Decision-maker / Strategy
Avoid buying a story that cannot survive physics, operations, or adversaries.
~60 min
Latency: From Orbit to Application
COM-001
Latency in satellite systems is the total time between a sensor observing something on Earth and that observation becoming usable information. It is not one delay — it is a chain of them. Propagation through space, queuing at ground stations, decryption, format conversion, atmospheric correction, reprojection, tiling, indexing, and delivery. Some links are governed by physics and cannot be shortened. Others are engineering choices. Understanding where latency lives determines what questions you can answer with the data. A flood map delivered in 15 minutes can direct evacuations. The same map delivered in 48 hours is a historical record.
Data Provenance
SEC-001
Data provenance is the complete, verifiable record of where a piece of data came from, every transformation it underwent, and who or what performed those transformations. In satellite imagery and remote sensing, provenance is not a nice-to-have audit trail — it is the difference between evidence and hearsay.
Analysis-Ready Data
DAT-004
Analysis-Ready Data (ARD) is satellite imagery that has been processed to a standard where it can be used directly for analysis without additional preprocessing. This means the image has been geometrically corrected (pixels are in the right geographic locations), radiometrically calibrated (pixel values represent meaningful physical quantities like surface reflectance rather than arbitrary digital numbers), atmospherically corrected (the atmosphere's distortion has been removed), and often cloud-masked (unusable pixels are flagged). ARD is the difference between receiving raw ingredients and receiving a prepared, measured, recipe-ready mise en place.
Space Cybersecurity: The Attack Surface Above Us
SEC-004
Space systems are among the most critical and least defended digital infrastructure on Earth. Satellites underpin GPS navigation, financial transaction timing, weather forecasting, military communications, and Earth observation — yet most were designed with security as an afterthought, operate on decades-old firmware that cannot be patched remotely, and communicate over radio frequency links that are inherently exposed to interception, jamming, and spoofing. The attack surface spans three segments — ground, link, and space — each with distinct vulnerabilities. As the orbital population grows past 15,000 active satellites and commercial dependence deepens, the gap between threat sophistication and defensive capability is widening.
Information Networks & Truth
PHI-004
The structure of an information network — not just the data flowing through it — determines whether that network produces truth or delusion. A network with self-correction mechanisms, error detection, and distributed verification tends toward truth. A network optimized for speed, engagement, or institutional convenience tends toward whatever narrative serves its operators. This principle, drawn from Yuval Noah Harari's Nexus, is foundational to how M33 designs its data architecture: provenance is not a feature but a structural requirement for any system that claims to represent reality.