Ontologies for Emergency & Disaster Management Stephane Fellah
Ogc meeting march 2014
OGC OWS-10 Cross-Community Interoperability
Ontologies for Emergency & Disaster Management
(The application of geospatial linked data)
Sensors, threats, responses and challenges - Dr Emil Lupu (Imperial College L...Comit Projects Ltd
Presentation by Dr Emil Lupu (Imperial College London)at COMIT 2016: Digitally Building Britain, September 2016
More information: http://www.comit.org.uk/liveblog
Building Catastrophe Models using Open Data and Open SourceChris Ewing
The presentation looks at catastrophe modelling before showing how Impact Forecasting use open data and open source to build models and visualise model inputs and outputs.
Ontologies for Emergency & Disaster Management Stephane Fellah
Ogc meeting march 2014
OGC OWS-10 Cross-Community Interoperability
Ontologies for Emergency & Disaster Management
(The application of geospatial linked data)
Sensors, threats, responses and challenges - Dr Emil Lupu (Imperial College L...Comit Projects Ltd
Presentation by Dr Emil Lupu (Imperial College London)at COMIT 2016: Digitally Building Britain, September 2016
More information: http://www.comit.org.uk/liveblog
Building Catastrophe Models using Open Data and Open SourceChris Ewing
The presentation looks at catastrophe modelling before showing how Impact Forecasting use open data and open source to build models and visualise model inputs and outputs.
After an looking back at the history of Eclipse OHF and its parts, we're going to learn what happened to them and why.
Beside those going a different path, mainly Open Health Tools (OHT) we take a closer look at the Legacy of OHF at Eclipse, mainly The Spatiotemporal Epidemiological Modeler (STEM) and Units of Measurement support from UOMo and related standards like the Unified Code for Units of Measure (UCUM)
DevOps Will Save The World! : Public Safety, Public Policy, and DevOps In Context
Joshua Corman, CTO, Sonatype
Link to video: https://www.youtube.com/watch?v=K-hskShNyoo
Efficient and thorough data collection and its timely analysis are critical for disaster response and recovery in order to save people's lives during disasters. However, access to comprehensive data in disaster areas and their quick analysis to transform the data to actionable knowledge are challenging. With the popularity and pervasiveness of mobile devices, crowdsourcing data collection and analysis has emerged as an effective and scalable solution. This paper addresses the problem of crowdsourcing mobile videos for disasters by identifying two unique challenges of 1) prioritizing visual data collection and transmission under bandwidth scarcity caused by damaged communication networks and 2) analyzing the acquired data in a timely manner. We introduce a new crowdsourcing framework for acquiring and analyzing the mobile videos utilizing fine granularity spatial metadata of videos for a rapidly changing disaster situation. We also develop an analytical model to quantify the visual awareness of a video based on its metadata and propose the visual awareness maximization problem for acquiring the most relevant data under bandwidth constraints. The collected videos are evenly distributed to off-site analysts to collectively minimize crowdsourcing efforts for analysis. Our simulation results demonstrate the effectiveness and feasibility of the proposed framework.
Links:
http://infolab.usc.edu/DocsDemos/to_ieeebigdata2015.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7363814
Artificial intelligence (AI) is experiencing steadily growing interest over the recent years. For good reason, since these innovative algorithms and methods, such as machine learning and deep neural networks, in which knowledge is acquired and applied based on data, enable the automation of a wide range of processes and quickly deliver precise results. AI is also getting more and more popular in the space sector. The Institute of Space Technology & Space Applications (ISTA) at the Universität der Bundeswehr in Munich is conducting research around AI for space operations, science, and technology. An overview of activities and current developments towards fault management, autonomous collision avoidance, autonomous landing, as well as radio science at ISTA will be presented.
The Untold Story of Data in the (D)OOH IndustryAirsqreen Team
In the advertising industry, wherever you look, whoever you talk to, it’s all about data. And it makes sense because we need data to advertise more effectively and more efficiently.
(D)OOH has been suffering in this area, but many organizations and companies around the world try to connect data - especially audience data to this medium.
Though, there are still some challenges. And in this paper, we analyze those challenges in 4 main sections:
1- Data source
2- Data quality
3- Lack of universal tracking technology
4- Lack of real-time insight
-----
1- Data Sources
Let’s start with the most important one; where are we collecting data from?
Depending on the type of data, this source can change. If it’s weather data, it can come from sources like OpenWeatherMap.org. If it’s traffic data, it can come from sources like Here.com. There are many data sources out there that can provide all kinds of information needed to make the campaign more interesting.
But when it comes to the audience data, especially audience-location data, things get a little more complicated. This data is mainly retrieved from 2 sources:
Mobile apps (direct integration and/or bidstream)
Hardware installed around a screen (camera, beacon, etc.)
---
2- Data Quality
The second question we should ask is; what is the quality of the data we collect from these sources? Whether it’s weather data, traffic data, or the location data of an audience, how accurate is it?
...
When it comes to audience location data, again, things are a little more complicated. The main question we try to answer is: is the person around our ad?
If there is hardware like a BLE device around a screen, there may be highly accurate positioning of the person, but these technologies could drain a phone’s battery very quickly. Also, BLE devices usually don’t produce highly accurate positions, and sometimes 1 meter makes a big difference when you’re around a screen. And again, installing hardware is costly and not very scalable, also the regulations could become a problem.
-----
4- Real-time Insight
While we are at it, the 4th step of the graph above (Figure 2) is about trying to understand if the user was around a screen. Well, for digital ads, it’s simple, because you show the ad when the user loads the page in real-time (i.e. most likely looking at the screen).
For (D)OOH, you have to make complex (probabilistic) calculations to analyze if the user is around the screen. There is rarely real-time information available. And even if you install some sort of hardware to the billboard to get this information in real-time with higher accuracy, as the Route (UK) puts it “those exposed to the medium are constantly moving”, meaning they may not be looking at the screen.
Paolo GAMBA1, Helen CROWLEY2, Nicole KELLER2
1Dipartimento di Ingegneria Industriale e dell'Informazione, University of Pavia, Italy; 2GEM Foundation, Italy
Using Data Integration to Deliver Intelligence to Anyone, AnywhereSafe Software
Data integration makes it possible to deliver intelligence and keep decision makers, first responders, and civilians informed. For over 20 years, FME has been trusted by federal governments to move data from nearly any source to the target destination, while saving time and budget resources.
With FME, federal governments can deliver open data, improve emergency & disaster response, enhance land management, turn public safety and defense into actionable results, and integrate & deliver location intelligence.
Understand the incident lifecycle below - it stands important to analyze incidents that can negatively impact workers, business operations, and physical assets.
How Healthcare CISOs Can Secure Mobile DevicesSkycure
Original webinar: http://get.skycure.com/mobile-security-in-healthcare-webinar
In this webinar, Jim Routh, CSO at Aetna, and Adi Sharabani, CEO and co-founder at Skycure, discuss:
- The state of mobile security in Healthcare organizations
- How to improve incident response and resilience of mHealth IT operations
- How to leverage risk-based mobility to predict, detect and protect against threats
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
While hackers have known the importance of sharing research to improve security for years, the importance of coordinated vulnerability disclosure is increasingly recognized by governments around the world. The principals of disclosure an protecting security researchers are common across borders, but different countries have some key differences. This panel will present a global perspective that may in turn inform key public policy and company behavior.
ENISA has published 'Coordinated Vulnerability Disclosure policies in the EU' in April 2022 . This report not only provides an objective introduction to the current state of coordinated vulnerability disclosure policies in the Member States of the European Union, but also introduces the operation of vulnerability disclosure in China, Japan and the USA. Based on these findings, the desirable and good practice elements of a coordinated vulnerability disclosure process are examined, followed by a discussion of the challenges and issues.
This session aims to share the contents of this report and clarify the challenges and future direction of operations in Japan, as well as national security and vulnerability handling issues in the US, in a panel discussion with representatives from various jurisdictions.
The panelists are involved in the practice of early warning partnership notified bodies in Japan, the authors of the above report in Europe and the contributors to the above report in the US.
In Japan, the issues of system awareness, incentives, increase in the number of outstanding cases in handling and so-called triage in handling vulnerabilities will be introduced.
From the United States, the Vulnerabilities Equities Process for National Security and the publication of a non-prosecution policy for vulnerability research will be introduced, as well as a historical background on the issue.
The aim is that the panel discussion will enable the audience to understand the international situation surrounding CVD, as well as future trends, in particular the important role of vulnerability in cybersecurity and the challenges faced by society around it.
This presentation presents a future vision for the year 2020, when geocoded communication of location in Australia will comprise the infrastructure, processes and knowledge that enable accurate, trusted, timely and unambiguous translation of a descriptive tag to a place in time and 3-dimensional space.
In this vision, the broad community captures, maintains and shares geocoded location data. Confidence in the data comes from its single source of truth, its transparency and auditable provenance. Government’s role is that of a facilitator, ensuring trust, setting relevant standards and (open data) policies, while the market provides value-add, fit for purpose channels.
Users will have access to geocoded location data that is trusted, has a greater resolution than is available through ‘traditional’ notion of address, allows greater ease of communication of location, and supports fitness for purpose geocodes, access points, and tags.
Mythbusting: "Authoritative data must come from an official source"Maurits van der Vlugt
In the Spatial Information industry (as in many others), you will have heard variations of this phrase many times. Often accompanied by an scary anecdote of how an ambulance was sent to a wrong address and someone died.
Is the statement true, or is it a myth?
More Related Content
Similar to GeoSpatial Standards in Emergency Management
After an looking back at the history of Eclipse OHF and its parts, we're going to learn what happened to them and why.
Beside those going a different path, mainly Open Health Tools (OHT) we take a closer look at the Legacy of OHF at Eclipse, mainly The Spatiotemporal Epidemiological Modeler (STEM) and Units of Measurement support from UOMo and related standards like the Unified Code for Units of Measure (UCUM)
DevOps Will Save The World! : Public Safety, Public Policy, and DevOps In Context
Joshua Corman, CTO, Sonatype
Link to video: https://www.youtube.com/watch?v=K-hskShNyoo
Efficient and thorough data collection and its timely analysis are critical for disaster response and recovery in order to save people's lives during disasters. However, access to comprehensive data in disaster areas and their quick analysis to transform the data to actionable knowledge are challenging. With the popularity and pervasiveness of mobile devices, crowdsourcing data collection and analysis has emerged as an effective and scalable solution. This paper addresses the problem of crowdsourcing mobile videos for disasters by identifying two unique challenges of 1) prioritizing visual data collection and transmission under bandwidth scarcity caused by damaged communication networks and 2) analyzing the acquired data in a timely manner. We introduce a new crowdsourcing framework for acquiring and analyzing the mobile videos utilizing fine granularity spatial metadata of videos for a rapidly changing disaster situation. We also develop an analytical model to quantify the visual awareness of a video based on its metadata and propose the visual awareness maximization problem for acquiring the most relevant data under bandwidth constraints. The collected videos are evenly distributed to off-site analysts to collectively minimize crowdsourcing efforts for analysis. Our simulation results demonstrate the effectiveness and feasibility of the proposed framework.
Links:
http://infolab.usc.edu/DocsDemos/to_ieeebigdata2015.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7363814
Artificial intelligence (AI) is experiencing steadily growing interest over the recent years. For good reason, since these innovative algorithms and methods, such as machine learning and deep neural networks, in which knowledge is acquired and applied based on data, enable the automation of a wide range of processes and quickly deliver precise results. AI is also getting more and more popular in the space sector. The Institute of Space Technology & Space Applications (ISTA) at the Universität der Bundeswehr in Munich is conducting research around AI for space operations, science, and technology. An overview of activities and current developments towards fault management, autonomous collision avoidance, autonomous landing, as well as radio science at ISTA will be presented.
The Untold Story of Data in the (D)OOH IndustryAirsqreen Team
In the advertising industry, wherever you look, whoever you talk to, it’s all about data. And it makes sense because we need data to advertise more effectively and more efficiently.
(D)OOH has been suffering in this area, but many organizations and companies around the world try to connect data - especially audience data to this medium.
Though, there are still some challenges. And in this paper, we analyze those challenges in 4 main sections:
1- Data source
2- Data quality
3- Lack of universal tracking technology
4- Lack of real-time insight
-----
1- Data Sources
Let’s start with the most important one; where are we collecting data from?
Depending on the type of data, this source can change. If it’s weather data, it can come from sources like OpenWeatherMap.org. If it’s traffic data, it can come from sources like Here.com. There are many data sources out there that can provide all kinds of information needed to make the campaign more interesting.
But when it comes to the audience data, especially audience-location data, things get a little more complicated. This data is mainly retrieved from 2 sources:
Mobile apps (direct integration and/or bidstream)
Hardware installed around a screen (camera, beacon, etc.)
---
2- Data Quality
The second question we should ask is; what is the quality of the data we collect from these sources? Whether it’s weather data, traffic data, or the location data of an audience, how accurate is it?
...
When it comes to audience location data, again, things are a little more complicated. The main question we try to answer is: is the person around our ad?
If there is hardware like a BLE device around a screen, there may be highly accurate positioning of the person, but these technologies could drain a phone’s battery very quickly. Also, BLE devices usually don’t produce highly accurate positions, and sometimes 1 meter makes a big difference when you’re around a screen. And again, installing hardware is costly and not very scalable, also the regulations could become a problem.
-----
4- Real-time Insight
While we are at it, the 4th step of the graph above (Figure 2) is about trying to understand if the user was around a screen. Well, for digital ads, it’s simple, because you show the ad when the user loads the page in real-time (i.e. most likely looking at the screen).
For (D)OOH, you have to make complex (probabilistic) calculations to analyze if the user is around the screen. There is rarely real-time information available. And even if you install some sort of hardware to the billboard to get this information in real-time with higher accuracy, as the Route (UK) puts it “those exposed to the medium are constantly moving”, meaning they may not be looking at the screen.
Paolo GAMBA1, Helen CROWLEY2, Nicole KELLER2
1Dipartimento di Ingegneria Industriale e dell'Informazione, University of Pavia, Italy; 2GEM Foundation, Italy
Using Data Integration to Deliver Intelligence to Anyone, AnywhereSafe Software
Data integration makes it possible to deliver intelligence and keep decision makers, first responders, and civilians informed. For over 20 years, FME has been trusted by federal governments to move data from nearly any source to the target destination, while saving time and budget resources.
With FME, federal governments can deliver open data, improve emergency & disaster response, enhance land management, turn public safety and defense into actionable results, and integrate & deliver location intelligence.
Understand the incident lifecycle below - it stands important to analyze incidents that can negatively impact workers, business operations, and physical assets.
How Healthcare CISOs Can Secure Mobile DevicesSkycure
Original webinar: http://get.skycure.com/mobile-security-in-healthcare-webinar
In this webinar, Jim Routh, CSO at Aetna, and Adi Sharabani, CEO and co-founder at Skycure, discuss:
- The state of mobile security in Healthcare organizations
- How to improve incident response and resilience of mHealth IT operations
- How to leverage risk-based mobility to predict, detect and protect against threats
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
While hackers have known the importance of sharing research to improve security for years, the importance of coordinated vulnerability disclosure is increasingly recognized by governments around the world. The principals of disclosure an protecting security researchers are common across borders, but different countries have some key differences. This panel will present a global perspective that may in turn inform key public policy and company behavior.
ENISA has published 'Coordinated Vulnerability Disclosure policies in the EU' in April 2022 . This report not only provides an objective introduction to the current state of coordinated vulnerability disclosure policies in the Member States of the European Union, but also introduces the operation of vulnerability disclosure in China, Japan and the USA. Based on these findings, the desirable and good practice elements of a coordinated vulnerability disclosure process are examined, followed by a discussion of the challenges and issues.
This session aims to share the contents of this report and clarify the challenges and future direction of operations in Japan, as well as national security and vulnerability handling issues in the US, in a panel discussion with representatives from various jurisdictions.
The panelists are involved in the practice of early warning partnership notified bodies in Japan, the authors of the above report in Europe and the contributors to the above report in the US.
In Japan, the issues of system awareness, incentives, increase in the number of outstanding cases in handling and so-called triage in handling vulnerabilities will be introduced.
From the United States, the Vulnerabilities Equities Process for National Security and the publication of a non-prosecution policy for vulnerability research will be introduced, as well as a historical background on the issue.
The aim is that the panel discussion will enable the audience to understand the international situation surrounding CVD, as well as future trends, in particular the important role of vulnerability in cybersecurity and the challenges faced by society around it.
This presentation presents a future vision for the year 2020, when geocoded communication of location in Australia will comprise the infrastructure, processes and knowledge that enable accurate, trusted, timely and unambiguous translation of a descriptive tag to a place in time and 3-dimensional space.
In this vision, the broad community captures, maintains and shares geocoded location data. Confidence in the data comes from its single source of truth, its transparency and auditable provenance. Government’s role is that of a facilitator, ensuring trust, setting relevant standards and (open data) policies, while the market provides value-add, fit for purpose channels.
Users will have access to geocoded location data that is trusted, has a greater resolution than is available through ‘traditional’ notion of address, allows greater ease of communication of location, and supports fitness for purpose geocodes, access points, and tags.
Mythbusting: "Authoritative data must come from an official source"Maurits van der Vlugt
In the Spatial Information industry (as in many others), you will have heard variations of this phrase many times. Often accompanied by an scary anecdote of how an ambulance was sent to a wrong address and someone died.
Is the statement true, or is it a myth?
Confronted with a major crisis in the form of the destructive Canterbury earthquakes of 2010/11, various information communities in Christchurch, New Zealand were suddenly compelled to re-engineer business-as-usual information sharing practices. The former ways of doing things would not scale to meet the new demands for timely and up-to-date information.
They addressed the challenge by adopting standards-based interoperable services to share geospatial information. These achieved efficiencies critical to the disaster response and are on-going for the recovery processes.
Sharing information is one step; Christchurch Earthquake recovery partners defined a further ambition to transact updates between one another, on their different platforms.
To accelerate cross-platform interoperability, the recovery partners, with support from LINZ, hosted a so-called ‘Plugfest’ in May 2012. Within three days a working solution between four vendor platforms was implemented and demonstrated, based on OGC compliant, transactional web-services.
This presentation outlines what was achieved and how. It also invites the audience to consider whether other communities could do likewise i.e. leverage similar benefits, without a catastrophe as catalyst? Establishing geospatial web services as the new ‘business as usual’.
In the first decade of the 21st century, we've seen the business of location intelligence moving well beyond the traditional domains of surveying, remote sensing and spatial analysis. Sometimes referred to as 'neo-geography', we see the rapid emergence of location technologies in new areas such as Location-based Marketing, Augmented Reality, Crowdsourcing, Crisis Mapping, and Gaming. Most of these implementations are (very successfully) being developed by non-GIS practitioners, who don't know, nor care, about projections, topology, or CORS networks. This presentation will look at this rapidly moving field through some recent examples, and poses questions such as: should we be worried, and will there be any registered surveyors left in 20 years time?
There are a multitude of organisations in Australia and New Zealand pursuing spatial data supply chain initiatives. There is little to no co-ordination of these developments, leading to duplication of effort, wasted investment and missed opportunities. This presentation presents the results of the CRC-SI “Alignment Study”; an inventory of these initiatives, gaps and overlaps and research opportunities that arise.
How Social Media is changing the face of Emergency Management, especially in the realm of community resilience. Case studies of the Queensland Floods, Japan Earthquake/Tsunami and Bushfire Connect
Mercury PS 5 min. Soapbox presentation to the Australian Collaborative Research Centre for Spatial Information (CRC-SI) Annual Conference.
Arguing that SDI 1.0 (Yet Another Portal) is dying and SDI 2.0 presents the future of Research.
Providing timely, location enabled information to responders and citizens is critical in managing major emergencies such as bushfires. In major recent events (Canberra 2003, Victoria 2009), traditional communication technologies and methods could not cope sufficiently with the magnitude of the event. More recently and abroad (notably the Haiti Earthquake) Web 2.0 technologies are proving to be invaluable enhancements to traditional information management practices, helping save property and lives.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Designing Great Products: The Power of Design and Leadership by Chief Designe...
GeoSpatial Standards in Emergency Management
1. Examining Strategies for Geospatial INteroperabilityMaurits van der VlugtSpatial Information Strategist, Mercury Project SolutionsCo-Chair, Disaster Management Working Group,Open GeoSpatial Consortium (OGC)
2.
3. (geospatial) Standards are boring Boffin Stuff Don’t save lives or property Not a good conversation topic
4. Have you Heard this before? “We can't share maps on the Web.” ”We can't deliver data to different systems.” "We don't have a common language to speak about our geospatial data or our services.” "We can't find and pull together data from our automated sensors.” “We have security issues relating to geospatial data exchange.”
8. WhAt Can standards Bring? Different Systems in Different Agencies Communicate Seamlessly Securely While retaining information content and accuracy Interoperability! “My stuff works with your stuff, and I don’t care where it is, how it works and what the format is.” (Lesley Wyborn – Geoscience Australia)
9. A Sample –Blue Sky - Scenario Demonstrator Scene National disaster claims centre for Metropolitan Insurance Company (MIC) Type of Incident Damage prevention and assessment as the result of a severe thunderstorm Incident Site Liverpool / Blacktown NSW Main Actors Nicole – national claims manager Brian – console operator
10. What will we be seeing? 1. Live data alert 2. Preventive Action 3. Impact Analysis 4. Claims Analysis 5. Publishing
11. Storm warning comes in Mid-afternoon on a busy weekday Storm approaching Liverpool / Blacktown, tracking south-easterly BOM issues severe weather alert for Liverpool / Blacktown area Brian is on duty in MIC control centre Receives the severe weather alert and previews alert 1. Live data alert 2. Preventive Action 3. Impact Analysis 4. Claims Analysis Play Movie (press ‘Esc’ to stop) 5. Publishing
12. A storm is advancing into the Sydney Area The BOM Radar detects the thunderstorm… And broadcasts a warning email The Metropolitan Insurance Co receive the email 1.1
13. The Map Viewer is loaded from Perth In turn, the viewer loads the predefined map… 1.1
14. Scene 2 – Potential threat assessment Brian starts up MIC GIS System Adds live weather feeds from BOM on his console Nicole defines “threat zone” Asks to see impact on MIC’s policy portfolio Property & Motor vehicles # of policy holders affected Total insured value Estimated Claims exposure Instructs call centre not to accept any more business in the area 1. Live data alert 2. Preventive Action 3. Impact Analysis 4. Claims Analysis 5. Publishing Play Movie (press ‘Esc’ to stop)
15. The MIC GIS reads base map from PSMA / Mapwerks… Weather information from the Bureau of Meteorology and adds policy holders from the MIC database 1.2
16. Scene 2 - Proactive damage prevention Customer calls wishing to take out a new policy CRM alerts operator that the address falls inside threat zone Customer unable to take out a policy at this time Nicole asks Brian to issue an SMS alert to affected policy holders 1. Live data alert 2. Preventive Action 3. Impact Analysis MIC alert: storm warning Liverpool / Blacktown area. 4. Claims Analysis 5. Publishing Play Movie (press ‘Esc’ to stop)
18. Scene 3 - Initial damage assessment Within hours, MIC starts receiving claims. All calls are logged and geocoded. Early indications that severe damage is concentrated in 3 areas Based on claims concentration and (verbal) SES reports Warwick Farm, Lansvale & Chipping Norton Brian creates initial damage/affected areas Nicole arranges for a contractor to fly the affected areas to take high resolution aerial photography. 1. Live data alert 2. Preventive Action 3. Impact Analysis 4. Claims Analysis 5. Publishing Play Movie (press ‘Esc’ to stop)
19. Scene 3 – Impact analysis Aerial photography contractor provides imagery via a web service Brian starts specialised Image Analysis tool Compares “before” and “after” imagery Refines affected areas 1. Live data alert 2. Preventive Action 3. Impact Analysis 4. Claims Analysis 5. Publishing Play Movie (press ‘Esc’ to stop) View Online (opens browser window)
20. New aerial photography is flown… And compared with previous archival photography To define affected areas 1.5-1.7
21. Scene 4 – Claims analysis 1. Live data alert 2. Preventive Action 3. Impact Analysis 4. Claims Analysis 5. Publishing Nicole spots inconsistencies in expected pattern of claims Claims outside affected areas Policy holders in affected areas not submitting claims Earmarks these claims/policies for further investigation
22. Spatial analysis of claims Claim in affected area No claim in affected area Claim NOT in affected area Policies Claims 1.8
33. Blue Sky? Demonstrated in 2005 Live, online web services 6 different vendors & systems Out-of-the-box technology Using Open Geospatial Standards So why don’t we have this working in 2011?
40. Cross-platform Open GeoSMS http://maps.google.com/maps?q=38.9985,-77.030275&GeoSMS I am here for OGC TC Meeting. Let’s watch the NBA final game 5 tonight!
41. Real practice in Taiwan Venders/Services that have adapted Open GeoSMS Open GeoSMS Enabled Service
42. Free App: Open GeoSMSer Free download from Android Marketplace Get GPS data and send Open GeoSMS to your contact Receive Open GeoSMS, bring up map and POI info Developed with Open GeoSMS SDK from ITRI
43. Summary Standards may be boring, but Interoperability is Critical Technology is not the problem Publish data as open, standard web-services Others can use it Timely, Transparent, Accurate Closed systems are no longer acceptable
44. Thank You Maurits.vandervlugt@mercuryps.com.au http://mercuryps.com.au Twitter: @mvandervlugt OGC: http://opengeospatial.org Slide Acknowledgements: Steven Ramage (OGC) Spatial Business Industry Association (SIBA)
Editor's Notes
Yawn, everybody firmly asleep yet?
The Open Geospatial Consortium (OGC) is the only body dedicated to geospatial standards only. However, it works in collaboration with a number of other Standards Development Organisations (SDO), such as IEEE, IETF, NCOIC, OGF, ISO, CEN and OASIS.