SlideShare a Scribd company logo
Microsoft’s Role in  International Disaster Risk Reduction Gisli Olafsson Disaster Management – Technical Advisor Microsoft Corporation
Our Vision ,[object Object],[object Object],Our Mission
Short Video
 
What are we working on? Public/Private Partnerships ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Disaster Management ICT Capacity Assessments
Challenges of Coordination Lack of  common operational picture impedes efficient  response Increasing  interagency coordination / complexity Mapping / topography  identification is outdated, slow and  paper-based Difficult to disseminate information quickly  People Process Technology ,[object Object],[object Object],Inter Governmental  Organization Private  Enterprise Critical Infrastructure Citizens Non-Governmental Organizations Nations ,[object Object],[object Object],Leadership
Role of Technology in Disaster Response Coordination with IGOs  ,[object Object],[object Object],[object Object],[object Object],United Nations Office for the Coordination of Humanitarian Affairs (UN OCHA)  Based on lesson’s learned from HIC Myanmar, the portal was deployed in subsequent disasters and became the tool for inter-agency coordination renamed as  OneResponse (http://oneresponse.info)
Disaster Management Infrastructure Optimization Standardized Rationalized Dynamic Basic Managed ICT  infrastructure with limited automation Managed and  consolidated ICT infrastructure with maximum automation Fully automated  management,  dynamic resource  usage, business  linked SLAs Uncoordinated, manual infrastructure  Manage Complexity and Achieve Agility Cost Center More Efficient Cost Center Business Enabler Strategic Asset Dynamic ICT
Disaster Management Infrastructure Optimization Uncoordinated, manual infrastructure  Managed ICT  infrastructure  with limited automation Managed and  consolidated ICT infrastructure with maximum automation Fully automated  management,  dynamic resource  usage, business  linked SLA’s ,[object Object],Standardized Rationalized Dynamic Basic Efficient Cost Center Business Enabler Strategic Asset Cost Center Citizen involvement Early warning Incident Management and Multi-Agency Collaboration Situational Awareness ICT Policy and Critical Infrastructure Protection
Disaster Management Infrastructure Optimization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],How Coutnry XYZ Scored DM IO Comparison Standardized Rationalized Dynamic Basic Citizen Involvement Situational Awareness Incident Mgmt & Multi-Agency  Early Warning ICT Policy and CIP 1 2 3 4 0 Citizen Involvement Situational Awareness Incident Mgmt & Multi-Agency Early Warning ICT Policy and CIP      XYZ  Country Peer Average
Microsoft Vine ,[object Object],[object Object],[object Object],[object Object],[object Object]
 

More Related Content

What's hot

An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
guestc9f21b
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
Carolyn Slade, MS-HIM
 
Introduction to FSU VOST - Spring 2013
Introduction to FSU VOST - Spring 2013Introduction to FSU VOST - Spring 2013
Introduction to FSU VOST - Spring 2013David Merrick II
 
Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...
Jack Whitsitt
 
New Zealand VOST Training Guide - 2012
New Zealand VOST Training Guide - 2012New Zealand VOST Training Guide - 2012
New Zealand VOST Training Guide - 2012
Caroline Milligan
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
Carolyn Slade, MS-HIM
 
Disaster Technology Trends & Digital Volunteerism
Disaster Technology Trends & Digital VolunteerismDisaster Technology Trends & Digital Volunteerism
Disaster Technology Trends & Digital Volunteerism
Brandon Greenberg
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
mkeane
 
ICT for NGO's
ICT for NGO'sICT for NGO's
ICT for NGO'sict4devwg
 
Digital Volunteers and Emergency Management
Digital Volunteers and Emergency Management Digital Volunteers and Emergency Management
Digital Volunteers and Emergency Management
Patrice Cloutier
 
Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...
Trilateral Research
 

What's hot (12)

An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Introduction to FSU VOST - Spring 2013
Introduction to FSU VOST - Spring 2013Introduction to FSU VOST - Spring 2013
Introduction to FSU VOST - Spring 2013
 
Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...
 
New Zealand VOST Training Guide - 2012
New Zealand VOST Training Guide - 2012New Zealand VOST Training Guide - 2012
New Zealand VOST Training Guide - 2012
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Disaster Technology Trends & Digital Volunteerism
Disaster Technology Trends & Digital VolunteerismDisaster Technology Trends & Digital Volunteerism
Disaster Technology Trends & Digital Volunteerism
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
ICT for NGO's
ICT for NGO'sICT for NGO's
ICT for NGO's
 
Digital Volunteers and Emergency Management
Digital Volunteers and Emergency Management Digital Volunteers and Emergency Management
Digital Volunteers and Emergency Management
 
Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...
 

Similar to ICT and Disaster Risk Reduction

Crisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareCrisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced Software
I-Pix Technologies
 
Insteddma08 1224025844002745-9
Insteddma08 1224025844002745-9Insteddma08 1224025844002745-9
Insteddma08 1224025844002745-9InSTEDD
 
Journal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docxJournal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docx
christiandean12115
 
Cloud computing opportunity and challenge for european foundations and gran...
Cloud computing   opportunity and challenge for european foundations and gran...Cloud computing   opportunity and challenge for european foundations and gran...
Cloud computing opportunity and challenge for european foundations and gran...
TechSoup
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Rahul Neel Mani
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Hewlett Packard Enterprise Business Value Exchange
 
Disaster Management Systems: Building Capacity for Developing Countries and ...
Disaster Management Systems: Building Capacity  for Developing Countries and ...Disaster Management Systems: Building Capacity  for Developing Countries and ...
Disaster Management Systems: Building Capacity for Developing Countries and ...
Connie White
 
Emergency Response & Crisis Management for Resilience
Emergency Response & Crisis Management for ResilienceEmergency Response & Crisis Management for Resilience
Emergency Response & Crisis Management for Resilience
I-Pix Technologies
 
Olaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative SecurityOlaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative Security
Internet Technology Matters (Internet Society)
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Ann Treacy
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For Action
Barry Greene
 
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Ahad
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources Report
Samantha Wagner
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
Kevin Leffew
 
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
 Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats" Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
EC-Council
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
CMR WORLD TECH
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
Knowledge Group
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
bagotjesusa
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
ijcsit
 

Similar to ICT and Disaster Risk Reduction (20)

Crisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareCrisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced Software
 
Insteddma08 1224025844002745-9
Insteddma08 1224025844002745-9Insteddma08 1224025844002745-9
Insteddma08 1224025844002745-9
 
Journal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docxJournal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docx
 
Cloud computing opportunity and challenge for european foundations and gran...
Cloud computing   opportunity and challenge for european foundations and gran...Cloud computing   opportunity and challenge for european foundations and gran...
Cloud computing opportunity and challenge for european foundations and gran...
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Disaster Management Systems: Building Capacity for Developing Countries and ...
Disaster Management Systems: Building Capacity  for Developing Countries and ...Disaster Management Systems: Building Capacity  for Developing Countries and ...
Disaster Management Systems: Building Capacity for Developing Countries and ...
 
Emergency Response & Crisis Management for Resilience
Emergency Response & Crisis Management for ResilienceEmergency Response & Crisis Management for Resilience
Emergency Response & Crisis Management for Resilience
 
Olaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative SecurityOlaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative Security
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For Action
 
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources Report
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
University-of-Miami_MEDINA
University-of-Miami_MEDINAUniversity-of-Miami_MEDINA
University-of-Miami_MEDINA
 
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
 Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats" Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 

More from Gisli Olafsson

Blockchain for NGOs
Blockchain for NGOsBlockchain for NGOs
Blockchain for NGOs
Gisli Olafsson
 
Disrupting Humanitarian Response
Disrupting Humanitarian ResponseDisrupting Humanitarian Response
Disrupting Humanitarian Response
Gisli Olafsson
 
Haiyan Response - ISCRAM Panel Presentation
Haiyan Response - ISCRAM Panel PresentationHaiyan Response - ISCRAM Panel Presentation
Haiyan Response - ISCRAM Panel Presentation
Gisli Olafsson
 
How Technology is Changing Disaster Management
How Technology is Changing Disaster ManagementHow Technology is Changing Disaster Management
How Technology is Changing Disaster Management
Gisli Olafsson
 
Lean Response
Lean ResponseLean Response
Lean Response
Gisli Olafsson
 
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle
Gisli Olafsson
 
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour version
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour versionThe Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour version
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour version
Gisli Olafsson
 
Humanitarian Innovation
Humanitarian InnovationHumanitarian Innovation
Humanitarian Innovation
Gisli Olafsson
 
Open Humanitarian Initiative - Presentation to IASC - May 2013
Open Humanitarian Initiative - Presentation to IASC - May 2013Open Humanitarian Initiative - Presentation to IASC - May 2013
Open Humanitarian Initiative - Presentation to IASC - May 2013
Gisli Olafsson
 
Open Humanitarian Initiative - 2013 Plan
Open Humanitarian Initiative - 2013 PlanOpen Humanitarian Initiative - 2013 Plan
Open Humanitarian Initiative - 2013 Plan
Gisli Olafsson
 
Open Humanitarian Initiative - August 2012 update
Open Humanitarian Initiative - August 2012 updateOpen Humanitarian Initiative - August 2012 update
Open Humanitarian Initiative - August 2012 update
Gisli Olafsson
 
Open Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference PresentationOpen Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference Presentation
Gisli Olafsson
 
Use of Digital Volunteer Groups
Use of Digital Volunteer GroupsUse of Digital Volunteer Groups
Use of Digital Volunteer Groups
Gisli Olafsson
 
Humanitarian Response in Times of Mass Collaboration and Networked Intelligence
Humanitarian Response in Times of Mass Collaboration and Networked IntelligenceHumanitarian Response in Times of Mass Collaboration and Networked Intelligence
Humanitarian Response in Times of Mass Collaboration and Networked Intelligence
Gisli Olafsson
 
Use of Social Media in Disasters
Use of Social Media in DisastersUse of Social Media in Disasters
Use of Social Media in Disasters
Gisli Olafsson
 
The importance of adding value
The importance of adding valueThe importance of adding value
The importance of adding value
Gisli Olafsson
 
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...
Gisli Olafsson
 
HumanityRoad training - Basic Crisis Information Management
HumanityRoad training - Basic Crisis Information ManagementHumanityRoad training - Basic Crisis Information Management
HumanityRoad training - Basic Crisis Information Management
Gisli Olafsson
 
Information Management Course - Reporting
Information Management Course - ReportingInformation Management Course - Reporting
Information Management Course - Reporting
Gisli Olafsson
 
Information Management Course - Dissemination and Displays
Information Management Course - Dissemination and DisplaysInformation Management Course - Dissemination and Displays
Information Management Course - Dissemination and Displays
Gisli Olafsson
 

More from Gisli Olafsson (20)

Blockchain for NGOs
Blockchain for NGOsBlockchain for NGOs
Blockchain for NGOs
 
Disrupting Humanitarian Response
Disrupting Humanitarian ResponseDisrupting Humanitarian Response
Disrupting Humanitarian Response
 
Haiyan Response - ISCRAM Panel Presentation
Haiyan Response - ISCRAM Panel PresentationHaiyan Response - ISCRAM Panel Presentation
Haiyan Response - ISCRAM Panel Presentation
 
How Technology is Changing Disaster Management
How Technology is Changing Disaster ManagementHow Technology is Changing Disaster Management
How Technology is Changing Disaster Management
 
Lean Response
Lean ResponseLean Response
Lean Response
 
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle
 
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour version
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour versionThe Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour version
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour version
 
Humanitarian Innovation
Humanitarian InnovationHumanitarian Innovation
Humanitarian Innovation
 
Open Humanitarian Initiative - Presentation to IASC - May 2013
Open Humanitarian Initiative - Presentation to IASC - May 2013Open Humanitarian Initiative - Presentation to IASC - May 2013
Open Humanitarian Initiative - Presentation to IASC - May 2013
 
Open Humanitarian Initiative - 2013 Plan
Open Humanitarian Initiative - 2013 PlanOpen Humanitarian Initiative - 2013 Plan
Open Humanitarian Initiative - 2013 Plan
 
Open Humanitarian Initiative - August 2012 update
Open Humanitarian Initiative - August 2012 updateOpen Humanitarian Initiative - August 2012 update
Open Humanitarian Initiative - August 2012 update
 
Open Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference PresentationOpen Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference Presentation
 
Use of Digital Volunteer Groups
Use of Digital Volunteer GroupsUse of Digital Volunteer Groups
Use of Digital Volunteer Groups
 
Humanitarian Response in Times of Mass Collaboration and Networked Intelligence
Humanitarian Response in Times of Mass Collaboration and Networked IntelligenceHumanitarian Response in Times of Mass Collaboration and Networked Intelligence
Humanitarian Response in Times of Mass Collaboration and Networked Intelligence
 
Use of Social Media in Disasters
Use of Social Media in DisastersUse of Social Media in Disasters
Use of Social Media in Disasters
 
The importance of adding value
The importance of adding valueThe importance of adding value
The importance of adding value
 
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...
 
HumanityRoad training - Basic Crisis Information Management
HumanityRoad training - Basic Crisis Information ManagementHumanityRoad training - Basic Crisis Information Management
HumanityRoad training - Basic Crisis Information Management
 
Information Management Course - Reporting
Information Management Course - ReportingInformation Management Course - Reporting
Information Management Course - Reporting
 
Information Management Course - Dissemination and Displays
Information Management Course - Dissemination and DisplaysInformation Management Course - Dissemination and Displays
Information Management Course - Dissemination and Displays
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

ICT and Disaster Risk Reduction

  • 1. Microsoft’s Role in International Disaster Risk Reduction Gisli Olafsson Disaster Management – Technical Advisor Microsoft Corporation
  • 2.
  • 4.  
  • 5.
  • 6.
  • 7.
  • 8. Disaster Management Infrastructure Optimization Standardized Rationalized Dynamic Basic Managed ICT infrastructure with limited automation Managed and consolidated ICT infrastructure with maximum automation Fully automated management, dynamic resource usage, business linked SLAs Uncoordinated, manual infrastructure Manage Complexity and Achieve Agility Cost Center More Efficient Cost Center Business Enabler Strategic Asset Dynamic ICT
  • 9.
  • 10.
  • 11.
  • 12.  

Editor's Notes

  1. 08/19/09 10:36 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.
  2. 08/19/09 10:36 © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.