Thursday, February 6, 2025

 Air-borne UAV swarm prefers formation in many cases. There are several factors that play into this but primarily a formation ensures all fleet units go through the waypoints with minimal overhead and computation as long as constraints permit. They reach a common objective together and complete the main mission in the most energy efficient manner and with high throughput. Formation also provides mutual protection, enhanced defense and support against threats. Communication and co-ordination, although not cheap, ensures that all units are easily accounted for and their telemetry indicates continuous progress for everyone. There is efficient use of resources like fuel or battery power and some of the drones internal to the formation can conserve their sensors.

Conversely, when they break up it is most likely that no size for the formation is tolerated by the constraints of the landscape. For example, flying under a bridge with an absolute restriction on the height forces the formation to fly one-by-one through the space under the bridge. The transformation from the formation to a queue of solo flying units and subsequent regrouping can be both easy and smooth in anticipation of the constraint and its subsequent relaxation after the constraint is overcome. These tactical manoeuvres are part of the constraints and thresholds based decisions. Similarly, splitting of a few units from the formation to parallelize the throughput across multiple arches of bridges is also possible just as much as wind and weather conditions might dictate making it safe to fly one unit at a time through one arch. The overall adherence to the trajectory is not sacrificed and the splitting of a fraction of the UAV swarm provides more sensor information via scouting. Equipment malfunctions also might cause the units to break from formation and regroup when permissible.

A previous article described the formation of a UAV swarm when aligning to a point, line and plane. While the shape formations in these cases are known, the size depends on the number of units in the formation, the minimum distance between units, the presence of external infringements and constraints and the margin required to maintain from such constraints. The article also described the ability to distribute drones to spread as close to the constraints using self-organizing maps which is essentially drawing each unit to the nearest real-world element that imposes a constraint. This establishes the maximum boundaries for the space that the UAV swarm occupies with the core being provided by the point, line, or plane that the units must align to. Given the minimum-maximum combination and the various thresholds for the factors cited, the size of the shape for the UAV swarm at a point of time can be determined.

#Codingexercise: Codingexercise-02-06-2025

Wednesday, February 5, 2025

Friends of appropriate ages:

There are n persons on a social media website. You are given an integer array ages where ages[i] is the age of the ith person.

A Person x will not send a friend request to a person y (x != y) if any of the following conditions is true:

• age[y] <= 0.5 * age[x] + 7

• age[y] > age[x]

• age[y] > 100 && age[x] < 100

Otherwise, x will send a friend request to y.

Note that if x sends a request to y, y will not necessarily send a request to x. Also, a person will not send a friend request to themself.

Return the total number of friend requests made.

Example 1:

Input: ages = [16,16]

Output: 2

Explanation: 2 people friend request each other.

Example 2:

Input: ages = [16,17,18]

Output: 2

Explanation: Friend requests are made 17 -> 16, 18 -> 17.

Example 3:

Input: ages = [20,30,100,110,120]

Output: 3

Explanation: Friend requests are made 110 -> 100, 120 -> 110, 120 -> 100.

Constraints:

• n == ages.length

• 1 <= n <= 2 * 104

• 1 <= ages[i] <= 120

class Solution {

    public int numFriendRequests(int[] ages) {

        int[][] requests = new int[ages.length][ages.length];

        for (int i = 0; i < ages.length; i++) {

            for (int j = 0; j < ages.length; j++){

                requests[i][j] = 0;

            }

        }

        int sum = 0;

        for (int i = 0; i < ages.length; i++) {

            for (int j = 0; j < ages.length; j++){

                if (i == j) continue;

                if (ages[j] <= 0.5 * ages[i] + 7) continue;

                if (ages[j] > ages[i]) continue;

                if (ages[j] > 100 && ages[i] < 100) continue;

                requests[i][j] = 1;

                sum += 1;

            }

        }

        return sum;

    }

}


Monday, February 3, 2025

 This is a summary of the book titled “Valley Girls: Lessons From Female Founders in the Silicon Valley and Beyond” written by Kelley Steven-Waiss and published by Forbes Books in 2024. The author is an HR executive and entrepreneur who investigates why women founders tend to do more to secure investors and gain respect and recognition than their male counterparts. Having been there and faced that, she proposes an abundance mindset instead and team-oriented play which she draws from other female founders. In this book, the old playbooks and establishment myths are torn apart and women’s superpowers are tapped into. “Intrapreneurship” is recommended and suggestions are made to observe the “pattern-match” that male investors are drawn to. Women’s unique skills and women founders’ advocacy groups are not realized to their full potential. Powerful women must stand by their promises.

More women are graduating from universities in various disciplines, and their presence in the professional workforce is increasing. This means that female founders launching tech start-ups must embrace reality to dispel myths about their traits. Historically, men have dominated the field, and venture capitalists remain reluctant to invest in companies founded by women. However, women are well-suited to entrepreneurship as they are cooperative dolphins, nurture allies, are made, creative, and manage risk. Human resources executives should offer opportunities to challenge and engage their staff, such as access to assignments and projects that suit their skills and goals. Women entrepreneurs have hidden superpowers that grant them advantages, such as a collaboration mindset, leading from values and purpose, seeing value in teamwork, and identifying the win-win mindset. To persevere, women need a great team, nurture their input, share wealth, and invest in their future.

Intrapreneurship is a strategy that allows entrepreneurs to experiment with another organization's money and network, overcoming the lone-wolf stereotype among male entrepreneurs. This approach is particularly beneficial for women who struggle to attract venture capital, as it allows them to experiment with other organizations' resources and networks. For example, Steven-Waiss, a former chief human resources officer (CHRO), collaborated with HERE Technologies to launch her start-up, Hitch, which provided her with a lab, expertise, technology, and a large client base.

However, obstacles to women's success include a toxic culture and leaders who resist change. To overcome these, women should remain authentic and demonstrate a win-win abundance mindset. To pitch, women should learn how to pitch and tap into their network of friends and investors. Despite knowing the statistics, only 3% of US business owners receive venture capital, and only 17.2% have a man on their team.

Women investors often lack the experience and power to make big investment decisions in venture capital (VC) firms, as they are often junior staff members hired to fulfill diversity requirements. The top VC echelon is overwhelmingly male, and general partners often need 10 years of proven ROI success to advance within VC firms. Female VCs may not always prioritize the best interests of female founders, and companies that raise initial funding exclusively from female VCs are two times less likely to receive funding from male VC partners in the second round of financing. During the COVID pandemic, businesses struggled to adapt to volatile situations and remote work models, affecting both start-ups and female founders. Female founders may find greater success if they seek VC funding first from male investors. As women chart their course in leadership roles, their unique skills may find more appreciation and respect. Women executives have exceptional knowledge and expertise, but men tend to discount them as entrepreneurs due to their lack of a male CEO's profile.

Powerful women must stand by their promises and support one another to change the business world. Boards of directors prioritize financial skills over people skills, but change can be achieved by promoting mutual support and investment among female tech entrepreneurs. Three tech-industry female founders helped Hitch founder, Steven-Waiss, during the acquisition process, aiming to optimize workforces and earn back investment. ServiceNow hired Steven-Waiss to run Hitch, and she finds gratification in the results and the ability to earn and promote mutual support among female technology entrepreneurs.

#Codingexercise: Codingexercise-02-03-2025

Sunday, February 2, 2025

 Friends of appropriate ages:

There are n persons on a social media website. You are given an integer array ages where ages[i] is the age of the ith person.

A Person x will not send a friend request to a person y (x != y) if any of the following conditions is true:

• age[y] <= 0.5 * age[x] + 7

• age[y] > age[x]

• age[y] > 100 && age[x] < 100

Otherwise, x will send a friend request to y.

Note that if x sends a request to y, y will not necessarily send a request to x. Also, a person will not send a friend request to themself.

Return the total number of friend requests made.

Example 1:

Input: ages = [16,16]

Output: 2

Explanation: 2 people friend request each other.

Example 2:

Input: ages = [16,17,18]

Output: 2

Explanation: Friend requests are made 17 -> 16, 18 -> 17.

Example 3:

Input: ages = [20,30,100,110,120]

Output: 3

Explanation: Friend requests are made 110 -> 100, 120 -> 110, 120 -> 100.

Constraints:

• n == ages.length

• 1 <= n <= 2 * 104

• 1 <= ages[i] <= 120

class Solution {

    public int numFriendRequests(int[] ages) {

        int[][] requests = new int[ages.length][ages.length];

        for (int i = 0; i < ages.length; i++) {

            for (int j = 0; j < ages.length; j++){

                requests[i][j] = 0;

            }

        }

        int sum = 0;

        for (int i = 0; i < ages.length; i++) {

            for (int j = 0; j < ages.length; j++){

                if (i == j) continue;

                if (ages[j] <= 0.5 * ages[i] + 7) continue;

                if (ages[j] > ages[i]) continue;

                if (ages[j] > 100 && ages[i] < 100) continue;

                requests[i][j] = 1;

                sum += 1;

            }

        }

        return sum;

    }

}


Saturday, February 1, 2025

 

How AI influences DevSecOps?

DevSecOps professionals have Artificial Intelligence (AI), security and automation as top priorities in most organizations. Both resources and data are veritable assets for guarding actions by actors and the degree to which an organization is invested in either determine the fine-tuning of the allocations within the pie-chart of priorities for these professionals. Most would use Agile methodologies to improve and secure their assets. AI would follow that in the list as it is still catching up on Software Development Lifecycle. Organizations realize that it is essential to adopt AI to avoid falling behind. The key challenges they face are security, safety, and experience. Others include privacy and data security, the right set of AI tools, upskilling requirements, and concerns about vulnerabilities. Although these challenges are not new, what makes it difficult for DevSecOps professionals, as cited in industry reports from reputed sources, is the low turnover in their population combined with a tendency to ramp up gradually. As such this discipline has room for improvement when compared to software development in customer-facing products.

DevSecOps are eager to adopt the Generative AI for its transformative potential. Many cite use cases in forecasting productivity metrics, identifying anomalies, vulnerabilities explanations and remediations, and chatbots for interactions. Machine data including telemetry unlike sensitive data like Personally identifiable information, are both voluminous and difficult to search without friendly operators and curated queries. As products, solutions and services for this data make AI more built-in to their offerings, the integration becomes even more complex than it was earlier, not to mention the eccentricities, nuances, and defects to overcome. Consequently, some in-house solutions to directly explore the data and respond to typical queries for preliminary investigation report comes in handy.

Most of the code for automation comes from open-source software libraries. Capabilities like a software bill-of-materials aka SBOM – a list of all the components, libraries and modules that make up an application are essential for maintaining the security of the software supply chain, especially as the amount of code pulled from open-source libraries increases. Unfortunately, SBOMs aren’t maintained as code sprawls the landscape. When it comes to hosting and executing logic in containers for scaling on demand, many fail to guard against their programmability interfaces such as web APIs by mitigating OWASP threats with request-parameter inspections and web-application firewalls. Dynamic application security testing, and fault injections-based testing are also insufficient. There has always been a cultural gap around security with DevSecOps professional often depending on development teams to resolve vulnerabilities defects. Many don’t even have the proper role-based access control.

A further list of AI safety and security practices is also available which puts the efforts required from DevSecOps professionals in perspective.

Reference: previous articles

Friday, January 31, 2025

 This is a summary of the book titled “Deeply responsible business: A global history of values driven leadership” written by Geoffrey Jones and published by Harvard UP, 2023. Global. The author is a Harvard professor who contends that business leaders and their companies can reimagine capitalism to be beyond profit seeking and prioritize social purpose and philanthropy. This is especially relevant now when there are many companies coming into new exploiting their wealth and position to manipulate politics and the law. This approach requires the company to demonstrate their stated values. History has shown that such reimagining has borne success. During the industrial revolution, some business leaders still valued human dignity more than anything else. Many business leaders outside the west became wealthy capitalists. A textile manufacturer in India helped build a better economy. After the second world war, US business leaders came to value social responsibility. Value-driven business demonstrate responsibility and better integrate into thriving communities. Social responsibility in business requires strong incentives. Strong values motivate responsible business leaders.

During the Industrial Revolution, some business leaders prioritized human dignity over profit. In Britain, workers faced stagnant wages, dangerous conditions, and child labor. Some employers believed that profits should not come at the expense of their impoverished workers. Textile manufacturer Robert Owen provided his employees with a community, schools, and cultural center, recognizing that improving their lives would benefit his company. Quakers in Britain were prominent entrepreneurs, running their own schools and apprenticeship programs. George Cadbury, heir to his father's chocolate manufacturing business, embraced religious and moral convictions, allowing workers to buy houses at cost and provide mortgages.

As industrialization spread across Western Europe and North America, a wealth gap had built up between the industrialized West and the rest of the world. Members of India's Parsi community excelled in responsible business and entrepreneurship, emphasizing the importance of improving people's lives. Indian industrial pioneer Jamsetji Nusserwanji developed modern cotton textile factories and became wealthy, but his company focused on serving its communities, including employee housing, healthcare, and education.

Before India's independence in 1947, the country faced social and economic challenges. Textile manufacturer Kasturbhai Lalbhai, from an affluent Jain merchant family, supported India's independence and played a pivotal role in developing the country. Lalbhai launched India's first dye manufacturing company with American technical and financial help, aiming to generate jobs in rural areas and create residential communities. He believed in the importance of social responsibility in business and the moral and spiritual responsibility of business leaders to improve their communities. After World War II, some US business leaders began to value social responsibility, such as George Romney, who promoted the Rambler as an alternative to larger cars. However, the compact market was taken away by cheaper cars like the Volkswagen Beetle in the early 1960s.

In the 1960s, a new generation of businesspeople emerged, bringing new social and cultural norms, and rejecting the gray establishment of the 1950s. This generation included hippies, rock music acolytes, Vietnam War protesters, environmentalists, and feminists. They were critical of capitalism and the existing relationship between business and society. Values-driven businesses emerged in fields that could facilitate social or environmental change, such as energy use and retailing. Entrepreneurs like John Mackey and Anita Roddick aimed to transform the beauty industry and society's perception of women. Responsible businesses like Sekem and Ambootia incorporated into thriving communities, adhering to Rudolf Steiner's global principles. Social responsibility in business requires strong incentives, and the availability of capital is the principal enabler. Responsible business leaders who turn to social and environmentally beneficial practices can shape the availability of capital and create incentives to invest. Environmental, Social, and Governance (ESG) investing is growing in global markets, but its practical relevance relies on voluntary information and can be easily distorted.

Responsible business leaders create products or services with social value, treating stakeholders with dignity and respect. They recognize business organizations as human social institutions and accept responsibility for employees, customers, and the natural world. These leaders value communities, provide dignified housing, educational opportunities, and cultural life, and improve people's well-being by improving life in their communities.


Thursday, January 30, 2025

 Small and medium businesses aka SMBs are targets of cyberattacks and their strategies to cope with these threats are much different from those of enterprises. This article lists a few of them.

SMBs also hold valuable sensitive data such as employee and customer records, financial transaction information, intellectual property, and access to business finances and larger networks critical to their success. Cybercriminals recognize both the vulnerability and the value of SMBS. Among the different types of attacks on SMB, the common attacks include malware developed to manipulate or compromise target systems, malware free attacks that don’t leave artifacts and move laterally to compromise target systems, vulnerabilities in systems and applications that can be compromised to gain unauthorized access to computer systems, phishing and email based scams that impersonate credible people and organizations to steal credentials, compromised credentials in the form of stolen identity and account data, insider threats where employees become accomplices, and zero-days where new and unprecedented exploits are leveraged to mount planned and targeted attacks.

Traditional methods such as virus and malware detection based on signatures are no longer sufficient. In addition, penetration into the SMB assets can be leveraged for lateral movement and data exfiltration which significantly increases the loss. Data theft, ransomware, extortion and hacktivism are only some of the examples.

Strategies to counter these attacks include:

1. Understand the reality of cyberattacks: There are hundreds of adversary groups that launch cyberattacks. Sensitive data is always a prime target regardless of what business owns it. Antivirus and firewall are not sufficient. Sometimes breaches go undetected for hundreds of days. Costs for continuity and recovery can be so high that SMBs may not recover.

2. Implement basic cybersecurity hygiene practices. These include strong password policies, enforcing multi-factor authentications, performing regular backups of critical data, keeping current with security patches and updates, locking down cloud environments, implementing and testing threat detection and response, and securing your network.

3. Employee upskilling, education and training and regular assessments: Inform the employees of improvements to authentication channels and continuously test their responsiveness with asking them to identify fraudulent messages.

4. Overcoming limited resources and expertise: When expert resources seem out of reach, there can be automations and dedicated teams to set policies and monitor, respond to and stop attacks.

A managed detection and response service or solution may also be a best fit for your business.