Entity

Time filter

Source Type

Northfield, VT, United States

Norwich University – The Military College of Vermont is a private university located in Northfield, Vermont . It is the oldest private military college in the United States. The university was founded in 1819 at Norwich, Vermont, as the American Literary, Scientific and Military Academy. It is the oldest of six senior military colleges, and is recognized by the United States Department of Defense as the "Birthplace of ROTC" . Norwich University has a mixed student body that includes a Corps of Cadets and traditional civilian students. Wikipedia.


Methods and apparatus for advancing time in a distributed business process simulation are disclosed. The methods and apparatus simulate an interdependent business process, such as a financial transaction system, in a secure distributed manner. Each business entity that is part of the interdependent business process models itself on a local client device at any chosen level of detail. A simulation server connects the separate client based simulations into one large simulation. Details of each local simulation may be hidden from other simulation participants. However, interruptions in business flow caused by simulated disruptions introduced at the simulation server and/or a client device are propagated to all of the effected simulation participants via the simulation server. In addition, simulation time may be warped from one breakpoint to another breakpoint thereby facilitating an efficient ratio of simulation time to real time.


Methods and apparatus for advancing time in a distributed business process simulation are disclosed. The methods and apparatus simulate an interdependent business process, such as a financial transaction system, in a secure distributed manner. Each business entity that is part of the interdependent business process models itself on a local client device at any chosen level of detail. A simulation server connects the separate client based simulations into one large simulation. Details of each local simulation may be hidden from other simulation participants. However, interruptions in business flow caused by simulated disruptions introduced at the simulation server and/or a client device are propagated to all of the effected simulation participants via the simulation server. In addition, simulation time may be warped from one breakpoint to another breakpoint thereby facilitating an efficient ratio of simulation time to real time.


Patent
Norwich University | Date: 2013-09-11

A method for evaluating the vulnerability of a system having at least one portal is provided, wherein at least a portion of the method is implemented via a controller. The method includes examining the at least one portal to identify at least one accessible portal, performing a qualitative analysis responsive to the at least one accessible portal, generating a risk profile responsive to the performing a qualitative analysis and operating the controller to cause the controller to at least one of log the risk profile in a storage device, and display the risk profile via a display device.


Methods and apparatus for simulating risk tolerance and associated adversary costs in a distributed business process are disclosed. The methods and apparatus simulate an interdependent business process, such as a financial transaction system, in a secure distributed manner. Each business entity that is part of the interdependent business process models itself on a local client device at any chosen level of detail. A simulation server connects the separate client based simulations into one large simulation. Details of each local simulation may be hidden from other simulation participants. However, interruptions in business flow caused by simulated disruptions introduced at the simulation server and/or a client device are propagated to all of the effected simulation participants via the simulation server. In addition, the simulation server receives inputs from users indicative of risk tolerance levels and associated response actions. If the operational costs imposed by a selected response action are greater than a deterrence threshold associated with a particular adversary, the adversary is not deterred from causing a certain disruption to the simulated competitive market environment. If the operational costs imposed by a selected response action are greater than the deterrence threshold the adversary is deterred.


Patent
Norwich University | Date: 2011-07-21

Methods and apparatus for simulating a distributed business process are disclosed. The methods and apparatus simulate an interdependent business process, such as a financial transaction system, in a secure distributed manner. Each business entity that is part of the interdependent business process models itself on a local client device at any chosen level of detail. A simulation server connects the separate client based simulations into one large simulation. Details of each local simulation may be hidden from other simulation participants. However, interruptions in business flow caused by simulated disruptions introduced at the simulation server and/or a client device are propagated to all of the effected simulation participants via the simulation server. In addition, if a client based model is not available, the server supplies a software agent to replace the inputs and outputs normally associated with that portion of the overall simulation.

Discover hidden collaborations