際際滷

際際滷Share a Scribd company logo
OODA.MODELS.CODE.VELOCITY
Aneel Lakhani
NOT QUALIFIEDTO
GIVETHISTALK
Marketing
Analyst
Product
Infra Arch
Net Eng
Sys Admin
NOC Op
Tech Support
HE IS
USAF Colonel & Military Strategist
John Richard Boyd
OODA
OBSERVE
ORIENT
DECIDE
ACT
ECOLOGICAL PSYCHOLOGY
AFFORDANCES
Empirical Psychologist
James J. Gibson
A KNOB AFFORDSTWISTING,AND PERHAPS PUSHING,WHILE A CORD
AFFORDS PULLING.
AN AFFORDANCE [IS]THE POSSIBILITY OF SOME ACTION,AND IS NOT A
PROPERTY OF EITHER AN ORGANISM OR ITS ENVIRONMENT ALONE.
COGNITION GRASPS
AFFORDANCES
ACTION UNLOCKS
AFFORDANCES
OODA == COGNITION-ACTION
OODA : COGNITION-ACTION
::
__ :AFFORDANCE
HOW DO WE GO FROM OBSERVATION
TO ORIENTATION?
HOW DO WE GO FROM ORIENTATION
TO DECISION?
WE BUILD MODELS
WE PUT OBSERVATIONS INTO MODELS
WE [TENDTO] IGNORE OBSERVATIONS
THAT DONT FIT OUR MODELS
WE ORIENT WITH ANDTO MODELS
WE MAKE DECISIONS [ONLY] WITHIN
THE FRAMEWORKS OF OUR MODELS
WE MODEL ALLTHETHINGS
FASTER!!!
[CARGO CULTVERSION]
OPERATE INSIDETHE
[ADVERSARYS]
TIME SCALE
1 Adversary 1: OODA
2 Adversary 1: OODA
3 Adversary 1: OODAOODAOODA
4 Adversary 1: OODA^X
Adversary 2: OOD_
Adversary 2: OO__
Adversary 2: OOD_OO_O_
Adversary 2: OOD_O_D_A_O
MOVING FORWARD INTIME
PARTS OFTHE LOOP ARE NOT EQUAL
OBSERVE & ACT
VS
ORIENT & DECIDE
FIRST-ORIENTER
DISADVANTAGE
Law & Finance Professor
Frank Portnoy
DELAYING
DECIDE-ACT
OFTEN MEANS
COMING OUT
AHEAD
MAPPING
WONDER, PEACE,WAR
BUSINESS CYCLES
Researcher of Strategy & Mapmaker
Simon Wardley
MULTIPLE
PRACTICES,
CULTURES,AND
STAGES OF
EVOLUTION
COEXIST
CAUSING AN ADVERSARYS MODELTO BE
INVALID ISTHE PRIMARY MEANS OF
WINNING
TAKING OUR MODELSTOO SERIOUSLY IS A
RISK WAITINGTO BE EXPLOITED (OR
BLOWN UP)
BLACK SWANS
ANTIFRAGILITY
Professor of Risk Engineering
N. N.Taleb
BLACK SWANS LIE
OUTSIDE OUR
MODELS
[IMMOVABLE]
MODELS CREATE
FRAGILITY
SCALES OF
ABSTRACTION
PROMISETHEORY
Architect of CFEngine
Mark Burgess
EVERY MODEL HAS
A HALF LIFE
SO WHAT?
THERES AN INHERENT ADVANTAGE
WHEN EVERYTHING IS CODE
OBSERVATION CAN BE INSTRUMENTED
SCALED BEYOND HUMAN CAPACITY
ACTION CAN BE AUTOMATED
SCALED BEYOND HUMAN CAPACITY
ORIENTATION AND DECISION CAN BE
SHORT-CIRCUITED [FOR KNOWN MODELS]
SCALED BEYOND HUMAN CAPACITY
TIME CAN BE REALLOCATEDTO ORIENTING
AND DECIDING IN NOVEL CONTEXTS
SCALING TO HUMAN CAPACITY
CAUTION:ALL MODELS ARE WRONG,
SOME ARE USEFUL [IN SOME CONTEXT]
CAUTION: OUR MODELS ARE BIASED
BY OUR BIASES
CAUTION: MODELS ARE NOT
SCALE-INVARIANT
Scales: number, size, resolution, frequency, dimensionality, time, rate of change
CAUTION: SAFE MODELS BECOME RISKY
AT DIFFERENT SCALES / CONTEXTS
KNOW THE CONTEXT
SEEK MODEL INVALIDATION
ORIENTATION AND DECISION
Through streaming analytics, exploring metrics in real time, as theyre created, building
meaningful (composite) signals, creating leverage for Orient and Decide.
Invalidating models daily.
READ PRIMARY SOURCES
(OR FEWEST DEGREES FROM)
READING
blog.gardeviance.org - kitchensoap.com
THANKS
Aneel
@aneel - aneel@signalfx.com
ADVANCED MONITORING PLATFORM
FOR MODERN APPLICATIONS
https://signalfx.com
IMAGE CREDITS
 J.J. Gibson: Cornell University Library
 Frank Partnoy: Startup Grind
 N.N.Taleb: NYTimes
 Mark Burgess: markburgess.org
 Book cover images from Amazon
 Coffee: me
 Me: not me
Ad

Recommended

Dan North Embracinguncertaintyv3
Dan North Embracinguncertaintyv3
Adrian Treacy
ICOT 2015 speech
ICOT 2015 speech
David Patrishkoff
MapReduce In The Cloud Infinispan Distributed Task Execution Framework
MapReduce In The Cloud Infinispan Distributed Task Execution Framework
Manik Surtani
Java Performance Analysis on Linux with Flame Graphs
Java Performance Analysis on Linux with Flame Graphs
Brendan Gregg
Linux 4.x Tracing Tools: Using BPF Superpowers
Linux 4.x Tracing Tools: Using BPF Superpowers
Brendan Gregg
Railway Oriented Programming
Railway Oriented Programming
Scott Wlaschin
Linux Profiling at Netflix
Linux Profiling at Netflix
Brendan Gregg
Linux Performance Analysis: New Tools and Old Secrets
Linux Performance Analysis: New Tools and Old Secrets
Brendan Gregg
DeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSO
Alexander Hutton
BBOM-AgilePT-2010
BBOM-AgilePT-2010
Joseph Yoder
THE AMBIDEXTERITY PRINCIPLE: How Ambidextrous Leaders, Strategists, and Teams...
THE AMBIDEXTERITY PRINCIPLE: How Ambidextrous Leaders, Strategists, and Teams...
Rod King, Ph.D.
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Risks and strategies adopting agile in medium and large organizations
Risks and strategies adopting agile in medium and large organizations
Agile Software Community of India
Chaos engineering - The art of breaking stuff in production on purpose
Chaos engineering - The art of breaking stuff in production on purpose
Geert van der Cruijsen
Innovate or Die: Applied Innovation
Innovate or Die: Applied Innovation
Madhu Venkatesan
R3 Process Training
R3 Process Training
Mike Sloop
Nick Fine - Scientific Design
Nick Fine - Scientific Design
uxbri
Business of Experience Workshop - DE IA
Business of Experience Workshop - DE IA
Jess McMullin
Strategy execution: The Execution Shortcut by Jeroen De Flander PDF
Strategy execution: The Execution Shortcut by Jeroen De Flander PDF
Jeroen De Flander
Attitude measurement and scaling techniques
Attitude measurement and scaling techniques
Kritika Jain
Counter IED Philosophy and Threat Management in the Indian Context Securing A...
Counter IED Philosophy and Threat Management in the Indian Context Securing A...
IPPAI
Beating Uncertainty and Scarcity using Kanban @ LKNA2017
Beating Uncertainty and Scarcity using Kanban @ LKNA2017
Adam Wu
Winchester BODGIT (Andy Wilson)
Winchester BODGIT (Andy Wilson)
Bex Lewis
Ahmed Sidky (Keynote)
Ahmed Sidky (Keynote)
AgileNZ Conference
Enterprise re novation january 2013
Enterprise re novation january 2013
Shahid Solomon
Transparency in incident response
Transparency in incident response
Squadcast Inc
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) 際際滷s
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) 際際滷s
Ravi Tamada
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays

More Related Content

Similar to OODA.MODELS.CODE.VELOCITY - Velocity 2015 (18)

DeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSO
Alexander Hutton
BBOM-AgilePT-2010
BBOM-AgilePT-2010
Joseph Yoder
THE AMBIDEXTERITY PRINCIPLE: How Ambidextrous Leaders, Strategists, and Teams...
THE AMBIDEXTERITY PRINCIPLE: How Ambidextrous Leaders, Strategists, and Teams...
Rod King, Ph.D.
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Risks and strategies adopting agile in medium and large organizations
Risks and strategies adopting agile in medium and large organizations
Agile Software Community of India
Chaos engineering - The art of breaking stuff in production on purpose
Chaos engineering - The art of breaking stuff in production on purpose
Geert van der Cruijsen
Innovate or Die: Applied Innovation
Innovate or Die: Applied Innovation
Madhu Venkatesan
R3 Process Training
R3 Process Training
Mike Sloop
Nick Fine - Scientific Design
Nick Fine - Scientific Design
uxbri
Business of Experience Workshop - DE IA
Business of Experience Workshop - DE IA
Jess McMullin
Strategy execution: The Execution Shortcut by Jeroen De Flander PDF
Strategy execution: The Execution Shortcut by Jeroen De Flander PDF
Jeroen De Flander
Attitude measurement and scaling techniques
Attitude measurement and scaling techniques
Kritika Jain
Counter IED Philosophy and Threat Management in the Indian Context Securing A...
Counter IED Philosophy and Threat Management in the Indian Context Securing A...
IPPAI
Beating Uncertainty and Scarcity using Kanban @ LKNA2017
Beating Uncertainty and Scarcity using Kanban @ LKNA2017
Adam Wu
Winchester BODGIT (Andy Wilson)
Winchester BODGIT (Andy Wilson)
Bex Lewis
Ahmed Sidky (Keynote)
Ahmed Sidky (Keynote)
AgileNZ Conference
Enterprise re novation january 2013
Enterprise re novation january 2013
Shahid Solomon
Transparency in incident response
Transparency in incident response
Squadcast Inc
DeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSO
Alexander Hutton
BBOM-AgilePT-2010
BBOM-AgilePT-2010
Joseph Yoder
THE AMBIDEXTERITY PRINCIPLE: How Ambidextrous Leaders, Strategists, and Teams...
THE AMBIDEXTERITY PRINCIPLE: How Ambidextrous Leaders, Strategists, and Teams...
Rod King, Ph.D.
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Risks and strategies adopting agile in medium and large organizations
Risks and strategies adopting agile in medium and large organizations
Agile Software Community of India
Chaos engineering - The art of breaking stuff in production on purpose
Chaos engineering - The art of breaking stuff in production on purpose
Geert van der Cruijsen
Innovate or Die: Applied Innovation
Innovate or Die: Applied Innovation
Madhu Venkatesan
R3 Process Training
R3 Process Training
Mike Sloop
Nick Fine - Scientific Design
Nick Fine - Scientific Design
uxbri
Business of Experience Workshop - DE IA
Business of Experience Workshop - DE IA
Jess McMullin
Strategy execution: The Execution Shortcut by Jeroen De Flander PDF
Strategy execution: The Execution Shortcut by Jeroen De Flander PDF
Jeroen De Flander
Attitude measurement and scaling techniques
Attitude measurement and scaling techniques
Kritika Jain
Counter IED Philosophy and Threat Management in the Indian Context Securing A...
Counter IED Philosophy and Threat Management in the Indian Context Securing A...
IPPAI
Beating Uncertainty and Scarcity using Kanban @ LKNA2017
Beating Uncertainty and Scarcity using Kanban @ LKNA2017
Adam Wu
Winchester BODGIT (Andy Wilson)
Winchester BODGIT (Andy Wilson)
Bex Lewis
Enterprise re novation january 2013
Enterprise re novation january 2013
Shahid Solomon
Transparency in incident response
Transparency in incident response
Squadcast Inc

Recently uploaded (20)

Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) 際際滷s
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) 際際滷s
Ravi Tamada
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
Mastering AI Workflows with FME by Mark Doring
Mastering AI Workflows with FME by Mark Doring
Safe Software
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
Daily Lesson Log MATATAG ICT TEchnology 8
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
The Growing Value and Application of FME & GenAI
The Growing Value and Application of FME & GenAI
Safe Software
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) 際際滷s
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) 際際滷s
Ravi Tamada
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
Mastering AI Workflows with FME by Mark Doring
Mastering AI Workflows with FME by Mark Doring
Safe Software
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
Daily Lesson Log MATATAG ICT TEchnology 8
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
The Growing Value and Application of FME & GenAI
The Growing Value and Application of FME & GenAI
Safe Software
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
Ad

OODA.MODELS.CODE.VELOCITY - Velocity 2015