircraft in flight and are generally termed as drones, although a better term is Unmanned Aerial Systems (UAS).
Traditionally, drones had been limited to military use due to high costs and technical sophistication. However, there is a far broader scope for UAS use, including, inter alia, commercial, scientific and security applications. These potential applications have driven innovations in UAS technology; especially in areas of control, navigation and energy storage; which have provided consumers with suitably small-sized cutting-edge products that are easy to operate and maintain at affordable prices. Today, due to economies of scale, consumers can purchase drones for less than a thousand rupees. Even sophisticated drones with advanced cameras and sensors are available for under fifty thousand rupees. Large aircraft manufacturers such as Boeing and Airbus, on the other hand, are investing billions of dollars in building pilotless aircraft that are regarded safe enough for passenger long-distance intercontinental trips.
The main goal of building a Concept of Operations for India on the way to a thriving drone ecosystem in India was to allow consistent policymaking that would guide technological standards in the near future. We intend to establish a discussion with stakeholders and continue to improve our vision by holding Open House Sessions.
Guiding Principles, Specs, Key Resources: https://sayandeep-ai.github.io/pushpaka/work-items/i01/
Entire Playlist of the Open House Recordings: https://youtube.com/playlist?list=PL9dBcOUIsjz8FNN_FesZiD2WlFAQW-I01
COMP 4010 Lecture 6 on Virtual Reality. This time focusing on Interaction Design for VR and rapid prototyping tools. Taught by Bruce Thomas at the University of South Australia on September 3rd 2019. Slides by Mark Billinghurst
In accordance with the present dependence on UAVs and Drones, these Unmanned Aerial Vehicles have proved them a great asset. These UAVs are expected to serve a great role in almost every field like military, agriculture, police, disaster management, industrial management, educational field etc. in the coming future which has been described in the given slides.
Civil aviation has, traditionally, been based on the notion of a pilot operating the aircraft from within the aircraft itself and more often than not with passengers on board. Rapid technological innovations have enabled pilotless aircraft which can be designed for specific applications that require precision or long duration which have been considered near impossible hitherto.
These aircraft also enable applications considered dull, dirty or dangerous, in other words, tasks that entail monotony or hazard for the pilot of a manned aircraft. Such pilotless aircraft make use of a ground-based or pre-programmed automatic controllers to manoeuvre the aircraft in flight and are generally termed as drones, although a better term is Unmanned Aerial Systems (UAS).
Traditionally, drones had been limited to military use due to high costs and technical sophistication. However, there is a far broader scope for UAS use, including, inter alia, commercial, scientific and security applications. These potential applications have driven innovations in UAS technology; especially in areas of control, navigation and energy storage; which have provided consumers with suitably small-sized cutting-edge products that are easy to operate and maintain at affordable prices. Today, due to economies of scale, consumers can purchase drones for less than a thousand rupees. Even sophisticated drones with advanced cameras and sensors are available for under fifty thousand rupees. Large aircraft manufacturers such as Boeing and Airbus, on the other hand, are investing billions of dollars in building pilotless aircraft that are regarded safe enough for passenger long-distance intercontinental trips.
The main goal of building a Concept of Operations for India on the way to a thriving drone ecosystem in India was to allow consistent policymaking that would guide technological standards in the near future. We intend to establish a discussion with stakeholders and continue to improve our vision by holding Open House Sessions.
Guiding Principles, Specs, Key Resources: https://sayandeep-ai.github.io/pushpaka/work-items/i01/
Entire Playlist of the Open House Recordings: https://youtube.com/playlist?list=PL9dBcOUIsjz8FNN_FesZiD2WlFAQW-I01
Power Presentation on UAVs.Basically covering all the informative topics related to UAVs.Starting from different terminology and ending up to future vision and advantages.
It is actually a fully made presentation one can directly use to present it.It contains pictures so by the use of it one can able to understand each and every line in the particular slide.
Drones and their Increasing Number of ApplicationsJeffrey Funk
These slides use concepts from my (Jeff Funk) course entitled analyzing hi-tech opportunities to analyze how drones are becoming economic feasible for an increasing number of applications as their costs fall. The costs of drones are falling as the costs of various ICs (controllers, GPS) and MEMS sensors rapidly fall, their performance rises (e.g., accuracy of GPS) and as the cost of carbon fibers fall at a somewhat slower pace than do ICs and MEMS. These falling costs are making drones economically feasible for a number of applications such as producing movies, TV reporting, surveillance, and delivery.
Turla is a very old and prolific threat group that has been attributed to the Federal Security Services (FSB) of Russia publicly by a foreign intelligence agency. Operating since the late 90s, they have compromised major government entities with a heavy focus on embassies and former Soviet states. In this talk, I will detail the immense capabilities of Turla, which include use of Satellite networks for infrastructure and the ability to stay undiscovered on victim networks for several years. And with Russia actively engaged in open warfare in Ukraine, it's important for all organizations to stay informed and prepared against this specific threat group.
Red vs Blue- Modern Atice Directory Attacks, Detection & Protection by Sean M...Shakacon
While Kerberos "Golden Tickets" and "Silver Tickets" received a lot of press in the second half of 2014, there hasn't been much detail provided on how exactly they work, why they are successful, and how to mitigate them (other than: "don't get pwned"). Golden Tickets are the ultimate method for persistent, forever AD admin rights to a network since they are valid Kerberos tickets and can't be detected, right?
This talk covers the latest Active Directory attack vectors and describes how to detect Golden Ticket usage. Provided are key indicators that can detect Kerberos attacks on your network, including Golden tickets, Silver tickets & MS14-068 exploitation, as well as methods to identify, mitigate, and prevent common Active Directory attack vectors. When forged Kerberos tickets are used in AD, there are some interesting artifacts that can be identified. Yes, despite what you may have read on the internet, there are ways to detect Golden & Silver Ticket usage!
Some of the topics covered:
How attackers go from zero to (Domain) Admin
MS14-068: the vulnerability, the exploit, and the danger
"SPN Scanning" with PowerShell to identify potential targets without network scans (SQL, Exchange, FIM, webservers, etc.)
Exploiting weak service account passwords as a regular AD user
Mimikatz, the attacker's multi-tool
Using Silver Tickets for stealthy persistence that won’t be detected (until now)
Identifying forged Kerberos tickets (Golden & Silver Tickets) on your network
Detecting offensive PowerShell tools like Invoke-Mimikatz
Active Directory attack mitigation
Kerberos expertise is not required since the presentation covers how Active Directory leverages Kerberos for authentication identifying the areas useful for attack. Information presented is useful for both Red Team & Blue Team members as well as AD administrators.
Pentesting react native application for fun and profit - Abdullahidsecconf
React Native merupakan framework yang digunakan untuk membuat aplikasi mobile baik itu Android maupun IOS (multi platform). Framework ini memungkinkan developer untuk membuat aplikasi untuk berbagai platform dengan menggunakan basis kode yang sama, yaitu JavaScript.
Dikarenakan aplikasi ini berbasis JavaScript (client side), banyak developer yang tidak memperhatikan celah keamanan pada aplikasi. Terdapat berbagai macam celah keamanan meliputi client side dan server side. Presentasi ini memuat pengalaman saya dalam menemukan celah keamanan pada saat melakukan Penetration Testing pada aplikasi mobile berbasis React Native
Drones, Drones in India, Rules for Flying a Drone in India (Regulatory Policies), Drone Categories in India, Drone Policies of Government of India, Draft Drone Policy 2.0, Salient Features of Draft Drone Policy 2.0
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016Frans Rosén
Frans Rosén has reported hundreds of security issues using his big white hat since 2012. He have recieved the biggest bounty ever paid on HackerOne, and is one of the highest ranked bug bounty researchers of all time. He's been bug bounty hunting with an iPhone in Thailand, in a penthouse suite in Las Vegas and without even being present using automation. He'll share his stories about how to act when a company's CISO is screaming "SH******T F*CK" in a phone call 02:30 a Friday night, what to do when companies are sending him money without any reason and why Doctors without Borders are trying to hunt him down.
The fundamentals of Android and iOS app securityNowSecure
Looking for a high-intensity bootcamp covering the basics of secure mobile development? This slideshare was originally presented by mobile security expert and NowSecure CEO Andrew Hoog for a 60-minute workshop at Security by Design covering the following topics:
+ Introduction to identifying security flaws in mobile apps (and how to avoid them)
+ Examples of secure and insecure mobile apps and how to secure them
+ Overview of secure mobile development based on the NowSecure Secure Mobile Development Best Practices
InduSoft Web Studio provides several features to increase your productivity when designing, developing, deploying, and maintaining HMI/SCADA applications. The “Custom Properties” (also known as “Mnemonics”) allow you to re-use graphical Symbols or even entire screens and dynamically assign different data sources (tags) to them based on the current context.
Power Presentation on UAVs.Basically covering all the informative topics related to UAVs.Starting from different terminology and ending up to future vision and advantages.
It is actually a fully made presentation one can directly use to present it.It contains pictures so by the use of it one can able to understand each and every line in the particular slide.
Drones and their Increasing Number of ApplicationsJeffrey Funk
These slides use concepts from my (Jeff Funk) course entitled analyzing hi-tech opportunities to analyze how drones are becoming economic feasible for an increasing number of applications as their costs fall. The costs of drones are falling as the costs of various ICs (controllers, GPS) and MEMS sensors rapidly fall, their performance rises (e.g., accuracy of GPS) and as the cost of carbon fibers fall at a somewhat slower pace than do ICs and MEMS. These falling costs are making drones economically feasible for a number of applications such as producing movies, TV reporting, surveillance, and delivery.
Turla is a very old and prolific threat group that has been attributed to the Federal Security Services (FSB) of Russia publicly by a foreign intelligence agency. Operating since the late 90s, they have compromised major government entities with a heavy focus on embassies and former Soviet states. In this talk, I will detail the immense capabilities of Turla, which include use of Satellite networks for infrastructure and the ability to stay undiscovered on victim networks for several years. And with Russia actively engaged in open warfare in Ukraine, it's important for all organizations to stay informed and prepared against this specific threat group.
Red vs Blue- Modern Atice Directory Attacks, Detection & Protection by Sean M...Shakacon
While Kerberos "Golden Tickets" and "Silver Tickets" received a lot of press in the second half of 2014, there hasn't been much detail provided on how exactly they work, why they are successful, and how to mitigate them (other than: "don't get pwned"). Golden Tickets are the ultimate method for persistent, forever AD admin rights to a network since they are valid Kerberos tickets and can't be detected, right?
This talk covers the latest Active Directory attack vectors and describes how to detect Golden Ticket usage. Provided are key indicators that can detect Kerberos attacks on your network, including Golden tickets, Silver tickets & MS14-068 exploitation, as well as methods to identify, mitigate, and prevent common Active Directory attack vectors. When forged Kerberos tickets are used in AD, there are some interesting artifacts that can be identified. Yes, despite what you may have read on the internet, there are ways to detect Golden & Silver Ticket usage!
Some of the topics covered:
How attackers go from zero to (Domain) Admin
MS14-068: the vulnerability, the exploit, and the danger
"SPN Scanning" with PowerShell to identify potential targets without network scans (SQL, Exchange, FIM, webservers, etc.)
Exploiting weak service account passwords as a regular AD user
Mimikatz, the attacker's multi-tool
Using Silver Tickets for stealthy persistence that won’t be detected (until now)
Identifying forged Kerberos tickets (Golden & Silver Tickets) on your network
Detecting offensive PowerShell tools like Invoke-Mimikatz
Active Directory attack mitigation
Kerberos expertise is not required since the presentation covers how Active Directory leverages Kerberos for authentication identifying the areas useful for attack. Information presented is useful for both Red Team & Blue Team members as well as AD administrators.
Pentesting react native application for fun and profit - Abdullahidsecconf
React Native merupakan framework yang digunakan untuk membuat aplikasi mobile baik itu Android maupun IOS (multi platform). Framework ini memungkinkan developer untuk membuat aplikasi untuk berbagai platform dengan menggunakan basis kode yang sama, yaitu JavaScript.
Dikarenakan aplikasi ini berbasis JavaScript (client side), banyak developer yang tidak memperhatikan celah keamanan pada aplikasi. Terdapat berbagai macam celah keamanan meliputi client side dan server side. Presentasi ini memuat pengalaman saya dalam menemukan celah keamanan pada saat melakukan Penetration Testing pada aplikasi mobile berbasis React Native
Drones, Drones in India, Rules for Flying a Drone in India (Regulatory Policies), Drone Categories in India, Drone Policies of Government of India, Draft Drone Policy 2.0, Salient Features of Draft Drone Policy 2.0
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016Frans Rosén
Frans Rosén has reported hundreds of security issues using his big white hat since 2012. He have recieved the biggest bounty ever paid on HackerOne, and is one of the highest ranked bug bounty researchers of all time. He's been bug bounty hunting with an iPhone in Thailand, in a penthouse suite in Las Vegas and without even being present using automation. He'll share his stories about how to act when a company's CISO is screaming "SH******T F*CK" in a phone call 02:30 a Friday night, what to do when companies are sending him money without any reason and why Doctors without Borders are trying to hunt him down.
The fundamentals of Android and iOS app securityNowSecure
Looking for a high-intensity bootcamp covering the basics of secure mobile development? This slideshare was originally presented by mobile security expert and NowSecure CEO Andrew Hoog for a 60-minute workshop at Security by Design covering the following topics:
+ Introduction to identifying security flaws in mobile apps (and how to avoid them)
+ Examples of secure and insecure mobile apps and how to secure them
+ Overview of secure mobile development based on the NowSecure Secure Mobile Development Best Practices
InduSoft Web Studio provides several features to increase your productivity when designing, developing, deploying, and maintaining HMI/SCADA applications. The “Custom Properties” (also known as “Mnemonics”) allow you to re-use graphical Symbols or even entire screens and dynamically assign different data sources (tags) to them based on the current context.
UberCloud HPC Experiment Introduction for Beginnershpcexperiment
UberCloud HPC Experiment Introduction for Beginners.
What is the HPC Experiment
How the HPC Experiment works
How to participate in the HPC Experiment
And an example project
Event-Handling Based Smart Video Surveillance SystemCSCJournals
a broad range of applications. Moving object classification in the field of video surveillance is a key component of smart surveillance software. In this paper, we have proposed reliable software with its large features for people, vehicle and object classification which works well in challenging real-world constraints, including the presence of shadows, low resolution imagery, occlusion, perspective distortions, arbitrary camera viewpoints, and groups of people. We have discussed a generic model of smart video surveillance systems that can meet requirements of strong commercial applications and also shown the implication of the software for the security purposes which made the whole system as a smart network. Smart surveillance systems use automatic image understanding techniques to extract information from the surveillance data.
AgileTech is an quality outsourcing/offshoring company in Website/Mobile Apps, Blockchain services, AI - big data services. With talented team, we have built many products and become technical partner for startups invested millions US dolar.
For website - mobile apps, we have built e-commerce, travel, health care, real estate, Uber for X, VR - AR apps &website. We are technical partners of AirBnb Vietnam, top 5 e-commerce platfom in Vietnam, Uber of X startup who has biggest market share in Vietnam, etc.
For blockchain services: we have done projects base on Ethereum, Hyperledger Fabric, Hyperledger Sawtooth, Tendamint. We have improved performance of Hyperledger Fabric 10 times, Sawtooth 02 times. We are building loyalty system based on Hyperledger Fabric; Smart contracts, Dapps. At a higher level, we have consulted many blockchain firms' CTO for their projects.
For AI - big data, our products are chatbox, recommendations system, data center, Customer Lifetime Value Cycle, Revenue Assurance System, Image Processing, etc.
AgileTech's Highlights:
- 5 years.
- 30++ Partners.
- 50++ Successful Projects.
AgileTech's Awards:
- 1st prize in Startup Weekend Hanoi 2013
- Speakers for many international & national events
For more information about AgileTech, please visit:
http://agiletech.vn
Team Networks - 2022 Technology, Innovation & Great Power CompetitionStanford University
Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, networks
Team LiOn Batteries - 2022 Technology, Innovation & Great Power CompetitionStanford University
Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, LiOn Batteries
Team Quantum - 2022 Technology, Innovation & Great Power CompetitionStanford University
Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, Quantum
Team Disinformation - 2022 Technology, Innovation & Great Power CompetitionStanford University
Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, Disinformation
Team Wargames - 2022 Technology, Innovation & Great Power CompetitionStanford University
Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, Wargames
Team Acquistion - 2022 Technology, Innovation & Great Power Competition Stanford University
Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, Acquistion
Team Climate Change - 2022 Technology, Innovation & Great Power Competition Stanford University
Technology Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, climate
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...Stanford University
Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, Army venture capital
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...Stanford University
Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve Blank, Army Venture capital
Team Catena - 2021 Technology, Innovation & Great Power CompetitionStanford University
Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, economic coercion,
Team Apollo - 2021 Technology, Innovation & Great Power CompetitionStanford University
Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, space force
Team Drone - 2021 Technology, Innovation & Great Power CompetitionStanford University
Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, c3i, command and control
Team Short Circuit - 2021 Technology, Innovation & Great Power CompetitionStanford University
Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, semiconductors
Team Aurora - 2021 Technology, Innovation & Great Power CompetitionStanford University
Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, Army venture capital
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...Stanford University
Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, venture capital
Lecture 8 - Technology, Innovation and Great Power Competition - CyberStanford University
Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, hacking for defense, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, Michael Sulmeyer, cybercom,USCYBERCOM
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Home assignment II on Spectroscopy 2024 Answers.pdf
Skynet Lessons Learned H4D Stanford 2016
1. Skynet
Increasing Situational Awareness
Through Computer VisionSOCOM
Week 10
Increase situational
awareness by
automatically detecting
humans on
autonomous drone
feeds
Week 0
Increase situational
awareness while
minimizing cognitive
load with a new
human-drone
interaction system
107
Interviews
Many Interviews Later…
Companies
8
Users
52
Experts
26
Buyers
14
2. The Skynet Team
Kevin Mott Alvin Goh Sam Gussman Olga Musayev
International Policy
Studies 2017
Mgmt Sci & Engr
2016
Symbolic Systems
2016
JD 2017
AD Infantry Officer
Embedded
Systems
Engineer
UI/UX Design
Software Engineer
Data Scientist and
Lawyer
3. The Problem
Don’t want to take Operator out of
the fight to watch a drone feed
NAVY SEALs Fighting
ISIS, 2016
5. Mission Model Canvas V1- Week 0
SkyNetUI: Mission Model Canvas
- SOF, Rangers, AWG
- Law Enforcement
Agencies
- Drone manufacturers (ex:
DJI)
- Haptic startups
- Augmented Reality
Visualization Companies
(ex: Google Glass)
- Threat/Friendly detection
- using
light/sound/motion/indicat
or/marking
-HCI - feedback
mechanism
-Making system easy to
use/learn/maintain
- Primary: SOF elements
and Ground Force
Commanders
- Secondary: Command
elements at TOC/TAC
-Tertiary: Search and
Rescue teams
-Enhance situational
awareness - Drone
becomes another set of
eyes, frees up an operator.
-Reduced risk to force-
Drone goes so humans do
not have to
- video recording to
facilitate AARs in training
-Low cost alternative to
costly assets- frees up
other assets in a resource
constrained environment
- Reduces dependence on
human capital
-Improved situational awareness for small units in combat
-Demand across SOF elements and requests for fielding from
conventional units
- Field test with one unit.
Evaluate training method.
- Expand field-tests to
multiple units in same
deployment context
- With successful field
tests, contract COTS
vendors to mass produce.
Fixed:
- Equipment - drones, development toolkits,
- Hapkit: Haptic Starter kit ($50 x 4)
- Software design & engineering
Variable:
- Costs of maintenance, updates, and training
- Drones w/ camera
(provided by SOCOM)
- Augmented Reality
Visualizer with developer
tools
- Haptic Specialists to act
as advisors
- Hapkit
- Drone pilots
- Soldiers / team leaders
-Need current methods
used to mark friendly
forces
-Support of an automated
threat detection system
Beneficiaries
Mission AchievementMission Budget/Costs
Buy-In/Support
Deployment
Value
Proposition
Key Activities
Key Resources
Key Partners Value
proposition:
Novel Human-
drone interface
to allow
operators to
control UAV
drones easier
Beneficiaries:
SOF elements,
Commanders,
Search &
Rescue
Key partners:
Law
enforcement
Augmented
Reality
Companies
6. Weeks 0-3 Customer Discovery
(Moffett field, Week 3)
Experiment: audio vs visual cues
What we did:
- Interviews, Moffett Field visit
- Cognitive Obstacle Course
- Gear Assessment
What we heard:
“I don’t want another system…”
What we thought:
Operators need a new way of
interacting with drones while
remaining alert on the
battlefield.
8. Mission Model Canvas- Week 3
SkyNetUI: Mission Model Canvas
- SOF, Rangers, AWG
- Law Enforcement
Agencies
- Drone manufacturers (ex:
DJI)
- Haptic startups
- Augmented Reality
Visualization Companies
(ex: Google Glass)
- Threat/Friendly detection
- using
light/sound/motion/indicat
or/marking
-HCI - feedback
mechanism
-Making system easy to
use/learn/maintain
- Primary: SOF elements
and Ground Force
Commanders
- Secondary: Command
elements at TOC/TAC
-Tertiary: Search and
Rescue teams
-Enhance situational
awareness - Drone
becomes another set of
eyes, frees up an operator.
-Reduced risk to force-
Drone goes so humans do
not have to
- video recording to
facilitate AARs in training
-Low cost alternative to
costly assets- frees up
other assets in a resource
constrained environment
- Reduces dependence on
human capital
-Improved situational awareness for small units in combat
-Demand across SOF elements and requests for fielding from
conventional units
- Field test with one unit.
Evaluate training method.
- Expand field-tests to
multiple units in same
deployment context
- With successful field
tests, contract COTS
vendors to mass produce.
Fixed:
- Equipment - drones, development toolkits,
- Hapkit: Haptic Starter kit ($50 x 4)
- Software design & engineering
Variable:
- Costs of maintenance, updates, and training
- Drones w/ camera
(provided by SOCOM)
- Augmented Reality
Visualizer with developer
tools
- Haptic Specialists to act
as advisors
- Hapkit
- Drone pilots
- Soldiers / team leaders
-Need current methods
used to mark friendly
forces
-Support of an automated
threat detection system
Beneficiaries
Mission AchievementMission Budget/Costs
Buy-In/Support
Deployment
Value
Proposition
Key Activities
Key Resources
Key PartnersKey partners:
Law
enforcement
Augmented
Reality
Companies
??
Value
proposition:
Something that
isn’t another
new system
A way to spot
enemies
keep track of
each other
Beneficiaries:
SOF elements,
Commanders,
Search &
Rescue
9. Weeks 3-4
What We Heard:
“Object detection in drone feeds
would be huge.”
What we thought:
Operators need an extremely wide
range of capabilities- drone
swarms, facial recognition, etc.
10. - Knowing the locations of
friends/enemies/civilians
- Reduced ambiguity
- autonomous assessment of
aerial perspectives and video
feed Customer
Jobs
Shoot bad
guys without
getting shot
- Cognitive overload from
existing tools
-Manpower losses
- Hassle of systems not
communicating
Gains
Pains
Gain
Creators
Pain
Relievers
-Increased situational awareness on
the battlefield
- Reconnaissance of
inaccessible places
- Integrate with current
systems that soldiers are
familiar with
- Frees up another soldier
Products
& Services
Situationally aware
drone with visual
interface
Value Proposition Canvas
Pains
New system to
learn
Gains
Increase situation
awareness
Pains
Integrate with
ATAK
Gains
Detection
ClassificationProduct
ATAK
plugin
Customer
jobs
shoot bad guys
without getting
shot
11. Mission Model Canvas- Week 4
SkyNetUI: Mission Model Canvas
- SOF, Rangers, AWG
- Law Enforcement
Agencies
- Drone manufacturers (ex:
DJI)
- Haptic startups
- Augmented Reality
Visualization Companies
(ex: Google Glass)
- Threat/Friendly detection
- using
light/sound/motion/indicat
or/marking
-HCI - feedback
mechanism
-Making system easy to
use/learn/maintain
- Primary: SOF elements
and Ground Force
Commanders
- Secondary: Command
elements at TOC/TAC
-Tertiary: Search and
Rescue teams
-Enhance situational
awareness - Drone
becomes another set of
eyes, frees up an operator.
-Reduced risk to force-
Drone goes so humans do
not have to
- video recording to
facilitate AARs in training
-Low cost alternative to
costly assets- frees up
other assets in a resource
constrained environment
- Reduces dependence on
human capital
-Improved situational awareness for small units in combat
-Demand across SOF elements and requests for fielding from
conventional units
- Field test with one unit.
Evaluate training method.
- Expand field-tests to
multiple units in same
deployment context
- With successful field
tests, contract COTS
vendors to mass produce.
Fixed:
- Equipment - drones, development toolkits,
- Hapkit: Haptic Starter kit ($50 x 4)
- Software design & engineering
Variable:
- Costs of maintenance, updates, and training
- Drones w/ camera
(provided by SOCOM)
- Augmented Reality
Visualizer with developer
tools
- Haptic Specialists to act
as advisors
- Hapkit
- Drone pilots
- Soldiers / team leaders
-Need current methods
used to mark friendly
forces
-Support of an automated
threat detection system
Beneficiaries
Mission AchievementMission Budget/Costs
Buy-In/Support
Deployment
Value
Proposition
Key Activities
Key Resources
Key PartnersKey partners:
ATAK
programmers
Computer
vision experts
Value
proposition:
Detection
Classification
Integration with
ATAK
Beneficiaries:
SOCOM Green
Berets,
Rangers,
SEALs
JTACS, Drone
Operators
12. Weeks 5-6
What we thought:
Difficult/slow process to get
funding for development
Channels
What we heard:
“There’s lots of efficiencies in the
acquisition process.”
S&T, SBIR, BAAs, RRTO and CTTO
offices…
Field testing
Before
After
14. Mission Model Canvas-- Weeks 5-6
SkyNetUI: Mission Model Canvas
- SOF, Rangers, AWG
- Law Enforcement
Agencies
- Drone manufacturers (ex:
DJI)
- Haptic startups
- Augmented Reality
Visualization Companies
(ex: Google Glass)
- Threat/Friendly detection
- using
light/sound/motion/indicat
or/marking
-HCI - feedback
mechanism
-Making system easy to
use/learn/maintain
- Primary: SOF elements
and Ground Force
Commanders
- Secondary: Command
elements at TOC/TAC
-Tertiary: Search and
Rescue teams
-Enhance situational
awareness - Drone
becomes another set of
eyes, frees up an operator.
-Reduced risk to force-
Drone goes so humans do
not have to
- video recording to
facilitate AARs in training
-Low cost alternative to
costly assets- frees up
other assets in a resource
constrained environment
- Reduces dependence on
human capital
-Improved situational awareness for small units in combat
-Demand across SOF elements and requests for fielding from
conventional units
- Field test with one unit.
Evaluate training method.
- Expand field-tests to
multiple units in same
deployment context
- With successful field
tests, contract COTS
vendors to mass produce.
Fixed:
- Equipment - drones, development toolkits,
- Hapkit: Haptic Starter kit ($50 x 4)
- Software design & engineering
Variable:
- Costs of maintenance, updates, and training
- Drones w/ camera
(provided by SOCOM)
- Augmented Reality
Visualizer with developer
tools
- Haptic Specialists to act
as advisors
- Hapkit
- Drone pilots
- Soldiers / team leaders
-Need current methods
used to mark friendly
forces
-Support of an automated
threat detection system
Beneficiaries
Mission AchievementMission Budget/Costs
Buy-In/Support
Deployment
Value
Proposition
Key Activities
Key Resources
Key Partners Beneficiaries:
Operators
Buyers (S&T,
acquisitions)
SOCOM
Channels
S&T SOCOM
SBIR SOCOM
or DoD
DARPA BAAs
Buy-In
Low-cost
Replaceable
COTS
15. What we thought:
Operators want to have
automatic detection AND
classification of humans in
video feed
What we did:
- Even more interviews!
- Explore current technology
(is classification feasible? At
what confidence levels?)
Weeks 7-9
Lesson:
Soldiers need to trust the UAV to make
accurate classifications.
Object Detection is a good starting point
16. Mission Achievement
Organization Beneficiary Mission Achievement
SOCOM Tactical operators - Human detection
- Location of humans detected
- Autonomous flight
PMs Get the right equipment to troops at a reasonable cost.
DARPA ATAK PM Get ATAK utilized in multiple military organizations, create a
plugin ecosystem to add value over time
TAK sUAS plugin team Fully implemented plugin features
DHS Border Patrol Improved identification and tracking of suspected illegal border
crossers.
Potential commercial
partners
Kespry/OceanIT/motionDSP Decreased R&D Costs, new revenue streams, relationships with
US Government customers. Improvements to existing technology
Skynet Team Skynet (Us) Awarded SBIR phase 1 & 2
OR
Transition to S&T acquisition process (via SOCOM) or corporate
17. Partners and Benefits
Computer Vision Experts (Stanford
Computer Vision Lab)
AFRL
J. (independent engineer)
DARPA
Activities Resources
Partners
People Recognition
Geolocation of person
ATAK Integration
Easy UI/UX
Pre-plan Routes
Autonomous Flight
Web Servers / Dataset Tagging,
Training Data,
Algorithm / Model
Camera Metadata (DJI API),
Drone Location data
ATAK Source Code,
ATAK Testing
User Feedback
Litchi,
Open Source Navigation Code,
Drones
Trained Deep Learning Model,
Drones
ATAK Team
- DARPA
- AFRL
SOCOM Operators
Litchi (?)
Open source drone software community
TBD
18. Mission Model Canvas- Week 7-9
SkyNetUI: Mission Model Canvas
- SOF, Rangers, AWG
- Law Enforcement
Agencies
- Drone manufacturers (ex:
DJI)
- Haptic startups
- Augmented Reality
Visualization Companies
(ex: Google Glass)
- Threat/Friendly detection
- using
light/sound/motion/indicat
or/marking
-HCI - feedback
mechanism
-Making system easy to
use/learn/maintain
- Primary: SOF elements
and Ground Force
Commanders
- Secondary: Command
elements at TOC/TAC
-Tertiary: Search and
Rescue teams
-Enhance situational
awareness - Drone
becomes another set of
eyes, frees up an operator.
-Reduced risk to force-
Drone goes so humans do
not have to
- video recording to
facilitate AARs in training
-Low cost alternative to
costly assets- frees up
other assets in a resource
constrained environment
- Reduces dependence on
human capital
-Improved situational awareness for small units in combat
-Demand across SOF elements and requests for fielding from
conventional units
- Field test with one unit.
Evaluate training method.
- Expand field-tests to
multiple units in same
deployment context
- With successful field
tests, contract COTS
vendors to mass produce.
Fixed:
- Equipment - drones, development toolkits,
- Hapkit: Haptic Starter kit ($50 x 4)
- Software design & engineering
Variable:
- Costs of maintenance, updates, and training
- Drones w/ camera
(provided by SOCOM)
- Augmented Reality
Visualizer with developer
tools
- Haptic Specialists to act
as advisors
- Hapkit
- Drone pilots
- Soldiers / team leaders
-Need current methods
used to mark friendly
forces
-Support of an automated
threat detection system
Beneficiaries
Mission AchievementMission Budget/Costs
Buy-In/Support
Deployment
Value
Proposition
Key Activities
Key Resources
Key PartnersPartners:
DARPA
AFRL
Computer
Vision Experts
SOCOM
Resources
Data,
algorithms
ATAK source
code
Drone
Key Activities
Computer
Vision
ATAK
Integration
Drone Hacking
Mission Achievement
Low-cost COTS drones that increase
situational awareness
Help DARPA start a program on drones
19. Week 9 MVP
“How am I supposed to feel vibration when I’m
running around being shot at when I can’t feel my
phone vibrate in my pocket walking to the
bathroom?”
“How does it know that someone is bad? I don’t
want to go to jail…”
“That’s badass”
“Can you demo this in July”
“I oddly feel more comfortable knowing there is a skynet
drone watching out for me”
Week 2 MVP
From this... ...to this
20. No Money
20192017 2018 2020 20212016
Q1 Q2 Q1 Q2 Q1 Q2 Q1 Q2 Q1 Q2Q1 Q2 Q3 Q4 Q3 Q4 Q3 Q4 Q3 Q4 Q3 Q4
$500k
$1m
$5m
Product
Milestones
MVP
Businesses
Milestones
Beta 2.0 Release
Class ends
Demo
events
Apply SOCOM S&T, DARPA BAAs, SBIRs
SOCOM S&T Funding or DARPA BAA funding
1.0 Release
DIUx
Demo
events
Demo
events
Sell product to large DoD
contractor
Find other Agency S&T Funding
Try to become program of record
while sustaining individual sales
Apply Other Agency S&T Funding
Finance and Operations Timeline
Q1 Q2Q1 Q2 Q3 Q4
21. Who Helped us Get Here
Wayne Chen
Michael Hard
Brian CS
Jooyong Lee
Andrew Smallwood
Mentors:
Army Rangers, Green Berets, Navy SEALs, Air Force
Pararescuemen, and Norwegian SOF
Sponsor:
Tactical Operators:
Thanks Brendon!
23. Appendix
Final mission model canvas
Pictures
Tech stack
Key partners, resources, activities
Progression of beneficiaries
Progression of value proposition
Acquisitions & deployment (timeline, get keep grow diagram, S&T process)
24. Hardware:
DIY custom drone kit
Camera (color / thermal)
Software:
Open-sourced firmware
Drone
ATAK Cursor On Target*
*Schema much like JSON
Androidplugin
Skynet
Computer Vision (openCV) Drone navigation
Object
detection
Object
recognition DJI sdk / open-sourced sdk
Android device
What we have now
25. What we learned
About the product
Refrain from building a new
system
Integrate with prefered existing
systems (ATAK)
COTS system - flexible, less
expensive
About the process
Get out of the building!
Distill the common pains and
gains
Understand the customer
Dig deep but look broad
26. Mission Model Canvas
-Software development
computer vision on drone
feeds
-People detection
-Geolocation of person
populated on map
-Integration with ATAK and
existing DoD tech
-Autonomous drone
hacking-not manufacturing
- Hack COT drone like DJI
- Partner with drone maker
- Become sensor neutral
DoD
- SOCOM: S&T and
acquisition PMs
- DARPA PMs
ATAK Integration
- ATAK Programmers in
DARPA and AFRL
Computer Vision
- Computer vision experts
- Increase situational
awareness through computer
vision, detection of people
and objects
- Provide low-cost method of
reconnaissance
-Easy UI and use through
integration w/ ATAK
-Added value to current
program/technology
-Provide demo to pitch new
program to Director of
DARPA
- Low-cost detection of
movement and people at
border
- Increase ability to respond
to sensors
- Fulfill S&T Topic of Interest requirements
- Establish and meet Key Performance Parameters (KPPs)
- Achieve 80% accuracy rate on detecting people, with few false positives
- Start new program for small UAVs in DARPA
- Fulfill technical wishlist for ATAK
- Improved identification and tracking of suspected illegal border crossers.
- Achieve sustainable business selling in S&T phase to multiple agencies
Q3, 2016 (May – June): $5,925 ($407 / Week)
Q4, 2016 (July – Sept): $16,847 ($1,296 / Week)
Q1, 2017 (Oct – Dec): $129,000 ($9,923 / Week)
Q2, 2017 (Jan – March): $249,600 ($19,200 / Week)
-Demonstrate utility + low-
cost- gain support from
senior personnel
-Add utility to current program
of record to increase adoption
-Start a company or get
acquired by another company
Beneficiaries
Mission AchievementMission Budget/Costs
Get awareness w/ demo
days, technical experiment.
conferences, etc.
-S&T UAV Topic of Area--
submit white paper
-Exchange expertise and
collaborate
-Talk with PMs, submit to
BAA-16-31
-Demo TE, TILO, and Ranger
training events in July
Buy-In/Support
Deployment
Value PropositionKey Activities
Funding/Money, Access
ATAK Integration
-ATAK source code
-DJI SDK or open-source
Computer Vision
-Algorithms (CV lab)
- AMT / AWS
-Training data: blimp or
drone footage (AFRL)
Autonomous Drone (DJI)
Key Resources
Key Partners
SOCOM
- Tactical operators - SOF
(SF, Ranger, SEALS,
JSOC, MARSOC/Recon,
drone operators)
- SOCOM PMs- Small UAV
S&T PM, Acquisition PM,
DARPA
Tactical Technology
Office-SquadX and future
Small UAV program
ATAK Program Manager
AFRL
DHS
Border Patrol
Skynet
Because you asked for more color coding . . .
27. What we did
Customer Discovery
(Moffett field, Week 3)
ATAK MVP (Week 4)
Processing a drone video feed (Week 4/5)
28. ATAK mockup (Week 7)
Product planning (Week 8)
Week 9 MVP
What we did
30. The MVP Evolution
“How am I supposed to feel
vibration when I’m running
around being shot at when
I can’t feel my phone
vibrate in my pocket
walking to the bathroom?”
“I need to know without
a doubt that they’re
holding a gun and not a
baby”
“As far as
recognition,
that’s huge.”
“Are you sure it’s not
a baby? I really don’t
want to go to jail.”
V0.01 V0.1 Current
31. - Primary: SOF elements
and Ground Force
Commanders
- Secondary: Command
elements at TOC/TAC
-Tertiary: Search and
Rescue teams
Our Beneficiaries
COMBAT: SOF in a combat
environment (TIC)
--JTACs
--Team leader
NON-COMBAT: SOF in a
non-combat environment
DUAL USE: Search and
Rescue teams
COMBAT: SOF and Rangers
in a combat environment
(TIC)
--JTACs
--Team leader
NON-COMBAT: SOF in a
non-combat environment,
interacting and training with
allied troops
DUAL USE: Search and
Rescue teams
Tactical operators - SOF
(SF, Ranger, SEALS,
MARSOC/Recon, drone
operators)
Private sector and academic
partners (Neurala, drone
manufacturer, Stanford lab)
ATAK Program Manager
SOCOM Small UAV
S&T/Acquisition Program
Managers
Dual Use: Border Patrol
Week 0 Week 2 Week 3 Week 6
32. -Enhance situational
awareness - Drone becomes
another set of eyes, frees up
an operator.
-Reduced risk to force-
Drone goes so humans do
not have to
-Live video feed
-Low cost alternative to
costly assets- frees up other
assets in a resource
constrained environment
Minimize new load that
needs to be carried
- Reduces dependence on
human capital
Value proposition
COMBAT: Drone uses visual
recognition to separate
enemies, friendlies, and
noncombatants-- prevents
collateral damage and
fratricide
NON-COMBAT: Drone flies
route autonomously,
increases awareness of
surroundings, and could do
patrols
- Low cost alternative to
costly assets
Minimize new load that needs to be
carried
- Reduces human capital
needs-- frees up man to
fight
- Identify and locate hostile
and neutral actors
- Enhanced ability to
conduct real time recon (esp
at night).
- Enable extra soldier in fight
- Autonomously fly routes
and identify potential
trouble.
- Extending communications
(e.g. inter-unit, with allied
troops)
- Conduct perimeter
surveillance
- Gather intelligence on
nearby residents and
distinguish between regular
and irregular behavior of
civilians in close proximity to
military installations
- Keep track of friendly,
potential hostile and neutral
actors/equipment
automatically
- New contracts and revenue
streams
- Opportunities for tech
development
-Added value to current
program/technology
-Cost effective, agile and
quick method of filling
capability gaps
- Low-cost detection of
movement and people at
border
Week 0 Week 2 Week 3 Week 6
33. Week 9
SOCOM
- Tactical operators - SOF
(SF, Ranger, SEALS,
MARSOC/Recon, drone
operators)
- SOCOM PMs- Small UAV
S&T PM, Acquisition PM,
Kespry, OceanIT,
motionDSP, Stanford CV
lab, drone manufacturers
DARPA
Tactical Technology Office-
Persistent Air Support
Project
ATAK Program Manager
DHS
Border Patrol
Skynet
- Increase situational
awareness through computer
vision, recognition of people
and objects
- Provide low-cost method of
reconnaissance
-Easy UI and use through
integration w/ ATAK
- New contracts and revenue
streams through the DoD
- New use cases for product
- Reputation and awareness
-Added value to current
program/technology
- Low-cost detection of
movement and people at
border
- Increase ability to respond
to sensors
product - market fit
Value Proposition Beneficiaries
35. S&T Process - Prototype to Product
BAA for
existing gap
White
Paper
White
Paper
White
Paper
S&T PM
(TBD)
S&T PM’s Group of
Operators
Other operators
who talk to
operators in PM’s
group
Bureaucracy line
Other operators
who talk to
operators in PM’s
group
S&T “Council”:
S&T PMs +
Director
Engineer
Proposal
Contract Negotiations
between business
and PM: Statement of
Work (COW);
Contracts Data
Requirements List
(CDROLS)
Step 1: find gap on
fedbizops + submit
whitepaper
Step 2: All whitepapers get
evaluated by operators
and engineer
Step 3: S&T PM brings selected
white paper to “council” of PMs.
They choose which projects to
prioritize and fund.
Step 4+5: Submit proposal
and negotiate deliverables
(CDROLS) and what you
will do (COW)
Step 0: “Free flowing” communication with operators
and PM to show off product and get selected and
prioritized
36. Mission Model Canvas- Week 1
- Threat / Friendly detection
using light / sound / motion /
indicator / or marking
-HCI - feedback mechanism
Haptic = bad
familiar = really important
-Making system easy to
use/learn/maintain
- SOF, Rangers, AWG
- Law Enforcement Agencies
- Drone manufacturers (ex:
DJI)
- Haptic startups
- Augmented Reality
Visualization Companies (ex:
Google Glass)
- Primary: SOF elements
and Ground Force
Commanders
- Secondary: Command
elements at TOC/TAC
-Tertiary: Search and
Rescue teams
-Enhance situational
awareness - Drone becomes
another set of eyes, frees up
an operator.
-Reduced risk to force-
Drone goes so humans do
not have to
- video recording to facilitate
AARs in training Live video
feed
-Low cost alternative to
costly assets- frees up other
assets in a resource
constrained environment
Minimize new load that
needs to be carried
- Reduces dependence on
human capital
-Improved situational awareness for small units in combat
-Demand across SOF elements and requests for fielding from conventional
units
- Field test with one unit.
Evaluate training method.
- Expand field-tests to
multiple units in same
deployment context
- With successful field tests,
contract COTS vendors to
mass produce.
Fixed:
- Equipment - drones, development toolkits,
- Hapkit: Haptic Starter kit ($50 x 4)
- Software design & engineering
- Augmented reality hardware & software (equivalent of Google Glasses and
relevant developer toolkits)
Variable:
- Costs of maintenance, updates, and training
-Need current methods used to mark
friendly forces
- Rank and file soldiers, unit
leaders, and commanders.
- Support of an automated
threat detection system
- Military engineers to
facilitate integration with
systems
Beneficiaries
Mission AchievementMission Budget/Costs
Buy-In/Support
Deployment
Value PropositionKey Activities
Key Resources
Key Partners
- Drones w/ camera
(provided by SOCOM)
- Augmented Reality
Visualizer with developer
tools
- Access to existing gear and
standard equipment
- Haptic Specialists to act as advisors
- Hapkit
- Drone pilots
- Soldiers / team leaders
37. Mission Model Canvas- Week 2
- Threat/friendly/noncombat.
detection using visual
recognition light/sound/
motion/indicator/or marking
-HCI - feedback mechanism
-Making system easy to
use/learn/maintain
- Integration with prefered
sit. awareness platforms,
including smart phones (As a
Service)
- SOF, Rangers, AWG
- Law Enforcement Agencies
- Drone manufacturers (ex:
DJI)
- Sparrow (Stanford CS210
Autonomous Drone project)
- Haptic startups
- Augmented Reality
Visualization Companies (ex:
Google Glass)
-DARPA
COMBAT: SOF in a combat
environment (TIC)
--JTACs
--Team leader
NON-COMBAT: SOF in a
non-combat environment
DUAL USE: Search and
Rescue teams
COMBAT: Drone uses visual
recognition to separate
enemies, friendlies, and
noncombatants-- prevents
collateral damage and
fratricide
NON-COMBAT: Drone flies
route autonomously,
increases awareness of
surroundings, and could do
patrols
- Low cost alternative to
costly assets
Minimize new load that needs to be
carried
- Reduces human capital
needs-- frees up man to fight
-Improved situational awareness for small units in combat
-perform manpower intensive tasks in non-combat roles
-Reduce fratricide and collateral damage
- Identify program manager
- Secure funding + contract
from sponsor
- Field test small-scale
- Contract a manufacturer for
large scale production
- Deploy iteratively, for each
integrate with a new system
- Continue relationship via
maintenance + integration
service
Fixed:
- Equipment - drones, development toolkits,
- Hapkit: Haptic Starter kit ($50 x 4)
- Software design & engineering
- Augmented reality hardware & software (equivalent of Google Glasses and
relevant developer toolkits)
Variable:
- Costs of maintenance, updates, and training
-Need current methods used to mark
friendly forces
- Rank and file soldiers, unit leaders,
and commanders.
- Support of an automated threat
detection system
- Military engineers to facilitate
integration with systems
??????
Beneficiaries
Mission AchievementMission Budget/Costs
Buy-In/Support
Deployment
Value PropositionKey Activities
Key Resources
Key Partners
- Drones w/ camera
(provided by SOCOM)
- Augmented Reality
Visualizer with developer
tools
- Access to existing gear and
standard equipment
- Haptic Specialists to act as advisors
- Hapkit
- Drone pilots
- Soldiers / team leaders
38. Mission Model Canvas- Week 3
- Combatant classification
and threat detection
- Integration with ATAK &
other military systems
- Operable without GPS
- SOF, Rangers, AWG
- Law Enforcement Agencies
- Autonomous Drone
manufacturer (eg: Kespry)
- ATAK Design group
- Sparrow (Stanford CS210
Autonomous Drone project)
- Augmented Reality
Visualization Companies (ex:
Osterhout Design Group)
-DARPA
COMBAT: SOF and Rangers
in a combat environment
(TIC)
--JTACs
--Team leader
NON-COMBAT: SOF in a
non-combat environment,
interacting and training with
allied troops
DUAL USE: Search and
Rescue teams
- Identify and locate hostile
and neutral actors
- Enhanced ability to conduct
real time recon (esp at night).
- Enable extra soldier in fight
- Autonomously fly routes
and identify potential trouble.
- Extending communications
(e.g. inter-unit, with allied
troops)
- Conduct perimeter
surveillance
- Gather intelligence on
nearby residents and
distinguish between regular
and irregular behavior of
civilians in close proximity to
military installations
-Improved situational awareness for small units in combat
-perform manpower intensive tasks in non-combat roles
-Reduce fratricide and collateral damage
- Secure funding + contract
- Small-scale testing
- Contract a manufacturer for
large scale production
- Deploy iteratively, integrate
with a new systems and
provide lessons on use
- Continue relationship via
maintenance, integration
service, and training
Fixed:
- Equipment - drones, development toolkits,
- Software design & engineering
- Augmented reality hardware & software (equivalent of Google Glasses and
relevant developer toolkits)
Variable:
- Costs of maintenance, updates, and training
25k - relatively quick to
acquire
-for entirely new technology,
writeup to SOCOM
Saboteur - competition with
other groups
Beneficiaries
Mission AchievementMission Budget/Costs
Buy-In/Support
Deployment
Value PropositionKey Activities
Key Resources
Key Partners
- DJI Drones w/ Dev. tools
- AR Device w/ Dev. tools
- ATAK API
- Access to existing gear and
standard equipment
39. Mission Model Canvas- Week 4
- Identifying and tracking
friendlies
- Object detection
- Object recognition,
classification and threat
detection
- Integration with ATAK
- SOF (green beret, ranger,
SEALS)
- SOCOM
- Programmable drone
manufacturers (eg: Solo)
- ATAK Program
- Neurala (or other computer
vision firm)
Tactical operators - SOF
(SF, Ranger, SEALS,
MARSOC/Recon, drone
operators)
Private sector partners
(Neurala, drone
manufacturer)
ATAK Program Manager
SOCOM Small UAV
S&T/Acquisition Program
Managers
- Keep track of friendly,
potential hostile and neutral
actors/equipment
automatically
- New contracts and revenue
stream
- Opportunities for tech
development
-Added value to current
program/technology
-Cost effective, agile and
quick method of filling
capability gaps
-Improved situational awareness for small units in combat
-reduce workload for tactical operators and feed-monitoring operators
-decrease strain on other traditional aerial assets
-Deploy to select teams
under $25k level. Hardware
purchased COTS
-Incorporate commercial
partner software in app dev
-Work with ATAK to include
future app update with our
capabilities
-Work to make program of
record after buy in
Fixed:
- Equipment - drones, development toolkits
- Software design & engineering
Variable:
- Costs of maintenance, updates, and training
-Demonstrate utility- gain
support from senior personnel
-Show opportunities for new
revenue streams
-Add utility to current program
of record to increase adoption
-Provide low cost product
with new capability filling gap
Saboteur - competition within
SOCOM PMs
Beneficiaries
Mission AchievementMission Budget/Costs
Buy-In/Support
Deployment
Value PropositionKey Activities
Key Resources
Key Partners
- DJI phantom 3
programmable drone
- Computer vision SDK
(preferably neurala)
- ATAK API + source code
40. Mission Model Canvas- Week 5
- Fly autonomously on route
- Object detection,
recognition, classification
- Identifying and tracking
friendlies, enemies, civilians
- Integration with ATAK
- SOF (green beret, ranger,
SEALS)
- SOCOM, RRTO, CTTSO,
JCTD, CTO
- Programmable drone
manufacturers (eg: Solo)
- ATAK Program
- Neurala (or other computer
vision firm)
-Stanford Computer Vision
Lab
Tactical operators - SOF
(SF, Ranger, SEALS,
MARSOC/Recon, drone
operators)
Private sector and academic
partners (Neurala, drone
manufacturer, Stanford lab)
ATAK Program Manager
SOCOM Small UAV
S&T/Acquisition Program
Managers
Dual Use: Border Patrol
- Keep track of friendly,
potential hostile and neutral
actors/equipment
automatically
- New contracts and revenue
streams
- Opportunities for tech
development
-Added value to current
program/technology
-Cost effective, agile and
quick method of filling
capability gaps
- Low-cost detection of
movement and people at
border
-Improved situational awareness for small units in combat
-reduce workload for tactical operators and feed-monitoring operators
-decrease strain on other traditional aerial assets
Options:
1). S&T Process
2). SBIR Process
3). Find existing contract
(short term funding)
Fixed:
- Equipment - drones, development toolkits
- Software design & engineering
Variable:
- Costs of maintenance, updates, and training
-Demonstrate utility- gain
support from senior personnel
-Show opportunities for new
revenue streams
-Add utility to current program
of record to increase adoption
-Provide low cost product
with new capability filling gap
Saboteur - competition within
SOCOM PMs
Beneficiaries
Mission AchievementMission Budget/Costs
Buy-In/Support
Deployment
Value PropositionKey Activities
Key Resources
Key Partners
- Programmable Drone
- Computer vision SDK
(preferably neurala)
- ATAK API + source code
__= New
41. Mission Model Canvas- Week 6
- Fly autonomously on route
- Object detection,
recognition, classification
- Identifying and tracking
friendlies, enemies, civilians
- Integration with ATAK
- SOF (green beret, ranger,
SEALS)
- SOCOM, RRTO, CTTSO,
JCTD, CTO
- Programmable drone
manufacturers (eg: Solo)
- ATAK Program
- Neurala (or other computer
vision firm)
-Kespry
-Stanford Computer Vision
Lab
Tactical operators - SOF
(SF, Ranger, SEALS,
MARSOC/Recon, drone
operators)
Private sector and academic
partners (Neurala, drone
manufacturer, Stanford lab)
ATAK Program Manager
SOCOM Small UAV
S&T/Acquisition Program
Managers
Dual Use: Border Patrol
- Keep track of friendly,
potential hostile and neutral
actors/equipment
automatically
- New contracts and revenue
streams
- Opportunities for tech
development
-Added value to current
program/technology
-Cost effective, agile and
quick method of filling
capability gaps
- Low-cost detection of
movement and people at
border
-Improved situational awareness for small units in combat
-reduce workload for tactical operators and feed-monitoring operators
-decrease strain on other traditional aerial assets
Demo days, technical
experimentation
conferences, etc.
S&T or SBIR Process,
depending on level of
prototype
“How to” youtube videos,
customer support
Fixed:
- Equipment - drones, development toolkits
- Software design & engineering
Variable:
- Costs of maintenance, updates, and training
-Demonstrate utility- gain
support from senior personnel
-Show opportunities for new
revenue streams
-Add utility to current program
of record to increase adoption
-Provide low cost product
with new capability filling gap
Saboteur - competition within
SOCOM PMs
Beneficiaries
Mission AchievementMission Budget/Costs
Buy-In/Support
Deployment
Value PropositionKey Activities
Key Resources
Key Partners
- Programmable Drone
- Computer vision SDK
- ATAK API + source code
__= New
42. Mission Model Canvas- Week 7
- Fly autonomously on route
Phase 1: Computer vision:
recognize people, vehicles
- Integration with ATAK
Phase 2: Computer vision:
classify people into
friendlies, enemies, civilians
- Stand alone from ATAK
- Augmented Reality
- SOF (green beret, ranger,
SEALS)
- SOCOM, RRTO, CTTSO,
JCTD, CTO
- ATAK Program
-Kespry, OceanIT,
motionDSP
-Stanford Computer Vision
Lab
- Programmable drone
manufacturers (eg: Solo)
-DARPA
- Increase situational
awareness of potential
threats and collateral
damage
- Provide low-cost method of
reconnaissance
- New contracts and revenue
streams
- Opportunities for tech
development
-Added value to current
program/technology
- Low-cost detection of
movement and people at
border
- Increase ability to respond
to sensors
- A job, money
- Fulfill S&T Topic of Interest requirements
- Establish and meet Key Performance Parameters (KPPs)
- Discover what’s possible under SBIR OSD-162-003X
- Achieve 80% accuracy rate on detecting people, with few false positives
- Fulfill the DARPA wish list of technical features
- Improved identification and tracking of suspected illegal border crossers.
Get awareness w/ demo
days, technical experiment.
conferences, etc.
-S&T UAV Topic of Area--
submit white paper
-SBIR Phase 1 Grant
“How to” youtube videos,
customer support
-Exchange expertise and
collaborate
Fixed:
- Equipment - drones, development toolkits
- Software design & engineering
Variable:
- Costs of maintenance, updates, and training
-Demonstrate utility + low-
cost- gain support from
senior personnel
-Show opportunities for new
revenue streams
-Add utility to current program
of record to increase adoption
-Start a company or get
acquired by another company
Beneficiaries
Mission AchievementMission Budget/Costs
Buy-In/Support
Deployment
Value PropositionKey Activities
Key Resources
Key Partners
- Programmable Drone
- Computer vision SDK
- ATAK API + source code
__= New
SOCOM
- Tactical operators - SOF
(SF, Ranger, SEALS,
MARSOC/Recon, drone
operators)
- SOCOM PMs- Small UAV
S&T PM, Acquisition PM,
Kespry, OceanIT,
motionDSP, Stanford CV
lab, drone manufacturers
DARPA
Tactical Technology Office-
Persistent Air Support
Project
ATAK Program Manager
DHS
Border Patrol
Skynet
43. Skynet Origins
Original Problem Statement: Traditional UAV video platforms require a tactical operator to control the UAV and
watch the video, which takes them out of the fight and has a high cognitive load. Our goal is to develop an -
autonomous drone that flies routes autonomously and gives reliable threat information without forcing an
operator to take his hands off the trigger or eyes off the scope.
Our Initial Idea: Since the root of the problem is cognitive overload, which stems from poorly designed UI and UX
systems, we aimed to create an improved Human-Drone Interaction system that could be scaled across
platforms.
90 In Person interviews (30 people surveyed)
Our product would target the Small Unmanned Aerial System (SUAS) market
TAM SAM (SUAS)
SOCOM 3,000 units 800-1000 units
DOD 18,210 units 17,296 units
44. Mission Model Canvas- Week 8
-Software development
computer vision on drone
feeds
-People recognition
-Geolocation of person
populated on map
-Integration with existing
DoD tech
-Autonomous drone
hacking-not manufacturing
- Hack COT drone like DJI
- Partner with drone maker
- Become sensor neutral
Funding from DoD
- SOCOM
- S&T and acquisition PMs
- Contracting PMs
Computer Vision
- Amazon--AWS
- Movidius
-MotionDSP, OceanIT
-Stanford CV Lab
-Independent computer
vision experts/contractors?
ATAK Integration
- ATAK Programmers
- DARPA
- “JL” for geolocation
Autonomous Drones
-DJI
-Kespry
- Programmable drone
manufacturers (eg: Solo)
- Increase situational
awareness through computer
vision, recognition of people
and objects
- Provide low-cost method of
reconnaissance
-Easy UI and use through
integration w/ ATAK
- New contracts and revenue
streams through the DoD
- New use cases for product
- Reputation and awareness
-Added value to current
program/technology
- Low-cost detection of
movement and people at
border
- Increase ability to respond
to sensors
- Fulfill S&T Topic of Interest requirements
- Establish and meet Key Performance Parameters (KPPs)
- Discover what’s possible under SBIR OSD-162-003X
- Achieve 80% accuracy rate on detecting people, with few false positives
- Find long-term customers in DoD
- Fulfill the DARPA wish list of technical features
- Improved identification and tracking of suspected illegal border crossers.
Get awareness w/ demo
days, technical experiment.
conferences, etc.
-S&T UAV Topic of Area--
submit white paper
-SBIR Phase 1 Grant
“How to” youtube videos,
customer support
-Commercial partnership
-Exchange expertise and
collaborate
Computer Vision
- Computer Vision expert: over $100 per hour
-MotionDSP- free
- Data- ??
ATAK- free
Drones- $1k and up
Other- costs of maintenance, updates, and training
-Demonstrate utility + low-
cost- gain support from
senior personnel
-Show opportunities for new
revenue streams
-Add utility to current program
of record to increase adoption
-Start a company or get
acquired by another company
Beneficiaries
Mission AchievementMission Budget/Costs
Buy-In/Support
Deployment
Value PropositionKey Activities
Key Resources
Key Partners
Funding/Money
Computer Vision
-Computing power
-Algorithms
-Training data: blimp or
drone footage
ATAK Integration
-ATAK source code
-DJI SDK or open-source
Autonomous Drone
__= New
SOCOM
- Tactical operators - SOF
(SF, Ranger, SEALS,
MARSOC/Recon, drone
operators)
- SOCOM PMs- Small UAV
S&T PM, Acquisition PM,
Kespry, OceanIT,
motionDSP, Stanford CV
lab, drone manufacturers
DARPA
Tactical Technology Office-
Persistent Air Support
Project
ATAK Program Manager
DHS
Border Patrol
Skynet