A farm tractor experienced a mechanical failure on a main road, releasing part of its contents which created a large white gas plume. The plume lingered in the area and surrounded nearby homes. Vehicles in the plume stalled and drivers were overcome by the gas. A caller reported the incident and experienced throat irritation, coughing, difficulty breathing, and choking. Emergency services were called to respond.
Confined space safety - 5 things to look out forSangeeta Phadke
Confined Spaces are the least understood of hazards at the workplace. This Abhisam white paper gives three actual case studies of incidents and a handy checklist to evaluate your own workplace's confined spaces related hazards.
Confined space safety - 5 things to look out forSangeeta Phadke
Confined Spaces are the least understood of hazards at the workplace. This Abhisam white paper gives three actual case studies of incidents and a handy checklist to evaluate your own workplace's confined spaces related hazards.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
4. Key facts
Scenario4.1_11 Farm tractormalfunction
4
MELODY #4.1 P First Alert Scenario Discussion
• At 6:30 a.m. on May 3, 2019, a farm tractor experienced a mechanical failure that
involved its tank while on a main road in a low-density residential area, resulting
in the release of part of its content.
• The release created a large, low-lying plume of white gas, which lingered in the
area and surrounded nearby homes.
• Vehicles encountering the plume stalled, and drivers and passengers were
overcome by the gas.
• A driver saw the plume and called the emergency services reporting the incident
as a car fire and reported an acrid smell and taste. During the call, the caller
experiences throat irritation, coughing, difficulty breathing, and choking.
5. What would you ask based on the METHANE protocol?
Scenario4.1_11 Farm tractormalfunction
5
MELODY #4.1 P First Alert Scenario Discussion
Issue Possible question
Major Incident
Exact location
Type of the incident
Hazard
Access
Number of casualties
Emergency services
6. Scenario4.1_11 Farm tractormalfunction
6
MELODY #4.1 P First Alert Scenario Discussion
Issue Possible question
Identification of the caller
Location of the incident
Type of the incident
State of the incident
What would you ask based on the Four W’s protocol?
7. Scenario5.1_11 Farm tractor malfunction
7
MELODY #5.1 P On-site risk/threat assessment, Security of the area, Isolate people and pet animals on scene, Registration of victims. Scenario Discussion.
8. The scene
Scenario5.1_11 Farm tractormalfunction
8
MELODY #5.1 P On-site risk/threat assessment, Security of the area, Isolate people and pet animals on scene, Registration of victims. Scenario Discussion.
9. Key facts
Scenario5.1_11 Farm tractor malfunction
9
MELODY #5.1 P On-site risk/threat assessment, Security of the area, Isolate people and pet animals on scene, Registration of victims. Scenario Discussion.
• At 6:30 a.m. on May 3, 2019, a farm tractor experienced a mechanical failure that involved its tank while on
a main road in a low-density residential area, resulting in the release of part of its content.
• The release created a large, low-lying plume of white gas, which lingered in the area and surrounded
nearby homes.
• Vehicles encountering the plume stalled, and drivers and passengers were overcome by the gas.
• A driver saw the plume and called the emergency services reporting the incident as a car fire and reported
an acrid smell and taste. During the call, the caller experiences throat irritation, coughing, difficulty
breathing, and choking.
• DO initially reported the incident as a car fire.
• Some FRs arriving at the scene were also overcome by the gas. Other FRs who smelled the acrid odour
and saw the white plume retreated quickly to don a self-contained breathing apparatus before attempting
rescues.
• Victims were rescued from cars and homes nearest to the release. A shelter-in-place order was issued to
residents living within a 1.5-Km radius of the release.
• The FB applied a water spray to dilute the plume until the tank was empty, which took almost 3 hours.
10. What do you ask yourself concerning:
Scenario5.1_11 Farm tractormalfunction
10
MELODY #5.1 P On-site risk/threat assessment, Security of the area, Isolate people and pet animals on scene, Registration of victims. Scenario Discussion.
Issue ?
RISK ASSESSMENT NEEDS
SECUREING THE AREA NEEDS
ISOLATION OF PEOPLE AND PET
ANIMAL NEEDS
REGISTRATION OF VICTIMS NEEDS
11. What do you do concerning:
Scenario5.1_11 Farm tractormalfunction
11
MELODY #5.1 P On-site risk/threat assessment, Security of the area, Isolate people and pet animals on scene, Registration of victims. Scenario Discussion.
Issue ?
RISK ASSESSMENT
SECUREING THE AREA
ISOLATION OF PEOPLE AND PET
ANIMAL
REGISTRATION OF VICTIMS
12. Scenario5.3_11 Farm tractor malfunction
12
MELODY # 5.3.P Treatment methods of patients involved in a CBRN incident Scenario Discussions
13. The scene
Scenario5.3_11 Farm tractormalfunction
13
MELODY # 5.3.P Treatment methods of patients involved in a CBRN incident Scenario Discussions
14. Key facts
Scenario5.3_11 Farm tractormalfunction
14
MELODY # 5.3.P Treatment methods of patients involved in a CBRN incident Scenario Discussions
• At 6:30 a.m. on May 3, 2019, a farm tractor experienced a mechanical failure that involved
its ammonia tank while on a main road in a low-density residential area, resulting in the
release of almost 2000 litres of anhydrous ammonia that created a large, low-lying plume
of white gas, which lingered in the area and surrounded nearby homes.
• Vehicles encountering the plume stalled, and drivers and passengers were overcome by
the gas.
• A driver saw the plume and called the emergency services reporting the incident as a car
fire and reported an acrid smell and taste. During the call, the caller experiences throat
irritation, coughing, difficulty breathing, and choking.
• Because DO initially reported the incident as a car fire some FRs arriving at the scene were
also overcome by the gas. Other FRs who smelled the acrid odour and saw the white
plume retreated quickly to don a self-contained breathing apparatus before attempting
rescues.
• Victims were rescued from cars and homes nearest to the release.
15. Key facts
Scenario5.3_11 Farm tractormalfunction
15
MELODY # 5.3.P Treatment methods of patients involved in a CBRN incident Scenario Discussions
• 83 persons, including FRs, motorists, and neighbourhood residents, were
evaluated at six local hospitals because of exposure to the gas.
• Among the 83 persons evaluated, 14 were hospitalized.
• 8 persons were admitted to the ICU, 7 of whom required endotracheal intubation
and mechanical ventilation.
• No victims had been decontaminated in the field.
• Many victims were decontaminated at the hospital. Two hospitals decontaminated
victims upon arrival to the ER
• One hospital began to decontaminate admitted victims after some ICU staff
members experienced symptoms of secondary exposure in the ICU from off-
gassing of anhydrous ammonia from victims’ clothing.
• No deaths occurred.
16. Casualty #1 Triage Proposed action/treatment
28 YEARS OLD MAN
• Burning sensation in the eyes
• No visible wounds or injury
• RR 28
• SBP 100
• A+
• V
• P
• U
Status of the casualties, triage, treatment
Scenario5.3_11 Farm tractormalfunction
16
MELODY # 5.3.P Treatment methods of patients involved in a CBRN incident Scenario Discussions
17. Casualty #2 Triage Proposed action/treatment
45 YEARS OLD MAN (First responder)
• Respiratory distress
• No visible wounds or injuries
• RR 35
• SBP 70
• A
• V
• P+
• U
Status of the casualties, triage, treatment
Scenario5.3_11 Farm tractormalfunction
17
MELODY # 5.3.P Treatment methods of patients involved in a CBRN incident Scenario Discussions
18. Casualty #3 Triage Proposed action/treatment
20 YEARS OLD WOMAN
• Eye irritation
• Lacrimation
• No visible wounds or injuries
• RR 20
• SBP 110
• A+
• V
• P
• U
Status of the casualties, triage, treatment
Scenario5.3_11 Farm tractormalfunction
18
MELODY # 5.3.P Treatment methods of patients involved in a CBRN incident Scenario Discussions
19. Casualty #4 Triage Proposed action/treatment
40 YEARS OLD MAN
• Rhinorrhoea
• Coughing
• No visible wounds or injuries
• RR 32
• SBP 85
• A
• V+
• P
• U
Status of the casualties, triage, treatment
Scenario5.3_11 Farm tractormalfunction
19
MELODY # 5.3.P Treatment methods of patients involved in a CBRN incident Scenario Discussions
22. Key facts
Scenario5.4_11 Farm tractor malfunction
22
MELODY #5.4 P Forensic Awareness Scenario discussion
• At 6:30 a.m. on May 3, 2019, a farm tractor experienced a mechanical failure that involved its ammonia tank while
on a main road in a low-density residential area, resulting in the release of almost 2000 litres of anhydrous
ammonia that created a large, low-lying plume of white gas, which lingered in the area and surrounded nearby
homes.
• Vehicles encountering the plume stalled, and drivers and passengers were overcome by the gas. A driver saw the
plume and called the emergency services reporting the incident as a car fire and reported an acrid smell and
taste. During the call, the caller experiences throat irritation, coughing, difficulty breathing, and choking.
• Because DO initially reported the incident as a car fire some FRs arriving at the scene were also overcome by the
gas. Other FRs who smelled the acrid odour and saw the white plume retreated quickly to don a self-contained
breathing apparatus before attempting rescues.
• Victims were rescued from cars and homes nearest to the release. A shelter-in-place order was issued to
residents living within a 1.5-Km radius of the release.
• No victims had been decontaminated in the field.
• The FB applied a water spray to dilute the plume until the ammonia tank was empty, which took almost 3 hours.
• The release was investigated by the local authorities, fire department, environmental protection agency.
• Nearby coniferous trees were visibly damaged by the ammonia release and were mapped as a proxy for the
location of the anhydrous ammonia plume.
23. Forensic evidence
Scenario5.4_11 Farm tractormalfunction
23
MELODY #5.4 P Forensic Awareness Scenario discussion
What would you consider as evidence on
this scene
What would you do to preserve it
1
2
3
…
25. The emergency call
Scenario 6.1_11 Emergencycall
An emergency call arrives at the dispatch office at 6.42 AM
• The caller identifies himself a driver who is calling to report a car fire along the main road.
• DO asks the caller to describe the scene
• The caller reports that there is a white plume on the road that seems coming from a car fire and some
vehicles are engulfed in the plume.
• DO asks whether the caller noticed any particular smell
• The caller reported an acrid smell and taste.
• DO asks the conditions of the caller
• The caller reports that he’s experiencing throat irritation, coughing, difficulty breathing, and choking.
25
MELODY #6.1 Alarm protocol Scenario discussion
26. Scenario 6.1_11_a Emergencycall
26
MELODY #6.1 Alarm protocol Scenario discussion
Provide a question for the given answer
DO:
The caller reports that in the area there are several cars and what seems to be a large farm tractor with a
tank.
DO:
The caller says there is no wind, and the air is cool and humid.
DO:
The caller reports that it’s a residential area and the plume reached nearby houses.
The emergency call
27. Scenario 6.1_11_b Emergencycall
27
MELODY #6.1 Alarm protocol Scenario discussion
Consider the following:
1) Is there anything else you would need to know before passing the call to the emergency service?
2) Would you pass the call to other emergency services beyond the one requested by the caller?
3) What message would you refer to the emergency service(s)?
The emergency call
28. Scenario 6.1_11_c Emergencycall
28
MELODY #6.1 Alarm protocol Scenario discussion
List the questions you would ask to the person calling and specify why
1) …
2) …
3) …
4) …
The emergency call
29. Scenario6.3_11 Farm tractor malfunction
29
MELODY #6.3.P Triage related to CBRN – chemical scenario - Scenario discussion
30. Table top exercise – triage of victims
MELODY #6.3.P Triage related to CBRN – chemical scenario - Scenario discussion
32. May 3, 2019 06:30
• Location: along the main road in a low-density residential
area
• Witnesses’ observation: white gas plume engulfing many vehicles and a large
farm tractor with a tank.
• Acrid smell and taste coming from the plume.
• Common symptoms: throat irritation, cough, difficulty breathing, burning lungs, eye irritation and
choking sensation.
• One driver called the emergency services to report a car fire.
• FRs arriving at the overcome by the gas.
• Other FRs retreated quickly to don a self-contained breathing apparatus before attempting
rescues.
• First responders: decontamination and transport of 10 victims to triage point.
• Step by step action: triage of victims
32
MELODY #6.3.P Triage related to CBRN – chemical scenario - Scenario discussion
33. Potential pointsfor discussion
• Unintentional release of chemical agents from the car fire
• Unintentional release of chemical agents from other sources
• Intentional release of chemical agents
• Inform the media
33
MELODY #6.3.P Triage related to CBRN – chemical scenario - Scenario discussion
34. May 3, 2019 06:55– Arrivalof first responders
• Triage the victims
• SYMPTOMS
• RESPIRATORY RATE (RR)
• SYSTOLIC BLOOD PRESSURE (SBP)
• THE AVPU SCALE (ALERT, VOICE, PAIN, UNRESPONSIVE)
34
Triagemethodology
MELODY #6.3.P Triage related to CBRN – chemical scenario - Scenario discussion
35. 35
Triagemethodology
MELODY #6.3.P Triage related to CBRN – chemical scenario - Scenario discussion
RR 10-29 4 SBP >90 4 AVPU A 4
>29 3 76-89 3 V 3
6-9 2 50-75 2 P 2
1-5 1 1-49 1 U 1
0 0 0 0 DEAD 0
INTERPRETATION
SYMPTOMS + TOTAL SCORE RR + SBP + AVPU 1-10 – IMMEDIATE
SYMPTOMS + TOTAL SCORE RR + SBP + AVPU 11 - DELAYED
SYMPTOMS + TOTAL SCORE RR + SBP + AVPU 12 – MINIMAL
SYMPTOMS + TOTAL SCORE RR + SBP + AVPU 0 – DEAD
36. VICTIMNO 1
• 30 YR FEMALE
• Burning sensation in the nose
• No visible wounds or injuries
• RR 28
• SBP 105
• A+
• V
• P
• U
• MINIMAL (GREEN)
36
MELODY #6.3.P Triage related to CBRN – chemical scenario - Scenario discussion
37. VICTIMNO 2
• 60 YR MALE
• Respiratory failure
• No visible wounds or injuries
• RR 8
• SBP 50
• A
• V
• P+
• U
• IMMEDIATE (RED)
37
MELODY #6.3.P Triage related to CBRN – chemical scenario - Scenario discussion
38. VICTIMNO 3
• 25 YR MALE
• Burning sensation in the throat
• No visible wounds or injuries
• RR 25
• SBP 115
• A+
• V
• P
• U
• MINIMAL (GREEN)
38
MELODY #6.3.P Triage related to CBRN – chemical scenario - Scenario discussion
39. VICTIMNO 4
• 35 YR MALE
• Rhinorrhoea
• No visible wounds or injuries
• RR 24
• SBP 130
• A+
• V
• P
• U
• MINIMAL (GREEN)
39
MELODY #6.3.P Triage related to CBRN – chemical scenario - Scenario discussion
40. VICTIMNO 5
• 45 YR FEMALE
• Upper airway swelling
• No visible wounds or injuries
• RR 30
• SBP 88
• A
• V+
• P
• U
• DELAYED (YELLOW)
40
MELODY #6.3.P Triage related to CBRN – chemical scenario - Scenario discussion
41. VICTIMNO 6
• 30 YR FEMALE
• Open tibial fractures
• RR 5
• SBP 40
• A
• V
• P+
• U
• IMMEDIATE (RED)
41
MELODY #6.3.P Triage related to CBRN – chemical scenario - Scenario discussion
42. VICTIMNO 7
• 30 YR MALE
• Runny nose
• Lacrimation
• No visible wounds or injuries
• RR 25
• SBP 120
• A+
• V
• P
• U
• MINIMAL (GREEN)
42
MELODY #6.3.P Triage related to CBRN – chemical scenario - Scenario discussion
43. VICTIMNO 8
• 55 YR MALE
• Airway obstruction
• No visible wounds or injuries
• RR 6
• SBP 40
• A
• V
• P+
• U
• IMMEDIATE (RED)
43
MELODY #6.3.P Triage related to CBRN – chemical scenario - Scenario discussion
44. VICTIMNO 9
• 40 YR MALE
• Cough
• Lacrimation
• No visible wounds or injuries
• RR 15
• SBP 95
• A+
• V
• P
• U
• MINIMAL (GREEN)
44
MELODY #6.3.P Triage related to CBRN – chemical scenario - Scenario discussion
45. VICTIMNO 10
• 30 YR FEMALE
• Symptoms of edema
• No visible wounds or injuries
• RR 5
• SBP 35
• A
• V
• P+
• U
• IMMEDIATE (RED)
45
MELODY #6.3.P Triage related to CBRN – chemical scenario - Scenario discussion