SlideShare a Scribd company logo
Welcome to  “Social Networking for Emergency Management & Public Safety” Workshop Sponsored by the Collaborative DHS-DOD Program  Interagency Biological Restoration Demonstration
Housekeeping  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Housekeeping Continued  ,[object Object],[object Object],[object Object]

More Related Content

Similar to Ann Housekeeping Presentation

Supplement your medical grant funding with a multi channel fundraising strategy
Supplement your medical grant funding with a multi channel fundraising strategySupplement your medical grant funding with a multi channel fundraising strategy
Supplement your medical grant funding with a multi channel fundraising strategy
Amy Kellinger
 
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
SurfWatch Labs
 
Virtual Cleared Job Fair Guide for Job Seekers
Virtual Cleared Job Fair Guide for Job SeekersVirtual Cleared Job Fair Guide for Job Seekers
Virtual Cleared Job Fair Guide for Job Seekers
ClearedJobs.Net
 
Collaboration Architecture Design: Connected Consumers and the Omni Channel E...
Collaboration Architecture Design: Connected Consumers and the Omni Channel E...Collaboration Architecture Design: Connected Consumers and the Omni Channel E...
Collaboration Architecture Design: Connected Consumers and the Omni Channel E...
Cisco Canada
 
Stolen and Lost Wireless Devices
Stolen and Lost Wireless DevicesStolen and Lost Wireless Devices
Stolen and Lost Wireless Devices
- Mark - Fullbright
 
How we-work
How we-workHow we-work
How we-work
Kevin Simon
 
Adapting HIV Interventions for Targeting MSM Online Populations
Adapting HIV Interventions for Targeting MSM Online PopulationsAdapting HIV Interventions for Targeting MSM Online Populations
Adapting HIV Interventions for Targeting MSM Online Populations
CDC NPIN
 
Significant Details In godaddy - A Background
Significant Details In godaddy - A BackgroundSignificant Details In godaddy - A Background
Significant Details In godaddy - A Background
succinctdome5314
 
Scenario 4 presentation
Scenario 4 presentationScenario 4 presentation
Scenario 4 presentation
alexwiggin
 
NYDOC Protocol For VideoConfering Inmates
NYDOC Protocol For VideoConfering InmatesNYDOC Protocol For VideoConfering Inmates
NYDOC Protocol For VideoConfering Inmates
Todd Spodek
 
Discovery Conversation Guide (template)
Discovery Conversation Guide (template)Discovery Conversation Guide (template)
Discovery Conversation Guide (template)
Voyant Academy
 

Similar to Ann Housekeeping Presentation (11)

Supplement your medical grant funding with a multi channel fundraising strategy
Supplement your medical grant funding with a multi channel fundraising strategySupplement your medical grant funding with a multi channel fundraising strategy
Supplement your medical grant funding with a multi channel fundraising strategy
 
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
 
Virtual Cleared Job Fair Guide for Job Seekers
Virtual Cleared Job Fair Guide for Job SeekersVirtual Cleared Job Fair Guide for Job Seekers
Virtual Cleared Job Fair Guide for Job Seekers
 
Collaboration Architecture Design: Connected Consumers and the Omni Channel E...
Collaboration Architecture Design: Connected Consumers and the Omni Channel E...Collaboration Architecture Design: Connected Consumers and the Omni Channel E...
Collaboration Architecture Design: Connected Consumers and the Omni Channel E...
 
Stolen and Lost Wireless Devices
Stolen and Lost Wireless DevicesStolen and Lost Wireless Devices
Stolen and Lost Wireless Devices
 
How we-work
How we-workHow we-work
How we-work
 
Adapting HIV Interventions for Targeting MSM Online Populations
Adapting HIV Interventions for Targeting MSM Online PopulationsAdapting HIV Interventions for Targeting MSM Online Populations
Adapting HIV Interventions for Targeting MSM Online Populations
 
Significant Details In godaddy - A Background
Significant Details In godaddy - A BackgroundSignificant Details In godaddy - A Background
Significant Details In godaddy - A Background
 
Scenario 4 presentation
Scenario 4 presentationScenario 4 presentation
Scenario 4 presentation
 
NYDOC Protocol For VideoConfering Inmates
NYDOC Protocol For VideoConfering InmatesNYDOC Protocol For VideoConfering Inmates
NYDOC Protocol For VideoConfering Inmates
 
Discovery Conversation Guide (template)
Discovery Conversation Guide (template)Discovery Conversation Guide (template)
Discovery Conversation Guide (template)
 

More from Jarrod Olson

Graybeal Social Networking Emergency Management Brief
Graybeal   Social Networking Emergency Management BriefGraybeal   Social Networking Emergency Management Brief
Graybeal Social Networking Emergency Management Brief
Jarrod Olson
 
Graybeal Social Networking Emergency Management Brief
Graybeal   Social Networking Emergency Management BriefGraybeal   Social Networking Emergency Management Brief
Graybeal Social Networking Emergency Management Brief
Jarrod Olson
 
Graybeal Social Networking Emergency Management Brief
Graybeal   Social Networking Emergency Management BriefGraybeal   Social Networking Emergency Management Brief
Graybeal Social Networking Emergency Management Brief
Jarrod Olson
 
Facebook And Twitter As Emergency Management Communications Tool
Facebook And Twitter As Emergency Management Communications ToolFacebook And Twitter As Emergency Management Communications Tool
Facebook And Twitter As Emergency Management Communications Tool
Jarrod Olson
 
C:\Documents And Settings\D3x495\Desktop\Presentations\Presentations Mornin...
C:\Documents And Settings\D3x495\Desktop\Presentations\Presentations   Mornin...C:\Documents And Settings\D3x495\Desktop\Presentations\Presentations   Mornin...
C:\Documents And Settings\D3x495\Desktop\Presentations\Presentations Mornin...
Jarrod Olson
 
Woodbury Pnnl Conference 3 10 2010 A
Woodbury   Pnnl Conference 3 10 2010 AWoodbury   Pnnl Conference 3 10 2010 A
Woodbury Pnnl Conference 3 10 2010 A
Jarrod Olson
 

More from Jarrod Olson (6)

Graybeal Social Networking Emergency Management Brief
Graybeal   Social Networking Emergency Management BriefGraybeal   Social Networking Emergency Management Brief
Graybeal Social Networking Emergency Management Brief
 
Graybeal Social Networking Emergency Management Brief
Graybeal   Social Networking Emergency Management BriefGraybeal   Social Networking Emergency Management Brief
Graybeal Social Networking Emergency Management Brief
 
Graybeal Social Networking Emergency Management Brief
Graybeal   Social Networking Emergency Management BriefGraybeal   Social Networking Emergency Management Brief
Graybeal Social Networking Emergency Management Brief
 
Facebook And Twitter As Emergency Management Communications Tool
Facebook And Twitter As Emergency Management Communications ToolFacebook And Twitter As Emergency Management Communications Tool
Facebook And Twitter As Emergency Management Communications Tool
 
C:\Documents And Settings\D3x495\Desktop\Presentations\Presentations Mornin...
C:\Documents And Settings\D3x495\Desktop\Presentations\Presentations   Mornin...C:\Documents And Settings\D3x495\Desktop\Presentations\Presentations   Mornin...
C:\Documents And Settings\D3x495\Desktop\Presentations\Presentations Mornin...
 
Woodbury Pnnl Conference 3 10 2010 A
Woodbury   Pnnl Conference 3 10 2010 AWoodbury   Pnnl Conference 3 10 2010 A
Woodbury Pnnl Conference 3 10 2010 A
 

Recently uploaded

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Ann Housekeeping Presentation

  • 1. Welcome to “Social Networking for Emergency Management & Public Safety” Workshop Sponsored by the Collaborative DHS-DOD Program Interagency Biological Restoration Demonstration
  • 2.
  • 3.