The document proposes a browser or management app for Google's Person Finder database that allows users to manage entries more easily. It would let users create lists of people, add entries to lists, and share lists on social networks. The app would provide a fast status overview of entries and display detailed information like maps and social media posts. It could also integrate with social networks to flag entries as "seen" if a person is posting, and notify users of status changes like a missing person being found alive.
Missioinformatics - How Information Technology Contribute to Mission StudyHokuto Ide
Oxford Centre for Mission Studies lecture on December 7th 2021. Hokuto “Joel” Ide is the editor in Chief of Christian Today Japan. An ex-atheist converted to evangelical data journalist focusing mission. Graduated from International Christian University with BA majoring in computer science. Earned MA in Information Technology and now enrolled in PhD program for Global Theological Study at Olivet University.
IBM Corporate Service Corps - Helping Create Interactive Flood MapsHeiko Joerg Schick
This presentation will provide an overview and insights into the IBM Corporate Service Corps program, the flood prediction system and the real-time flood simulation. We first present the flood level simulation of Metro Manila. We then describe the architecture of the proof-of-concept in some detail. In particular, we discuss the long-term goal by combining several on-the-shelf technologies together, analyzing rainfall data from rain gauges and cloud moistures in satellite images to finally use a simulation model to predict the flood level.
Missioinformatics - How Information Technology Contribute to Mission StudyHokuto Ide
Oxford Centre for Mission Studies lecture on December 7th 2021. Hokuto “Joel” Ide is the editor in Chief of Christian Today Japan. An ex-atheist converted to evangelical data journalist focusing mission. Graduated from International Christian University with BA majoring in computer science. Earned MA in Information Technology and now enrolled in PhD program for Global Theological Study at Olivet University.
IBM Corporate Service Corps - Helping Create Interactive Flood MapsHeiko Joerg Schick
This presentation will provide an overview and insights into the IBM Corporate Service Corps program, the flood prediction system and the real-time flood simulation. We first present the flood level simulation of Metro Manila. We then describe the architecture of the proof-of-concept in some detail. In particular, we discuss the long-term goal by combining several on-the-shelf technologies together, analyzing rainfall data from rain gauges and cloud moistures in satellite images to finally use a simulation model to predict the flood level.
This keynote was put together in less than 24 hour hours with the help of
Andrew Turner, FortiusOne
Jeff Harrison, Carbon Project
Jill M Terlaak Mulica, City of Greeley, CO
Gretchen N. Peterson, Peterson GIS
Nuke Goldstein, Carbon Project
Sean Gorman, FortiousOne
Shelby Johnson, AGIO
My apologies if I left anyone out
Open Government Data Tutorial at CLEI 2013. Part 5 Semantic Issuesjpane
This tutorial about Open Government Data was a 4 hours tutorial at the Conferencia Latinoameticana en Informatica (CLEI 2013) http://clei2013.org.ve/ divided into 5 parts:
1 - Introduction
http://www.slideshare.net/jpane/open-government-data-tutorial-at-clei-2013-part-1-introduction
2 - Issues
https://www.slideshare.net/jpane/02-issues-v4slideshare
3 - Real Experience
http://www.slideshare.net/jpane/open-government-data-tutorial-03-real-experience
4 - Applications
http://www.slideshare.net/jpane/open-government-data-tutorial-at-clei-2013-part-4-applications
5 - Semantic Issues
http://www.slideshare.net/jpane/open-government-data-tutorial-at-clei-2013-part-5-semantic-issues
This is part 5 - Semantic Issues
Crisis Communications Online: Web and Social MediaJeffrey Levy
How EPA uses online tools to communicate during crises like 9/11, Hurricane Katrina, the BP oil spill, and the Japanese nuclear incident after their huge earthquake.
#mytweet via Instagram: Exploring User Behaviour Across Multiple Social NetworksBang Hui Lim
We study how users of multiple online social net- works (OSNs) employ and share information by studying a common user pool that use six OSNs – Flickr, Google+, Instagram, Tumblr, Twitter, and YouTube. We analyze the temporal and topical signature of users’ sharing behaviour, showing how they exhibit distinct behaviorial patterns on different networks. We also examine cross-sharing (i.e., the act of user broadcasting their activity to multiple OSNs near-simultaneously), a previously unstudied behaviour and demonstrate how certain OSNs play the roles of originating source and destination sinks.
This handout accompanies slides -- Developing a data mindset to improve stories every day -- taught by Brant Houston at Illinois NewsTrain on April 1, 2022. Houston is the Knight Chair in Investigative Reporting at the University of Illinois, where he oversees an online newsroom, CU-CitizenAccess.org. For more info on the News Leaders Association's NewsTrain, see https://www.newsleaders.org/newstrain.
Data Science For Social Good: Tackling the Challenge of HomelessnessAnita Luthra
A talk presented at the Champions Leadership Conference Series - leveraging data provided by New York City’s Department of Homeless Services, software vendor Tibco partnered with SumAll.Org to help tackle the societal challenge of homelessness in New York City.
Designing and deploying mobile user studies in the wild: a practical guideKaren Church
This tutorial was presented as part of Mobile HCI 2012 in San Francisco on the 19th September 2012. The tutorial aims to provide a practical guide to conduct mobile field studies based on the learning outcomes of the research I've been involved in while working as a Research Scientist in Telefonica Research, Barcelona. I cover how to design effective mobile field studies, the importance of mobile prototyping, the impact of various design choices on the study setup and deployment, how to engage participants and how to avoid ethical and legal issues. I've also tried to include listings of useful resources for those who are interested in conducting mobile field studies of their own.
More details: http://mm2.tid.es/mhcitutorial/
Karen Church
Research Scientist
Telefonica Research
www.karenchurch.com
@karenchurch
Preservation for all: the future of government documents and the “digital FDL...James Jacobs
Preservation for all: the future of government documents and the “digital FDLP” puzzle. A presentation at the Ohio GODORT spring 2011 meeting (by invitation). Friday, June 3, 2011 at the State Library of Ohio.
Agenda:
library principles and best practices
case studies:
--Everyday Electronic Materials (EEMs) “Water droplets”
--Archive-it “Oceans”
--lockss-usdocs “Waterfalls”
--Collaboration: delicious, state agency databases “Reservoirs”
--reflection of projects based on principles
Did you know Social Media Marketing Land provides a lot of quality content on different topics and industry news. From updates in content management systems, to new features on social media platforms, their posts are informative and relevant.
Recently some of their posts covered the CES Tech event in Las Vegas by posting panel discussions and blogging about different topics that were covered throughout the event. This live blog allowed people, who may not have been able to make it to the actual event, stay informed and become a part of the discussion even though they were not in attendance. Their blog lets you interact with various industry leaders, while providing their audience with content that is engaging and educational.
Da Vinci - A scaleable architecture for neural network computing (updated v4)Heiko Joerg Schick
Introduction
- Computation in brains and machines
- The hype roller coaster of artificial intelligence | Neural networks beat human performance
- Two distinct eras of compute usage in training AI systems
- Microprocessor trends | Rich variety of computing architectures
- Comparison of processors for deep learning | Preferred architectures for compute are shifting
- Data structure of digital images | Kernel convolution example | - - - Architecture of LeNet-5
Applicability of artificial intelligence
- Ubiquitous and future AI computation requirements
- Artificial intelligence in modern medicine
Product realisation
- Scalable across devices
- Focus on innovation, continuous dedication and backward compatibility
- HiSilicon Ascend 310 | HiSilicon Ascend 910 | HiSilicon Kungpeng 920
Da Vinci architecture
- Building blocks and compute intensity
- Advantages of special compute units
- Da Vinci core architecture | Micro-architectural configurations
End-to-end lifecycle
- Implementation of end-to-end lifecycle in AI projects
- The Challenges to AI implementations
Software stack
- Ascend AI software stack | Logical architecture
- Software flow for model conversion and deployment | Framework manager | Digital vision pre-processing
- Mind Studio | Model Zoo (excerpt)
Gain more practical experiences
- Atlas 200 DK developer board | Application examples | Getting started | Environment deployment
- Ascend developer community
Getting started with Atlas 200 DK developer board
- Preparing the Ubuntu-based development environment
- Environment deployment
- Hardware and software requirements | About version 1.73.0.0
- Install environment dependencies
- Install the toolkit packages
- Install the media module device driver
- Install Mind Studio
Create and write SD card image
- Setting up the operating environment
Boot and connect to the Atlas 200 DK developer board
- Power on the Atlas 200 DK developer board
Install third-party packages
- Installation of additional packages (FFmpeg, OpenCV and Python)
Huawei empowers healthcare industry with AI technologyHeiko Joerg Schick
- Microprocessor trends
- Two distinct eras of compute usage in training AI systems
- Rich variety of computing architectures
- Focus on innovation, continuous dedication and backward compatibility
- Artificial intelligence applications in healthcare systems
- Retinal blood vessel segmentation in the eyeground
- Prediction of protein subcellular localization
- The challenges to AI implementations in projects
More Related Content
Similar to Browser and Management App for Google's Person Finder
This keynote was put together in less than 24 hour hours with the help of
Andrew Turner, FortiusOne
Jeff Harrison, Carbon Project
Jill M Terlaak Mulica, City of Greeley, CO
Gretchen N. Peterson, Peterson GIS
Nuke Goldstein, Carbon Project
Sean Gorman, FortiousOne
Shelby Johnson, AGIO
My apologies if I left anyone out
Open Government Data Tutorial at CLEI 2013. Part 5 Semantic Issuesjpane
This tutorial about Open Government Data was a 4 hours tutorial at the Conferencia Latinoameticana en Informatica (CLEI 2013) http://clei2013.org.ve/ divided into 5 parts:
1 - Introduction
http://www.slideshare.net/jpane/open-government-data-tutorial-at-clei-2013-part-1-introduction
2 - Issues
https://www.slideshare.net/jpane/02-issues-v4slideshare
3 - Real Experience
http://www.slideshare.net/jpane/open-government-data-tutorial-03-real-experience
4 - Applications
http://www.slideshare.net/jpane/open-government-data-tutorial-at-clei-2013-part-4-applications
5 - Semantic Issues
http://www.slideshare.net/jpane/open-government-data-tutorial-at-clei-2013-part-5-semantic-issues
This is part 5 - Semantic Issues
Crisis Communications Online: Web and Social MediaJeffrey Levy
How EPA uses online tools to communicate during crises like 9/11, Hurricane Katrina, the BP oil spill, and the Japanese nuclear incident after their huge earthquake.
#mytweet via Instagram: Exploring User Behaviour Across Multiple Social NetworksBang Hui Lim
We study how users of multiple online social net- works (OSNs) employ and share information by studying a common user pool that use six OSNs – Flickr, Google+, Instagram, Tumblr, Twitter, and YouTube. We analyze the temporal and topical signature of users’ sharing behaviour, showing how they exhibit distinct behaviorial patterns on different networks. We also examine cross-sharing (i.e., the act of user broadcasting their activity to multiple OSNs near-simultaneously), a previously unstudied behaviour and demonstrate how certain OSNs play the roles of originating source and destination sinks.
This handout accompanies slides -- Developing a data mindset to improve stories every day -- taught by Brant Houston at Illinois NewsTrain on April 1, 2022. Houston is the Knight Chair in Investigative Reporting at the University of Illinois, where he oversees an online newsroom, CU-CitizenAccess.org. For more info on the News Leaders Association's NewsTrain, see https://www.newsleaders.org/newstrain.
Data Science For Social Good: Tackling the Challenge of HomelessnessAnita Luthra
A talk presented at the Champions Leadership Conference Series - leveraging data provided by New York City’s Department of Homeless Services, software vendor Tibco partnered with SumAll.Org to help tackle the societal challenge of homelessness in New York City.
Designing and deploying mobile user studies in the wild: a practical guideKaren Church
This tutorial was presented as part of Mobile HCI 2012 in San Francisco on the 19th September 2012. The tutorial aims to provide a practical guide to conduct mobile field studies based on the learning outcomes of the research I've been involved in while working as a Research Scientist in Telefonica Research, Barcelona. I cover how to design effective mobile field studies, the importance of mobile prototyping, the impact of various design choices on the study setup and deployment, how to engage participants and how to avoid ethical and legal issues. I've also tried to include listings of useful resources for those who are interested in conducting mobile field studies of their own.
More details: http://mm2.tid.es/mhcitutorial/
Karen Church
Research Scientist
Telefonica Research
www.karenchurch.com
@karenchurch
Preservation for all: the future of government documents and the “digital FDL...James Jacobs
Preservation for all: the future of government documents and the “digital FDLP” puzzle. A presentation at the Ohio GODORT spring 2011 meeting (by invitation). Friday, June 3, 2011 at the State Library of Ohio.
Agenda:
library principles and best practices
case studies:
--Everyday Electronic Materials (EEMs) “Water droplets”
--Archive-it “Oceans”
--lockss-usdocs “Waterfalls”
--Collaboration: delicious, state agency databases “Reservoirs”
--reflection of projects based on principles
Did you know Social Media Marketing Land provides a lot of quality content on different topics and industry news. From updates in content management systems, to new features on social media platforms, their posts are informative and relevant.
Recently some of their posts covered the CES Tech event in Las Vegas by posting panel discussions and blogging about different topics that were covered throughout the event. This live blog allowed people, who may not have been able to make it to the actual event, stay informed and become a part of the discussion even though they were not in attendance. Their blog lets you interact with various industry leaders, while providing their audience with content that is engaging and educational.
Da Vinci - A scaleable architecture for neural network computing (updated v4)Heiko Joerg Schick
Introduction
- Computation in brains and machines
- The hype roller coaster of artificial intelligence | Neural networks beat human performance
- Two distinct eras of compute usage in training AI systems
- Microprocessor trends | Rich variety of computing architectures
- Comparison of processors for deep learning | Preferred architectures for compute are shifting
- Data structure of digital images | Kernel convolution example | - - - Architecture of LeNet-5
Applicability of artificial intelligence
- Ubiquitous and future AI computation requirements
- Artificial intelligence in modern medicine
Product realisation
- Scalable across devices
- Focus on innovation, continuous dedication and backward compatibility
- HiSilicon Ascend 310 | HiSilicon Ascend 910 | HiSilicon Kungpeng 920
Da Vinci architecture
- Building blocks and compute intensity
- Advantages of special compute units
- Da Vinci core architecture | Micro-architectural configurations
End-to-end lifecycle
- Implementation of end-to-end lifecycle in AI projects
- The Challenges to AI implementations
Software stack
- Ascend AI software stack | Logical architecture
- Software flow for model conversion and deployment | Framework manager | Digital vision pre-processing
- Mind Studio | Model Zoo (excerpt)
Gain more practical experiences
- Atlas 200 DK developer board | Application examples | Getting started | Environment deployment
- Ascend developer community
Getting started with Atlas 200 DK developer board
- Preparing the Ubuntu-based development environment
- Environment deployment
- Hardware and software requirements | About version 1.73.0.0
- Install environment dependencies
- Install the toolkit packages
- Install the media module device driver
- Install Mind Studio
Create and write SD card image
- Setting up the operating environment
Boot and connect to the Atlas 200 DK developer board
- Power on the Atlas 200 DK developer board
Install third-party packages
- Installation of additional packages (FFmpeg, OpenCV and Python)
Huawei empowers healthcare industry with AI technologyHeiko Joerg Schick
- Microprocessor trends
- Two distinct eras of compute usage in training AI systems
- Rich variety of computing architectures
- Focus on innovation, continuous dedication and backward compatibility
- Artificial intelligence applications in healthcare systems
- Retinal blood vessel segmentation in the eyeground
- Prediction of protein subcellular localization
- The challenges to AI implementations in projects
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
2. Preliminary Statements
• All conclusions and observations are my
personal view and are based on my own
interpretation.
• The proposal is made for an major disaster
(e.g. Japan earthquake).
4/13/2011 2
4. End-User Behavior (1)
Source: Google URL Shortener Statistic for Japan Person Finder
Source: Bit.ly URL Shortener Statistic
for Japan Person Finder
Source: Bit.ly URL Shortener Statistic
for Christchurch Person Finder
4/13/2011 4
6. Sequence of Response to Earthquake
Source: Behavior During Earthquakes: A Southern Italian Example, http://www.ijmed.org/viewpdf.php?pdf=mar1990
4/13/2011 6
7. Observations (1)
• A “people finder” tool has the highest usage
during the first week after the disaster
happened.
– Quick response is a must!
– Scalable infrastructure since many requests as to be
handled.
– After the first week the usage is going dramatically down.
4/13/2011 7
13. Observations (2)
• People would use social networks to
communicate that they are save.
• People would request help via a text message or
a social networks (for a known person).
• People would use social networks to get
information.
– Location of food and water
– Evacuation routes or shelter locations
– Road closures or location of medical services
• Remember the benefits, threads and challenges
of social networks!
4/13/2011 13
15. Google’s Person Finder (1)
• Japan's Person Finder has nearly 607,400
records. Source: Google Person Finder , April 4
• Person Finder was created and launched 72
hours after the Haiti earthquake, within one
day of the February 2010 Chile earthquake,
within three hours of the February 2011 New
Zealand earthquake and within one hour after
the Japan earthquake. Source: http://money.cnn.com/2011/03/17/technology/google_person_finder_japan/index.htm?hpt=T2
4/13/2011 15
16. Google’s Person Finder (2)
• The Japanese people finder is available in 8 languages: Japanese, English, Korean, Chinese,
Portuguese, Spanish, Vietnamese.
• The application consist out of 45 Python, 25 HTML, 5 CSS, and 25 Language files. So in theory
it can be available in more as 8 languages!
• Programed in Python with Google's App Engine's API.
– Dynamic web serving, with full support for common web technologies
– Persistent storage with queries, sorting and transactions
– Automatic scaling and load balancing
– APIs for authenticating users and sending email using Google Accounts
– Task queues for performing work outside of the scope of a web request
– Scheduled tasks for triggering events at specified times and regular intervals
• The GUI has a very simple and functional UI flow.
• All data and information is handled in the People Finder Interchange Format (PFIF), so that it
can easily shared with other sides.
4/13/2011 16
20. Section 3
BROWSER AND MANAGEMENT APP
4/13/2011 20
21. Proposal
• Have a browser or management web application for the Google Person Finder database,
which can be used by friends, relatives, companies, aid agency or shelters to administrate
and manage several person entries of the Google Person Finder database.
• The browser or management web application is outside of any social network, but uses third
party social network APIs (e.g. Facebook Graph API, Twitter OAuth API) and the Google
Person Finder database.
• You can create lists, add persons to the list and share a list or a person via social networks
(Twitter, Facebook) with comments (e.g. missing, alive, etc.).
• You can get easy access to Google Person Finder database entries without the need to search
for persons or access the detail page of persons individually.
• Get a fast status overview of one person or all person within a list (e.g. 3 of 10 are missing).
• Display detailed data of a person (including maps, social network posts, etc.).
4/13/2011 21
22. Further Ideas
• Add a “seen” button, which is similar the Facebook “like” button. Increased click rate indicates that
the person is alive. Also, you can see which people pressed the “seen” button, so that you can
request more information.
• Use the information which a person is sharing within its status network as indication that the
person is alive. For example: If someone posted a status update, the coresponding Google Person
Finder database entry can reflect this as “it is likely that person is alive”.
• Use the last known geo tag location (e.g. address) of a person to display additional useful
information on a map. This information can be use by friends, co-workers, etc.
For example:
– If the status is “missing” display emergency routes, hospital and shelter location that are close to the geo
tag location. This gives people an idea where they can search for the missing person.
– If the status is “alive” display food and water locations to give better advices.
• If the status of a person changes (e.g. from missing to alive) sent an e-mail, SMS, Facebook message
or Twitter message. This enables easy usage of push notification services for mobile devices like
smarphones.
4/13/2011 22
23. Nulla dui purus, eleifend vel, consequat
non, dictum porta, nulla. Duis ante mi,
Lists People
Information
1 1
2 2 Header
•List item 1
•List Item 2
3 !
Nulla dui purus, eleifend vel, consequat
non, dictum porta, nulla. Duis ante mi,
laoreet ut, commodo eleifend, cursus nec,
lorem. Aenean eu est. Etiam imperdiet
turpis.
4/13/2011 23
26. Legend
1. Social Network Activities (Sharing, Tagging,
Marking, etc.)
2. Search
3. Short Information about a List or a Person
4. Detail Information about a Person
5. Status Updates
6. List Management
4/13/2011 26
27. More Examples
Display more Information and Search
4/13/2011 27
28. More Examples
Sharing on Social Networks
4/13/2011 28