JADE HELM 15: Militia Jewbait

Started by Michael K., March 27, 2015, 10:08:31 PM

Previous topic - Next topic

Michael K.

Recently the alternative media in the 'Kwa has been able to publicize secretive government plans to conduct a major "realistic military training" among the civilian population, featuring months of counterinsurgency pseudo terror by special operations forces, in conjunction with all levels of law enforcement. 

At the very same time a torrent of internet propaganda has washed over Jew tube and related media suggesting that militias both should and are about to declare war on the establishment.   

This relates back to JADE HELM 15 in that it both justifies it as morally necessary, and provides the impetus for possibly violent reactions to it, which may make it believable if and when it all "goes live."

By "goes live", I specifically refer to the evidence given in the following video, where an Army officer speaking in an official capacity claims the operations are supposed to wrap up exactly on September 11. 

(Unless, of course, domestic extremists choose right then to do something silly...)



Some background info, if you didn't get the whole story before:

http://freedomoutpost.com/2015/03/jade-helm-15-is-real-heres-the-proof/



Just as the B-movie plot has all the elements for a sinister police state crackdown, so too it has its siren call towards foolish and quixotic resistors to come out and show their genitalia and anuses to the camera and authority figures.

The level of this propaganda message is so shrill and plainly appealing to the retarded among us, it really appears to be made of whole cloth by genuine enemies of those whose interests it purports to serve.

But a few examples of the militia jewbait:





Nobody real puts their name to such trash, which is unlike the actual journalism of the people trying to get to the truth.  Just a bunch of ugly associations meant to smear and entangle them.  This is the kind of shit they keep recommending to me:

"A.R.M.S. Militia channel":
https://m.youtube.com/channel/UCmKmw67k9pd2MSBWoeNz3NQ

"FisherOfMen channel"
https://m.youtube.com/channel/UCNf3BSkOY0w8NHzc1nV7LZg

Virtually cut out of the same shmutz.  LOL  <:^0

yankeedoodle

'Emergency alert' sparks panic among TV viewers nationwide
http://rt.com/usa/245493-fema-alert-television-emergency/?utm_source=browser&utm_medium=aplication_chrome&utm_campaign=chrome

QuoteThe residents of about a dozen US states received a scare when an ominous message rolled across their TV screens announcing an 'emergency alert' with the names of their states – without any explanation or further information.
...
Americans across the country took to social media to express a wide range of emotions – from bewilderment to panic – as the alert gave no indication that it was only a test.

rmstock



The narrative here is that if Noodelman & Neocon send arms to Kiev, Russia
will send arms to Mexico and another country to take back the
countries which are named inside the Treaty of Guadalupe Hidalgo from February 2, 1848 :

  "[ ... ]
   It gave the United States the Rio Grande as a boundary for Texas, and
   gave the US ownership of California and a large area comprising New
   Mexico, Arizona, Nevada, Utah, and parts of Wyoming and Colorado.
   Mexicans in those annexed areas had the choice of relocating to within
   Mexico's new boundaries or receiving American citizenship with full
   civil rights. Over 90% chose to become US citizens.
   [ ... ]"


``I hope that the fair, and, I may say certain prospects of success will not induce us to relax.''
-- Lieutenant General George Washington, commander-in-chief to
   Major General Israel Putnam,
   Head-Quarters, Valley Forge, 5 May, 1778

Michael K.

Rmstock, that narrative is almost certainly connected to the operations, as if somehow there are militias being armed by the Russians in those states.

I certainly see some connection between the whole thing and this 2014 video.  This man claimed in the video to have preached that Christians should gather and set up tents in Waco back during the Branch Davidian cult disaster. 

Today he says that Christians are about to undergo persecution by a godless state.  Good thing they have a friend in Israel.

"Jewish Prophet" gives alarmist message to gullible peckerwoods:



Michael K.

I can smell fresh bait on the deck, mates:

Be powerful afeared...it's gonna hurt.



MI6 calling...is anybody out there?


Michael K.

OK rmstock, check out what come out of the cookie cutter:          <:^0

http://www.interpretermag.com/texas-secessionist-invited-to-moscow-and-seeks-russian-support-for-his-cause/



Window on Eurasia -- New Series
Monday, March 23, 2015

Texas Secessionist Invited to Moscow and Seeks Russian Support for His Cause

Paul Goble



            Staunton, March 23 – Many people around world have been focusing on and been horrified by the meeting of representatives of extreme right, even fascist parties in St. Petersburg over the weekend, but fewer have paid attention to another aspect of Moscow's outreach – to separatists around the world whose efforts may help Vladimir Putin by weakening his enemies.



            But that lack of attention may be partially rectified by an interview in Moscow's "Vzglyad" newspaper today with Nathan Smith, one of the leaders of the Texas Nationalist Movement which seeks independence from the US and is in Moscow at the invitation of the Kremlin-backed Anti-Globalist Movement of Russia (vz.ru/politics/2015/3/23/735599.html).



            Smith's group is a marginal one, and any support he might pick up in the Russian capital is likely to make it more so by alienating even those Texans who like himself are inclined to identify as Texans first and Americans second but who are unlikely to welcome the idea that their state could become independent with help from Moscow.

paul goble at 6:16 AM

Michael K.

But wait...there's more!

Act today because this offer won't last!

AR-15 still on sale at Walmart... Limited time to act..


Michael K.

One thing which is appearing over and over in the emerging internet phenomenon linked to Jade Helm 15 / martial law preparations, is that there is definitely propaganda with Russian/Soviet memes in it.   

It isn't clear whether it is an imitation of Red propaganda in an effort to defraud would be pro-Soviets,  or whether it is genuinely of Russian origin and thus a deceit aimed at the instigation of civil war.

Subtle they ain't, and all of these suspected Russo-props use inflammatory and yet nebulous fear language, sooo....

The Firestorm Movement.  Opens with red star and the word "revolution".  Title " They will imprison peppers patriots and all Americans.":




One can visit the Facebook pages of various chapters of the Firestool Movement and see what appears to be a vacant one sided conversation with no comments (a real artist would fake some comments...) Mostly trying to start a conversation that to my mind, nobody wants to have.


The leading candidate for 'most politically Eurasian' and certainly the one identifying holy Rus as the defenders of the supercontinent from the Khazar, it's title shares its bias, "Geopolitics for the US Militia."



Michael K.


Michael K.

Federal troop rape panic.  Be afraid says Pete Santilli.


Ognir

Jones is already banned here on TiU
Add that moron Santilli to the list

Most zionists don't believe that God exists, but they do believe he promised them Palestine

- Ilan Pappe

Michael K.

Reliable documents have been found by others which explain the acronym JADE:

http://www.dtic.mil/docs/citations/ADA398021

QUOTE:

Abstract : JADE (Joint Assistant for Deployment and Execution) is a knowledge-based mixed-initiative system that supports force deployment planning and management. JADE uses case-based and generative planning methods to support the development of large-scale, complex deployment plans in minimal time. JADE incorporates the technology of three tools: Prodigy-Analogy (a combined case-based and generative planner developed by Carnegie Mellon University); ForMAT (Force Management and Analysis Tool) that supports case-based force deployment planning developed by BBN Technologies); and PARKA (a highly-indexed knowledge based management system developed by the University of Maryland). With JADE, a military planner can build a preliminary force deployment plan, including the Time Phased Force Deployment Data (TPFDD) in less than one hour. This speed in plan construction is possible because JADE supports the rapid retrieval and reuse of previous plan elements for use in the development of new plans. In addition, JADE employs an easy to use map-oriented drag and drop interface where force modules (FMs) from previous plans (cases) whose force capabilities and composition match the requirements of the current situation can be dragged from the case library and dropped onto a geographic destination. Plan modification and/or adaption is supported through remindings, e.g., each time that a force module is created or is copied into a plan (TPFDD) the user is automatically reminded of the need for geographical changes.

Michael K.

Since JADE appears to be a type of artificial intelligence which makes military planning much faster and more streamlined, one thing that could imply is that HELM is also a computer programming reference. 

The information that exists about a gaming system called by that name fits in with the idea of advanced simulation using software tools.


http://helm-engine.org

Simple
Helm's API provides a simplistic and elegant way to make games. Besides a straight forward vector-graphics based drawing API, there's the obvious things like keyboard, mouse, joystick and framerate handling, but also higher-level concepts like automatons.

Dynamic
In Helm, input events like key presses and mouse clicks are accessed through a concept called signals — essentially values that change over time. This allows you to write logic dependent on input events like window resizes dynamically, without having to go to the extra effort to write callbacks that listen to events like in a regular game engine.

Powerful
Built on the Elerea FRP framework in Haskell, Helm aims to be simplistic by default but support complex behaviour when needed. To do this, Helm provides things like an implementation of piped-based signals called automatons that allow you to compose the concept of signals to do factory-like logic, i.e. operations that take an input and output something valuable.


https://github.com/switchface/helm/blob/master/README.md

Introduction

Helm is a functionally reactive game engine written in Haskell and built around the Elerea FRP framework. Helm is heavily inspired by the Elm programming language (especially the API). All rendering is done through a vector-graphics based API. At the core, Helm is built on SDL and the Cairo vector graphics library.

In Helm, every piece of input that can be gathered from a user (or the operating system) is hidden behind a signal. For those unfamiliar with FRP, signals are essentially a value that changes over time. This sort of architecture used for a game allows for pretty simplistic (and in my opinion, artistic) code.

yankeedoodle

#13
QuoteJim Stewart with the Brazos County, Texas Sheriff's Office told the Chronicle that such exercises are far from anything new.

'Special ops for years have trained off-post for years, where they go out and have folks that are role players out on the economy,' said the Army intelligence veteran. 'They'll have a scenario they'll be following and they'll interact with these role players as if they're in another count


http://www.theburningplatform.com/2015/03/28/operation-jade-helm/

US Army Special Operations Command
Request to Conduct
Realistic Military Training (RMT)
JADE HELM 15
1
UNCLASSIFIED//FOUO
US Army Special Operations CommandUNCLASSIFIED//FOUO
Purpose
The Commander of United States Army
Special Operation Command (USASOC)
seeks a written invitation and approval
from local officials to conduct Realistic
Military Training (RMT) within their
jurisdictions for joint military exercise,
JADE HELM 15 (JH15)
2
UNCLASSIFIED//FOUO
US Army Special Operations CommandUNCLASSIFIED//FOUO
What is Realistic Military Training
• Realistic Military Training (RMT) is training conducted outside of
federally owned property. The RMT process is designed to ensure
proper coordination between DOD representatives and local and
regional authorities. The process includes the following
measures:
– Risk Assessment, Medical, and Communications Plans
– MOU, MOA, and Licensing agreements (training areas, staging
areas, role players)
– Legal Review
– ID of training, staging areas, role players, airfield, drop zones
(DZ) and Landing Zones (LZ) surveys
– Letters of Invitations obtained from local officials (Mayor,
County Commission)
– Coordination with local, state and federal law enforcement
– Public Affairs Review
3
UNCLASSIFIED//FOUO
US Army Special Operations CommandUNCLASSIFIED//FOUO
What is JADE HELM
• JH is a challenging eight-week joint military and interagency
(IA) Unconventional Warfare (UW) exercise conducted
throughout Texas, New Mexico, Arizona, California,
Nevada, Utah and Colorado.
• JH is a US Special Operations Command (USSOCOM)
sponsored exercise to improve the Special Operations
Forces' UW capability as part of the National Security
Strategy
• JH 15 will run from 15 July through 15 September 2015
• Activities in Brazos County will occur between August 15 th
and August 21st
4
UNCLASSIFIED//FOUO
US Army Special Operations CommandUNCLASSIFIED//FOUO
Who and Where
• Participants:






US Army Special Forces Command (Green Berets)
US Navy SEALS
US Air Force Special Operations Command
USMC Marine Special Operations Command
82 nd Airborne Division
Interagency Partners
• Exercise Locations within Texas:
– Bastrop/Smithville, Big Springs, Caddo Lake, Caldwell, Christoval,
College Station, Dell City, Eldorado, Goliad, Junction, Leakey,
Menard, Mountain Home, San Angelo, San Antonio, and Victoria
• Exercise Locations within Brazos County:
– Texas A&M Riverside Campus
– TEEX Fire Field
5
UNCLASSIFIED//FOUO
US Army Special Operations CommandUNCLASSIFIED//FOUO
Why Texas
• The United States Special Operations Command
(USSOCOM) has conducted numerous exercises in Texas,
because Texans are historically supportive of efforts to
prepare our soldiers, airmen, marines and sailors to fight the
enemies of the United States.
• To hone advanced skills, the military and Interagency require
large areas of undeveloped land with low population
densities with access to towns. The proposed areas offer the
conditions conducive to quality training because of real
obstacles to challenge Joint and IA personnel during
planning and execution of their tasks. These challenges
include operating outside the normal support mechanisms
and adapting to unfamiliar terrain
6
UNCLASSIFIED//FOUO
US Army Special Operations CommandUNCLASSIFIED//FOUO
What to Expect
• Increased aircraft in the area at night
• May receive noise complaints
• All activities in Brazos County will take place
on TEEX and the Riverside campus
• Activities will occur between 11:00pm and
4:00am
• Personnel may be carrying weapons with
Simunitions
• Local LEO's are fully aware of the exercise
7
UNCLASSIFIED//FOUO
US Army Special Operations CommandUNCLASSIFIED//FOUO
Safety Measures
• Safety for civilians and exercise participants is
our number one priority
– Daily communications between DOD and LEA
– Medics located with each element
– Coordination with Life Flight and local medical
facilities
– Exercise Support Team with communications
– Thorough Risk Mitigation Assessment
– Coordination with local residents (verbal and
written)
– Public Affairs Office will make public
announcement regarding exercise
8
UNCLASSIFIED//FOUO
US Army Special Operations CommandUNCLASSIFIED//FOUO
Questions / Concerns
9
UNCLASSIFIED//FOUO
US Army Special Operations CommandUNCLASSIFIED//FOUO


                             Contact Information
Mr. Thomas Mead
JADE HELM Operations
Planner/MSEL
WK: 910-396-9831/6316
Cell: 910-391-1137
e-mail: thomas.m.mead.ctr@soc.mil
Thomas.mead@iceinc.us.com

Mr. Richard Kimmich
JADE HELM Project Lead
USASOC G35 Plans
WK: 910-396-0547/ 0439
e-mail: Richard.C.Kimmich@soc.mil

Mr. Francisco Oquendo Jr
JADE HELM Operations Planner
WK: 910 396-9831/6316
Cell: 910 916-0821
e-mail:
oquendo.francisco.ctr@soc.mil
Francisco.oquendo@iceinc.us.com

10 Public Affairs Officer
PAO@soc.mil
UNCLASSIFIED//FOUO
US Army Special Operations Command

Michael K.

With Alex Jones, Steve Quayle and Pete Santilli foaming at the mouth over JADE HELM being some sort of roundup of patriots, and Dahboo7 saying that it might be either a coup or a plot to foil a Mexican invasion, I think one can safely assume that it is none of these things.

What then to make of the information that is confirmed? One thing indicated by the centrality of Artificial Intelligence to the operation is that a lot of this is a cyber space war.  The AI may be making a virtual model of potential reactions based on data being collected right now.

One can imagine mass harvest of demographic data being input into a simulation which makes virtual models of everyone.  AI could run the game and predict the most likely outcomes, and with the knowledge thus gained prepare real orders for the real roundup.

So in essence, the whole thing is a true lie.

yankeedoodle

It's a military drill.  Nothing more.  Nothing less.   Unusual only because of its size and scale, perhaps, but, then, the drill is for a huge target - China. 

JADE, in this context, means China. 

Walmarts are used because 1) there are many Walmarts in China, in populations centers, of course, and 2) Walmarts are perfect as improvised military command posts - large cavernous building that can be emptied and a large parking lot that is a ready-made helicopter landing pad.   Most likely, a Walmart Supercenter in China is not, physically, much different than a Walmart Supercenter in the US. 

The reason it is "Jade Helm 15" is because it is held in 2015, and, surely, the numerical identification implies there will be more, perhaps in 2018, 2021, or whatever, which will result in "Jade helm 18", "Jade Helm 21", etc..  Constant war-gaming against China - just like against Russia, Iran, and every other fucking country that presents no threat, while there is NO war-gaming against the true enemy - Israhell. 

If there was something super nefarious about Jade Helm, they would NOT go around asking permission, they would just fucking do it, and they would use a false flag to give them maximum publicity and justification and public acceptance.  Did they ask permission for 911, Oklahoma City, the Boston bombing, etc.?

The JADE military acronym is from 2001 - 14 years old.  It's relationship to Jade Helm is a coincidence.   

QuoteTitle :   Joint Assistant for Development and Execution (JADE)

Descriptive Note : Final technical rept. Jan 1997-Jan 2001

Corporate Author : BBN TECHNOLOGIES CAMBRIDGE MA

Personal Author(s) : Mulvehill, Alice M. ; Hyde, Clinton ; Rager, David

Full Text : http://www.dtic.mil/get-tr-doc/pdf?AD=ADA398021

Report Date : AUG 2001

Idaho Kid

Well, that sorts that one out nicely, Yankee.  Thanks.
"Certainly the Protocols are a forgery, and that is the one proof we have of their authenticity. The Jews have worked with forged documents for the past 24 hundred years, namely ever since they have had any documents whatsoever." - Ezra Pound

Michael K.

I really don't have the energy to refute something that has no proof, and if anyone wants to accept conclusions without proof, that's none of my business.

However, I have proven that the military acronym JADE refers to a computer program for military planning and command.  This is not my guess, and it is not invalid because it was coined fifteen years ago.  NATO was coined fifty years ago and it is still in use.

Originally, I set out to show people that this exercise is jewbait, meaning that it is a psyop intended to make opponents of the Jewish power configuration look like dummies.  So far it seems to be working.

Next, I intend to show that the motto,"Master the Human Domain," is further confirmation that this operation is all about the jewbait.  Look at this document called "No Turning Back," from USASOC in 2013.  It discusses the whole "human domain" notion in a way that shows what I mean:


http://www.soc.mil/SWCS/SWEG/AY_2013/Franks,%20M%202013.pdf

QUOTE:  (p. 17)

Deliberate consideration of factors within the human domain will assist in planning for campaigns, consequence management during operations, and post offensive operations planning.  Specifically, ensuring that we aren't surprised by a populace's counteraction to our efforts.

END QUOTE

There is some more real evidence from military documents which supports my hypothesis that the goal here is to develop counter measures against civil resistance to martial law by wargaming the public both on the ground and in cyber space, and using AI to do it.

Michael K.

The question arises, in reference to the bigger picture we have been discussing here, of how advances in quantum computing contribute to the development of Artificial Intelligence.

One interesting area to look at might be how quantum AI is being applied to gaming today.  That is because wargaming is a way that militaries have always used to approach strategy problems.  Today advances in technology are making military tactics incorporate computer game simulations.  Take drone operations as an example.

http://www.nas.nasa.gov/quantum/

WHAT IS QUANTUM COMPUTING?

Quantum computing is based on quantum bits or qubits. Unlike traditional computers, in which bits must have a value of either zero or one, a qubit can represent a zero, a one, or both values simultaneously. Representing information in qubits allows the information to be processed in ways that have no equivalent in classical computing, taking advantage of phenomena such as quantum tunneling and quantum entanglement. As such, quantum computers may theoretically be able to solve certain problems in a few days that would take millions of years on a classical computer.


http://www.sciencedirect.com/science/article/pii/S0167642307000548

Knowledge acquisition for adaptive game AI

Marc PonsenPieter SpronckHéctor Muñoz-AvilaDavid W. Aha

Abstract


Game artificial intelligence (AI) controls the decision-making process of computer-controlled opponents in computer games. Adaptive game AI (i.e., game AI that can automatically adapt the behaviour of the computer players to changes in the environment) can increase the entertainment value of computer games. Successful adaptive game AI is invariably based on the game's domain knowledge. We show that an offline evolutionary algorithm can learn important domain knowledge in the form of game tactics (i.e., a sequence of game actions) for dynamic scripting, an offline algorithm inspired by reinforcement learning approaches that we use to create adaptive game AI. We compare the performance of dynamic scripting under three conditions for defeating non-adaptive opponents in a real-time strategy game. In the first condition, we manually encode its tactics. In the second condition, we manually translate the tactics learned by the evolutionary algorithm, and use them for dynamic scripting. In the third condition, this translation is automated. We found that dynamic scripting performs best under the third condition, and both of the latter conditions outperform manual tactic encoding. We discuss the implications of these results, and the performance of dynamic scripting for adaptive game AI from the perspective of machine learning research and commercial game development.

yankeedoodle

Let's have some humor. 

Ask yourself this, if this Jade Helm bullshit REALLY means martial law in Texas, and it means that All-excrement Jones  <:^0 (*)> gets his fat fucking ass put into a FEMA camp, well...WHAT THE HELL IS WRONG WITH THAT?   <lol> <lol> <lol>

'Martial law exercise?' Texas jittery over US military drills
http://rt.com/usa/254077-texas-governor-monitor-training/?utm_source=browser&utm_medium=aplication_chrome&utm_campaign=chrome

Michael K.

http://www.researchgate.net/publication/256605963_An_Integrated_Development_Environment_for_Adiabatic_Quantum_Programming

An Integrated Development Environment for Adiabatic Quantum Programming

Computational Science & Discovery 09/2013; 7(1). DOI: 10.1088/1749-4680/7/1/015006
Source: arXiv

ABSTRACT Adiabatic quantum computing is a promising route to the computational power afforded by quantum information processing. The recent availability of adiabatic hardware raises the question of how well quantum programs perform. Benchmarking behavior is challenging since the multiple steps to synthesize an adiabatic quantum program are highly tunable. We present an integrated development environment for adiabatic quantum programming called JADE that provides control over all the steps taken during program synthesis. JADE
captures the workflow needed to rigorously benchmark performance while also allowing a variety of problem types, programming techniques, and processor configurations. We have also integrated JADE with a quantum simulation engine that enables program profiling using numerical calculation. The computational engine supports plug-ins for simulation methodologies tailored to various metrics and computing resources. We present the design, integration, and deployment of JADE and discuss its potential use for benchmarking adiabatic quantum programs by the quantum computer science community. 


Michael K.

Another meaning for the JADE acronym, closely tied to DARPA and something called Cougaar... all seem to point to military application of AI for intelligence, planning and logistics.

http://jade.tilab.com/


JAVA Agent DEvelopment Framework
is an open source platform for peer-to-peer agent based applications

JADE (Java Agent DEvelopment Framework) is a software Framework fully implemented in the Java language. It simplifies the implementation of multi-agent systems through a middle-ware that complies with the FIPA specifications and through a set of graphical tools that support the debugging and deployment phases. A JADE-based system can be distributed across machines (which not even need to share the same OS) and the configuration can be controlled via a remote GUI. The configuration can be even changed at run-time by moving agents from one machine to another, as and when required. JADE is completely implemented in Java language and the minimal system requirement is the version 5 of JAVA (the run time environment or the JDK).

Besides the agent abstraction, JADE provides a simple yet powerful task execution and composition model, peer to peer agent communication based on the asynchronous message passing paradigm, a yellow pages service supporting publish subscribe discovery mechanism and many other advanced features that facilitates the development of a distributed system.

Thanks to the contribution of the LEAP project, ad hoc versions of JADE exist designed to deploy JADE agents transparently on different Java-oriented environments such as Android devices and J2ME-CLDC MIDP 1.0 devices.
Furthermore suitable configurations can be specified to run JADE agents in networks characterized by partial connectivity including NAT and firewalls as well as intermittent coverage and IP-address changes.

JADE is free software and is distributed by Telecom Italia, the copyright holder, in open source under the terms and conditions of the LGPL ( Lesser General Public License Version 2) license. Besides the JADE Team, however, a fairly large Community of developers gathered around the JADE Framework in these years. Anyone who is willing to contribute to this Community by reporting bugs, providing fixes and contributions or simply comments and suggestions, is more than welcome.



http://aikernel.org/projects/028/index.ru.html

Jadex is a Belief Desire Intention (BDI) reasoning engine that allows for programming intelligent software agents in XML and Java. The resoning engine is very flexible and can be used on-top of different middleware infrastructures such as JADE.

    http://jadex.sourceforge.net/
    http://jadex.informatik.uni-hamburg.de/bin/view/About/Overview

Mission Statement

Intelligent agents are a modelling paradigm, based on the notion of agents with mental states. The Jadex reasoning engine follows the Belief Desire Intention (BDI) model and facilitates easy intelligent agent construction with sound software engineering foundations. It allows for programming intelligent software agents in XML and Java and can be deployed on different kinds of middleware such as JADE.

To enable the creation of intelligent agents several different constituent parts have to be assembled. It is necessary to provide an agent architecture that at least takes into account agent-internal, agent society and artificial intelligence (AI) concepts. It is a property of agent research that interesting research results in various isolated areas exist, but that these results are not integrated into superordinated architectures. Therefore until now no standards can address the construction of intelligent agents in all facets.
Summary

The Jadex research project is conducted by the Distributed Systems and Information Systems Group at the University of Hamburg. The developed software framework is available under GNUs LGPL license, and is continuously evolving. The project's file releases are kindly hosted by the SourceForge.net portal. The projects web presence is based on a wiki and thus allows Jadex users to contribute in various ways. The reasoning engine has been put into practice in the context of several research, teaching, and industrial application scenarios some of which are described here in the web.


http://en.wikipedia.org/wiki/Cougaar

Cougaar (acronym of Cognitive Agent Architecture) is a Java-based architecture for building large-scale distributed applications based on agents. It is a product of two consecutive programs of several years of research DARPA (UltraLOG) in agents systems scale covering eight years of effort. The first program conclusively demonstrated the feasibility of using agent-based technology to perform advanced rapid, large-scale distributed logistics planning and replanning. The second program developed information technologies to improve the survival of these distributed agent-based systems operating in extremely chaotic environments.

The resultant architecture, Cougaar, provides developers a framework for deploying large-scale distributed agents, with minimal consideration for architecture and the underlying infrastructure. Cougaar architecture uses the latest in design-oriented and component-based agent who has a long list of powerful features.

Applications of Cougaar

    Integrated Critical Infrastructure Modeling and Simulation
    Logistics Modeling Tool for Highly Adaptable Military Organizations
    Logistics-Aided Battle Command Planning
    Supporting Robot Teams over Wireless Ad hoc Networks
    Control Surfaces
    Administrative Tool for Monitoring a Distributed Agent Society


Michael K.

http://www.dodccrp.org/events/5th_ICCRTS/papers/062.pdf


3.0 The Vision for a Fielded JADE

The vision is for JADE to become a component of the GCCS. GCCS currently performs many
important command and control mission functions including force deployment planning. JOPES
tools within GCCS are now used for both deliberate and crisis action planning, including TPFDD
generation. While JOPES tools are widely used by the Joint Planning and Execution Community
(JPEC), the speed at which TPFDDs are generated is a shortcoming noted by operational users.
Additionally, current TPFDDs do not provide explicit links to the course of action (COA).
More efficient deployment planning tools are required to better support crisis planning and
execution. While JOPES tools in GCCS are currently used to describe and manage the combat,
combat support, and combat service support elements that are required in order to support a
mission; the Pacific Command (PACOM), through the DARPA ACOA program, intends to
move beyond JOPES tools. Their vision is to design an agile operations planning and execution
system that is easy and intuitive to use and that quickly provides required information in support
of time sensitive planning.

3.1

ACOA

The Adaptive Course of Action (ACOA) program provides a near real-time distributive
collaborative environment that supports end-to-end joint planning by multiple participants
including the supported CINC, supporting CINCs, and the commander of the Joint Task Force
(CJTF) (See Figure 4). Through the use of collaborative and joint decision support tools,
planners and operators are able to share a dynamic workspace for situational assessment and to
rapidly adapt to situational changes.

The principal Government sponsors of the ACOA-ACTD include PACOM and the
DARPA/DISA (Defense Advanced Research Projects Agency/Defense Information Systems
Agency) Advanced Information Technology Services Joint Program Office. A major goal of the
program is to cut crisis planning time in half. Both commercial-off-the-shelf and government
developed emerging information technologies are being applied to meet the goal. The ACOA
mission is stated as "develop and demonstrate advanced technology enabling geographically
dispersed planning and executing forces to rapidly generate, assess, and adapt courses of action
for military operations" [Jensen, 1999]. The initiative is viewed as a dramatic reengineering of
the JOPES process and not just a marginal improvement or fine-tuning. ACOA is being
designed to significantly improve both planning and execution activities at all levels including
unit, tactical, operational, theater, and strategic.


Michael K.

http://www.unity3dwork.com/2015/02/helm-lead-developer-role/


HELM Lead Developer Role
Posted On: February 17th, 2015    Job Type: Full Time    Job Location: Lichfield / Home

What We Do...

Whether helping to engage thousands of employees in a complex organisational change or empowering a single frightened child to find their voice, games have the power to change lives for the better. At HELM we are on a mission to bring games powered applications and tools into all aspects of life, not just entertainment. A ground breaking initiative from an established company, HELM has already won multiple InnovateUK funding awards as it builds next generation people engagement, learning and change technologies. If like us, you believe that games have the power to achieve much more than purely entertain, then read on....

What You'll Be Doing...

Working as the senior developer you will lead the technical development efforts on a new class of technologies that harness the power of games to positively impact how people engage, think and behave.

This is a unique opportunity to help shape the early stage development of applications that will change the way people look at games and what their use can achieve. It is a senior role with increasing leadership responsibilities as we continue to grow our team.

Your role will include:

• Technical design and implementation of products and content
• Leading the technical development team including coaching/mentoring team members
• Creating tools to optimise the development process
• Contributing to product roadmaps and strategies.

Most of all, you will be working as part of a multi-disciplinary team from the world of games, psychology, visual communications, learning & development and business to solve great challenges with powerful solutions.

HELM is currently 'flying' underneath the radar, so you won't find a website – a secure website exists that can be shared at the appropriate time.

We look forward to speaking with you.

Michael K.










THE SOULKEEPER IS HELM SYSTEMS' FIRST GAME, BEING DEVELOPED ON UNREAL ENGINE 4




Michael K.

JADE DRAGON







http://mysteryoftheiniquity.com/2010/12/08/the-stone-of-heaven/

This entry is taken from Guardians of the Holy Grail by Michael Ford...

Ironically it is said that Lucifer's favorite color is green. Did Ezekiel know of the association between Venus and emerald? Seems in Egypt when the Jews resided in Khem, this wisdom was part of the canon of arcane knowledge taught within the temples by Babylonian priests during the Jewish captivity. In ancient Egypt the emerald was the stone of Hathor, the Egyptian Venus, and in Mesopotamia the color green was the stone of Venus in her manifestation as Inanna or Ishtar...

The Venusian number 13 also denoted the stages on the alchemical process leading to death and rebirth. Legends has it that 13 stages were inscribed by Thoth-Hermes as 13 concepts on a tablet called the Emerald Tablet that was made of solid emerald

yankeedoodle

Where does that jade dragon come from?  That's right - CHINA.

Jade and dragons are integral to the national identity of China.  Ever see the dragons at a Chinese New Years Day celebration?


Michael K.

Of course it comes from China.  They worship Lucifer there.

The recent "Pivot to Asia" policy has moved the majority of the US Sea and Air power assets to the Pacific.  Incidentally, JADE was developed in Hawaii by the Pacific Command.

However, the disposition of forces there contemplates annihilation in a large scale war and not an invasion.  China doesn't have any resources worth invading to steal. 

The Asian Pacific rim is the area that the TPP trade deal is focused on.  This is all about combining with Japan to suppress China's regional ambitions in economic spheres.

The military is undergoing a serious force drawdown, and in the current environment the Land war forces are struggling to remain relevant.  This is certainly no time to invade China, if there even is such a time ever.

Yet the struggle for relevancy for Army and SOF in any future Land power use is coming to focus on the "human domain," and to deliver efficiency and economy of force the AI is coming into play more and more.

This AI guided human domain orientation has now come to meet its first application, dealing with the impending social crisis in America due to China dropping the yuan bomb. 

If the new system can be used to conquer rebellious and armed Americans on behalf of the Anglo-Zionist cartel, it might be useful in confronting China.  But this is doubtful considering the lack of detailed information about the Chinese populace that the arrogant and Anglocentric military planning class has.