SlideShare a Scribd company logo
Planning and Dependency
Reasoning
Dr. Brian Drabble,
Chief Technology Officer,
DMM Ventures, Inc.,
brian@dmmventures.com
DMM Ventures, Inc: Propritary
Dependency and Consequence Analysis
• Dependency Analysis (Athena)
– Nodes depend upon each other for capabilities, which
are the most dependent nodes in the network?
• Consequence Analysis (Athena)
– Node capabilities can be affected by actions what
would be the consequences of actions?
• Plan Development (NETPlan)
– Develop plans to bring about a desired effect in the
network
• Integrating Planning and Analysis (Cassandra)
2
Cassandra: Insurgent Scenario
• Identify and rank most dependent nodes in
the insurgency network
• Develop Plan Specification
• Develop Plan using NETPlan
• Integrate Plan into Dependency Network
• Analyze Plan effects, direct and n-order
• Analyze Plan robustness and re-task
DMM Ventures, Inc: Propritary 3
DMM Ventures, Inc: Propritary 4
DMM Ventures, Inc: Propritary 5
DMM Ventures, Inc: Propritary 6
DMM Ventures, Inc: Propritary 7
DMM Ventures, Inc: Propritary 8
DMM Ventures, Inc: Propritary 9
DMM Ventures, Inc: Propritary 10
DMM Ventures, Inc: Propritary 11
DMM Ventures, Inc: Propritary 12
DMM Ventures, Inc: Propritary 13
DMM Ventures, Inc: Propritary 14
DMM Ventures, Inc: Propritary 15
DMM Ventures, Inc: Propritary 16
DMM Ventures, Inc: Propritary 17
DMM Ventures, Inc: Propritary 18
DMM Ventures, Inc: Propritary 19

More Related Content

PDF
Comparing MLE Vs. NLR in context of Software Reliability Growth Modes (SRGMs)
PDF
Portfolio of work - James Sia Architect
DOCX
A resumee
PPTX
портфоліо
RTF
Mairi aitken cv feb 2016
PDF
Containers Across Clouds
DOCX
A resumee
PDF
Fryman Project Experience
Comparing MLE Vs. NLR in context of Software Reliability Growth Modes (SRGMs)
Portfolio of work - James Sia Architect
A resumee
портфоліо
Mairi aitken cv feb 2016
Containers Across Clouds
A resumee
Fryman Project Experience

Viewers also liked (11)

DOCX
Pricing challenges and models for consumer goods companies
PDF
Imran Resume
PDF
Philosophers, Consultants and Containers
PDF
C4orf26(2012)
DOC
SAM CV
 
PDF
LAMB3(2014)
PDF
How to Sell to Multiple Decision Makers
DOCX
resume 2014
PDF
Weave - Containers Across Clouds - Edinburgh Docker Meetup, July 2015
PDF
ThomasPatrickCraftsmanship_sml
PDF
Baylor Bearathon TCP 2015
Pricing challenges and models for consumer goods companies
Imran Resume
Philosophers, Consultants and Containers
C4orf26(2012)
SAM CV
 
LAMB3(2014)
How to Sell to Multiple Decision Makers
resume 2014
Weave - Containers Across Clouds - Edinburgh Docker Meetup, July 2015
ThomasPatrickCraftsmanship_sml
Baylor Bearathon TCP 2015
Ad

Similar to Planning and Dependency Reasoning (20)

PPTX
Lqsqsssssssssssssssssssssssssssssssssssq18.pptx
DOCX
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
PDF
Network security monitoring elastic webinar - 16 june 2021
PDF
Ista presentation-dga
PDF
How Graph Technology is Changing AI
PDF
Your Applications Are Distributed, How About Your Network Analysis Solution?
PPTX
Internet of Things: Government Keynote, Randy Garrett
PPTX
it-Craft-a-Cloud-Strategy-for-the-Enterprise-Database-Phases-1-3.pptx
PPTX
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PPTX
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PDF
Ista presentation-apache spark
PPTX
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
PDF
GraphTour 2020 - Graphs & AI: A Path for Data Science
DOC
Mris network architecture proposal r1
PDF
Data Tactics Semantic and Interoperability Summit Feb 12, 2013
PDF
Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network
PPTX
DT Company Overview January 2013
PDF
Building Hybrid DApps using Blockchain Tactics - The Meta-Transaction Example...
PPTX
Big Data Analytics and Advanced Computer Networking Scenarios
PPTX
Varshneya samdarshi lmu_symposium_2016
Lqsqsssssssssssssssssssssssssssssssssssq18.pptx
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Network security monitoring elastic webinar - 16 june 2021
Ista presentation-dga
How Graph Technology is Changing AI
Your Applications Are Distributed, How About Your Network Analysis Solution?
Internet of Things: Government Keynote, Randy Garrett
it-Craft-a-Cloud-Strategy-for-the-Enterprise-Database-Phases-1-3.pptx
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
Ista presentation-apache spark
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
GraphTour 2020 - Graphs & AI: A Path for Data Science
Mris network architecture proposal r1
Data Tactics Semantic and Interoperability Summit Feb 12, 2013
Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network
DT Company Overview January 2013
Building Hybrid DApps using Blockchain Tactics - The Meta-Transaction Example...
Big Data Analytics and Advanced Computer Networking Scenarios
Varshneya samdarshi lmu_symposium_2016
Ad

Planning and Dependency Reasoning