SlideShare a Scribd company logo
Facilitating Incident Management Response

     Public Safety in a Multimedia Era

            Information Draft




                 Jack Brown
                 Jan 11, 2008
Situational Awareness
When the first aircraft struck the World Trade Center, what were your thoughts? Did you
think about terrorists? Or, was your first thought something more like “How could that
happen?” The first crash left most people trying to figure out what human or mechanical
error could have caused the crash. However, a little over 15 minutes later – and the instant
Flight 175 came into view – we knew we were under attack. As the jet slammed into the
South Tower of the World Trade Center, our view changed and the response of police and
fire personnel to the WTC and the other incidents changed.

Our reaction changed because the additional information of the second aircraft altered our
perception of the first crash. Our perceptions moved closer to reality because more data
gave meaning to and enhanced our comprehension of what we were observing.

Situational awareness
“Situational awareness” was a term originally used to describe the tactical situation during
aerial combat . While the literal term doesn’t go back as far as World War I, the idea
surfaced then, when pilots first took to the sky in combat. At first, the term referred to the
pilot’s ability to know where he was in relation to the enemy and the other pilots of his flight.
In reality, that is only positional awareness. However, when pilots added their knowledge of
aircraft capabilities and known battle tactics with positional awareness, they were able to
interpret, comprehend and anticipate. The comprehension of observations is the essence of
situational awareness.
Public Safety in a Multimedia Era
Public safety agencies have made significant investments in CAD system, records-
management systems, GIS, crisis information management, and facility preplan
drawing and management systems. These are stand-alone systems and are
incapable of easily sharing data with other programs. Their proliferation has created
a series of data silos requiring service command or other response personnel to
perform “swivel chair” integration, rolling back and forth between the user interfaces
of several different systems or books to build a composite picture of the situation in
their minds.

The emergence of Internet standards for Web services and data integration now
makes it possible to weave these systems together by providing the connections and
data translations necessary to make each system's data understandable to the
others. This establishes a true information-sharing environment in which various
data sources can be brought together and woven into valuable information relevant
to the incident being responded to. New capabilities such as video surveillance, fixed
or mobile sensors, and plume modeling can be integrated easily in the future.
Another benefit is that public safety personnel can focus on being decision-makers
and not data-entry clerks.
Public Safety in a Multimedia Era


Public safety agencies work in a dynamic, complex and high-risk environment that
demands current and relevant situational awareness. Time is of the essence when
faced with saving lives, property and the environment. There is no time to copy
and send files, pictures, or diagrams. The best case is to have all relevant
information updated in real time to keep pace with the unfolding incident or
situation. Responders, incident commanders and emergency managers need to
be able to view the situation and collaborate in real time to communicate what is
happening at present.

With the systems tied together and the information flowing in real time, what is
needed next is to fuse the information together and present it in a visualization
environment that can be quickly understood and manipulated.
Public Safety in a Multimedia Era



Public safety and emergency management entities already operate in a
geospatial environment: How do I get there? Where is the incident? Where is
the fire? Where is the bad guy going? What and where are the exposures to this
fire? Where is my water supply? Where are my resources? How does our
coverage look for any other emergencies? Incident response organizations are
used to dealing with maps and locations, and thus a geospatial picture makes a
lot of sense as the primary visualization mechanism for incident data.

With a map-based operating picture that is updated in real time, the information
presented on that map can be adapted as appropriate to the roles and
responsibilities of the individual responders. This will facilitate rapid
comprehension and more effective decision-making for all disciplines that might
be required.
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Communication Network Trends …..Extending the IP
                Network Edge

• Network-based applications are increasingly important to transit operations
   More profitable, faster, safer operations is the goal

• Advances in Wireless technologies
  Increased reliability, lower prices, better coverage 802.11a/b/g/n, UMTS,
  GPRS, CDMA, WiMAX, Satellite

• Increased demand for Mobile Networking
  Real time access to information, increased productivity and lower costs,
  increased safety
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Appendix
Cisco Design Overview
Cisco IPICS
The Cisco IPICS portfolio of products and applications provides Communications
interoperability between push-to-talk (PTT) radio systems and devices such as
mobile phones, IP phones, public switched telephone network (PSTN) phones,
and PC clients. Based on IP standards, Cisco IPICS takes advantage of IP
networks to extend the reach of traditional communications networks and also to
provide notification using email, pager notification, and Short Message Service
(SMS).

Using Cisco IPICS, public sector agencies and enterprises can intelligently apply
resources to streamline operations and rapidly respond to routine events as well
as emergencies.

Cisco IPICS can be deployed in mobile command vehicles and included in tactical
communications kits, connecting to IP or non-IP wired, wireless, or satellite
networks.
Cisco IPICS
Cisco IPICS
Cisco IPICS
Solutions components include the following:
Cisco IPICS Server: The core foundation for the Cisco IPICS solution, the
Cisco IPICS Server is a security-enhanced, Linux-based platform that provides
an administration console and resource management and hosts the optional
Cisco IPICS Policy Engine and Operational Views applications.

Cisco IPICS IP Phone Client: The Cisco IPICS IP Phone Client enables
personnel to use their Cisco Unified IP phones to collaborate with other
personnel on PTT channels.

Cisco IPICS PMC: The Cisco IPICS PMC is a Windows-based PC client
software package that enables personnel to use their PCs to collaborate with
other personnel on PTT channels.

Cisco IPICS Operational Views: Cisco IPICS Operational Views allows different
organizations to manage and share resources across ownership and
organizational boundaries.
Cisco IPICS
Cisco IPICS Policy Engine: The Cisco IPICS Policy Engine enables one-click
activation of predefined policies for notification and talk-group establishment, and
includes the ability to dial in and dial out to the PSTN.

Intelligent Networking
Cisco IPICS takes advantage of the Cisco Service-Oriented Network Architecture
(SONA), an architectural framework that enables organizations to maximize the
value of their network services and resources. The Cisco SONA framework makes
it possible to centrally manage all radio systems, other voice systems, and data
over a common, unified platform, increasing efficiency and the value of the
agency’s network assets while lowering capital and management costs.
Cisco Unified Contact Center


Cisco Unified Contact Center Enterprise uses an IP infrastructure to deliver skills-
based contact routing, voice self-service, computer telephony integration (CTI),
and multichannel contact management. By combining multichannel automatic-call-
distributor (ACD) functions with IP telephony in a unified solution, Cisco Unified
Contact Center helps deploy a distributed voice-over-IP (VoIP) contact center
infrastructure.

The Unified Contact Center segments customers, monitors resource availability,
and delivers each contact to the appropriate resource anywhere in the enterprise.
The software profiles each customer contact using related data such as dialed
number and calling line ID, caller entered digits, data submitted on a Web form,
and information obtained from a customer database lookup. Simultaneously, the
system monitors the resources available in the contact center including agent
skills and availability, interactive-voice-response (IVR) status, and queue lengths.
Cisco Unified Communications Manager



Unified Communications Solutions unify voice, video, data, and mobile applications on
fixed and mobile networks, delivering a media-rich collaboration experience across
business, government agency, and institutional workspaces. These applications use
the network as the platform to enhance comparative advantage by accelerating
decision time and reducing transaction time. The security, resilience, and scalability of
the network enable users in any workspace to connect anywhere, anytime, and
anyplace, using any media, device, or operating system.

A Unified Communications is part of a solution that includes network infrastructure,
security, wireless, management applications, lifecycle services, flexible deployment and
outsourced management options, and third-party applications.

The Cisco Unified Communications Manager (formerly known as Cisco Unified
CallManager) is the call-processing component of the Cisco Unified Communications
system.
Cisco Unified Communications Manager
Cisco Unified Communications Manager


IP voice call setup is initiated between the IP phone, IP videophone or gateway, and Cisco
Unified CallManager. Cisco Unified CallManager classifies a call based on parameters
such as application (voice or video) and Multilevel Precedence and Preemption (MLPP),
and signals to the Cisco RSVP Agent in the access router. Bandwidth pools are
preconfigured in the router on a per-application and per-interface basis. Using the
classification provided by Cisco Unified CallManager, the Cisco RSVP Agent attempts to
set up a call within the appropriate bandwidth pool and across the WAN to a far-end Cisco
RSVP Agent for the receiving party.

If RSVP bandwidth is secured, the Cisco RSVP Agent signals back to Cisco Unified
CallManager. Cisco Unified CallManager in turn signals to the IP phone, IP videophone, or
gateway and the call proceeds. The Cisco RSVP Agent can apply differentiated services
code point (DSCP) marking to media packets based on instruction from the Cisco Unified
CallManager. DSCP packet marking may be applied to place the RSVP secured media
stream into the router priority queue. If RSVP bandwidth cannot be secured, the Cisco
RSVP Agent signals back to Cisco Unified CallManager, which administers policies. The
call is either disallowed or allowed to proceed with a lower-priority DSCP packet marking
applied by the Cisco RSVP Agent as instructed by the Cisco Unified CallManager.
Cisco Unified Communications Manager


Mid-call policies may also be applied for handling of changes to the media stream such as
transfers during a call. Network design using the Cisco RSVP Agent allows voice and video
calls to proceed as part of a single unified network together with data. This setup allows for
support of meshed designs, multitiered designs, adjustment to dynamic link changes, and
redundant links. This single design helps reduce the costs for both infrastructure and
management. Because CAC is managed and secured and QoS is applied as a network
component, there is no reliance on end-user devices.

Cisco RSVP Agent functions independently of the call-signaling protocol, and hence, Session
Initiation Protocol (SIP), Skinny Client Control Protocol (SCCP), H.323, and Media Gateway
Control Protocol (MGCP) are all supported. Figure 2 shows how the Cisco Unified CallManager
and Cisco RSVP Agent in the router work together to optimize the voice quality across the IP
network.

More Related Content

What's hot

MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
Cisco Service Provider Mobility
 
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & ChallengesPervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & Challenges
iosrjce
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
logus2k
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
IJIR JOURNALS IJIRUSA
 
Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
Brandix India Apparel City Pvt Ltd.
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
BHAVANA KONERU
 
The global cyber security market
The global cyber security marketThe global cyber security market
The global cyber security market
Telefónica's digital services
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
Global Business Events
 
Dr Assem Abdel Hamied Moussa Statment
Dr Assem Abdel Hamied Moussa StatmentDr Assem Abdel Hamied Moussa Statment
Dr Assem Abdel Hamied Moussa Statment
Assem mousa
 
Truzzt box 3.2-en
Truzzt box 3.2-enTruzzt box 3.2-en
Truzzt box 3.2-en
h-bauer2014
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
cloud of things paper
cloud of things papercloud of things paper
cloud of things paper
Assem mousa
 
Mobile enterprise content management
Mobile enterprise content managementMobile enterprise content management
Mobile enterprise content management
Amplexor
 
Cloud computing Paper
Cloud computing Paper Cloud computing Paper
Cloud computing Paper
Assem mousa
 
Complexity in Future Networks (A. Manzalini)
Complexity in Future Networks (A. Manzalini)Complexity in Future Networks (A. Manzalini)
Complexity in Future Networks (A. Manzalini)
Antonio Manzalini
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs
Mestizo Enterprises
 

What's hot (19)

MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
 
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & ChallengesPervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & Challenges
 
Ssmac15
Ssmac15Ssmac15
Ssmac15
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
The global cyber security market
The global cyber security marketThe global cyber security market
The global cyber security market
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Dr Assem Abdel Hamied Moussa Statment
Dr Assem Abdel Hamied Moussa StatmentDr Assem Abdel Hamied Moussa Statment
Dr Assem Abdel Hamied Moussa Statment
 
Truzzt box 3.2-en
Truzzt box 3.2-enTruzzt box 3.2-en
Truzzt box 3.2-en
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
cloud of things paper
cloud of things papercloud of things paper
cloud of things paper
 
Mobile enterprise content management
Mobile enterprise content managementMobile enterprise content management
Mobile enterprise content management
 
Cloud computing Paper
Cloud computing Paper Cloud computing Paper
Cloud computing Paper
 
Complexity in Future Networks (A. Manzalini)
Complexity in Future Networks (A. Manzalini)Complexity in Future Networks (A. Manzalini)
Complexity in Future Networks (A. Manzalini)
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs
 

Viewers also liked

Migration to Unified Communications from Legacy Phone Systems
Migration to Unified Communications  from Legacy Phone SystemsMigration to Unified Communications  from Legacy Phone Systems
Migration to Unified Communications from Legacy Phone SystemsJack Brown
 
Moible Coupon Applications Sept 2009
Moible Coupon Applications Sept 2009Moible Coupon Applications Sept 2009
Moible Coupon Applications Sept 2009Jack Brown
 
Jack Brown Mobile Coupon Architecture Ver 1
Jack Brown Mobile Coupon Architecture Ver 1Jack Brown Mobile Coupon Architecture Ver 1
Jack Brown Mobile Coupon Architecture Ver 1
Jack Brown
 
Открытые форматы и открытое ПО: достоинства и проблемы
Открытые форматы и открытое ПО: достоинства и проблемыОткрытые форматы и открытое ПО: достоинства и проблемы
Открытые форматы и открытое ПО: достоинства и проблемы
Natasha Khramtsovsky
 
PROEXPOSURE photos: marathon
PROEXPOSURE photos: marathonPROEXPOSURE photos: marathon
PROEXPOSURE photos: marathonPROEXPOSURE CIC
 
Introductie internationale samenwerking
Introductie internationale samenwerkingIntroductie internationale samenwerking
Introductie internationale samenwerking
Socius - steunpunt sociaal-cultureel werk
 
Laat mensen schitteren-Campagnerichtlijnen
Laat mensen schitteren-CampagnerichtlijnenLaat mensen schitteren-Campagnerichtlijnen
Laat mensen schitteren-Campagnerichtlijnen
Socius - steunpunt sociaal-cultureel werk
 
二里頭
二里頭二里頭
二里頭
morissky
 
InterPARES 2: Система принципов для разработки политик, стратегий и стандарто...
InterPARES 2: Система принципов для разработки политик, стратегий и стандарто...InterPARES 2: Система принципов для разработки политик, стратегий и стандарто...
InterPARES 2: Система принципов для разработки политик, стратегий и стандарто...
Natasha Khramtsovsky
 
Zoomable Menu Mockup
Zoomable Menu MockupZoomable Menu Mockup
Zoomable Menu Mockup
None None
 
Growfunding als hefboom voor sociaal-culturele praktijken in de stad - Freder...
Growfunding als hefboom voor sociaal-culturele praktijken in de stad - Freder...Growfunding als hefboom voor sociaal-culturele praktijken in de stad - Freder...
Growfunding als hefboom voor sociaal-culturele praktijken in de stad - Freder...
Socius - steunpunt sociaal-cultureel werk
 
Стандартизация в сфере управления документами и информацией: что нового в Ро...
Стандартизация в сфере управления документами и информацией:  что нового в Ро...Стандартизация в сфере управления документами и информацией:  что нового в Ро...
Стандартизация в сфере управления документами и информацией: что нового в Ро...
Natasha Khramtsovsky
 
Geocomposer manual
Geocomposer manualGeocomposer manual
Hamilton All About Me
Hamilton All About MeHamilton All About Me
Hamilton All About Mejaspang
 
PROEXPOSURE Photographer Ataklti Mulu and Adigrat
PROEXPOSURE Photographer Ataklti Mulu and AdigratPROEXPOSURE Photographer Ataklti Mulu and Adigrat
PROEXPOSURE Photographer Ataklti Mulu and AdigratPROEXPOSURE CIC
 
Personalia meijs en vermeulen
Personalia meijs en vermeulenPersonalia meijs en vermeulen
Personalia meijs en vermeulen
Socius - steunpunt sociaal-cultureel werk
 
Внедрение ЭЦП в организации: с чего начинать?
Внедрение ЭЦП в организации:  с чего начинать?Внедрение ЭЦП в организации:  с чего начинать?
Внедрение ЭЦП в организации: с чего начинать?
Natasha Khramtsovsky
 
Workshop sociusonderzoek
Workshop sociusonderzoekWorkshop sociusonderzoek

Viewers also liked (20)

Migration to Unified Communications from Legacy Phone Systems
Migration to Unified Communications  from Legacy Phone SystemsMigration to Unified Communications  from Legacy Phone Systems
Migration to Unified Communications from Legacy Phone Systems
 
Moible Coupon Applications Sept 2009
Moible Coupon Applications Sept 2009Moible Coupon Applications Sept 2009
Moible Coupon Applications Sept 2009
 
Jack Brown Mobile Coupon Architecture Ver 1
Jack Brown Mobile Coupon Architecture Ver 1Jack Brown Mobile Coupon Architecture Ver 1
Jack Brown Mobile Coupon Architecture Ver 1
 
Открытые форматы и открытое ПО: достоинства и проблемы
Открытые форматы и открытое ПО: достоинства и проблемыОткрытые форматы и открытое ПО: достоинства и проблемы
Открытые форматы и открытое ПО: достоинства и проблемы
 
PROEXPOSURE photos: marathon
PROEXPOSURE photos: marathonPROEXPOSURE photos: marathon
PROEXPOSURE photos: marathon
 
Introductie internationale samenwerking
Introductie internationale samenwerkingIntroductie internationale samenwerking
Introductie internationale samenwerking
 
Laat mensen schitteren-Campagnerichtlijnen
Laat mensen schitteren-CampagnerichtlijnenLaat mensen schitteren-Campagnerichtlijnen
Laat mensen schitteren-Campagnerichtlijnen
 
二里頭
二里頭二里頭
二里頭
 
InterPARES 2: Система принципов для разработки политик, стратегий и стандарто...
InterPARES 2: Система принципов для разработки политик, стратегий и стандарто...InterPARES 2: Система принципов для разработки политик, стратегий и стандарто...
InterPARES 2: Система принципов для разработки политик, стратегий и стандарто...
 
Zoomable Menu Mockup
Zoomable Menu MockupZoomable Menu Mockup
Zoomable Menu Mockup
 
Growfunding als hefboom voor sociaal-culturele praktijken in de stad - Freder...
Growfunding als hefboom voor sociaal-culturele praktijken in de stad - Freder...Growfunding als hefboom voor sociaal-culturele praktijken in de stad - Freder...
Growfunding als hefboom voor sociaal-culturele praktijken in de stad - Freder...
 
Стандартизация в сфере управления документами и информацией: что нового в Ро...
Стандартизация в сфере управления документами и информацией:  что нового в Ро...Стандартизация в сфере управления документами и информацией:  что нового в Ро...
Стандартизация в сфере управления документами и информацией: что нового в Ро...
 
Geocomposer manual
Geocomposer manualGeocomposer manual
Geocomposer manual
 
Jack Johnson - The Boxer
Jack Johnson - The BoxerJack Johnson - The Boxer
Jack Johnson - The Boxer
 
Hamilton All About Me
Hamilton All About MeHamilton All About Me
Hamilton All About Me
 
PROEXPOSURE Photographer Ataklti Mulu and Adigrat
PROEXPOSURE Photographer Ataklti Mulu and AdigratPROEXPOSURE Photographer Ataklti Mulu and Adigrat
PROEXPOSURE Photographer Ataklti Mulu and Adigrat
 
Personalia meijs en vermeulen
Personalia meijs en vermeulenPersonalia meijs en vermeulen
Personalia meijs en vermeulen
 
Vlamigrant In 9 Verhalen (Ingekort)
Vlamigrant In 9 Verhalen (Ingekort)Vlamigrant In 9 Verhalen (Ingekort)
Vlamigrant In 9 Verhalen (Ingekort)
 
Внедрение ЭЦП в организации: с чего начинать?
Внедрение ЭЦП в организации:  с чего начинать?Внедрение ЭЦП в организации:  с чего начинать?
Внедрение ЭЦП в организации: с чего начинать?
 
Workshop sociusonderzoek
Workshop sociusonderzoekWorkshop sociusonderzoek
Workshop sociusonderzoek
 

Similar to Public safety in a multi media era facilitating incident management response

Citrix security booklet
Citrix security bookletCitrix security booklet
Citrix security booklet
Benjamin Jolivet
 
7x24 Exchange Article (Spring 2015) 042715
7x24 Exchange Article (Spring 2015) 0427157x24 Exchange Article (Spring 2015) 042715
7x24 Exchange Article (Spring 2015) 042715Destiny Heimbecker
 
NEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal AgenciesNEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal Agencies
InteractiveNEC
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
Asst.prof M.Gokilavani
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
Asst.prof M.Gokilavani
 
Internet of Things for Next-Generation Public Safety Mobile Communications
Internet of Things for Next-Generation Public Safety Mobile CommunicationsInternet of Things for Next-Generation Public Safety Mobile Communications
Internet of Things for Next-Generation Public Safety Mobile Communications
Reza Nourjou, Ph.D.
 
Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...
ieeepondy
 
Interop Concepts Dhs Preso Contestabile 09 27 11
Interop Concepts Dhs Preso Contestabile 09 27 11Interop Concepts Dhs Preso Contestabile 09 27 11
Interop Concepts Dhs Preso Contestabile 09 27 11
jcontestabile
 
Connect And Protect
Connect And ProtectConnect And Protect
Connect And Protect
Future Position X
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
IJERA Editor
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
TopCyberNewsMAGAZINE
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Davide Cioccia
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Kresimir Popovic
 
Empires Idhs Red Cell White Paper
Empires Idhs Red Cell White PaperEmpires Idhs Red Cell White Paper
Empires Idhs Red Cell White Papermartindudziak
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
Gerardo Pardo-Castellote
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
Gerardo Pardo-Castellote
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
The Security of Things Forum
 
NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)
InteractiveNEC
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
Cisco Service Provider Mobility
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
global
 

Similar to Public safety in a multi media era facilitating incident management response (20)

Citrix security booklet
Citrix security bookletCitrix security booklet
Citrix security booklet
 
7x24 Exchange Article (Spring 2015) 042715
7x24 Exchange Article (Spring 2015) 0427157x24 Exchange Article (Spring 2015) 042715
7x24 Exchange Article (Spring 2015) 042715
 
NEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal AgenciesNEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal Agencies
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
Internet of Things for Next-Generation Public Safety Mobile Communications
Internet of Things for Next-Generation Public Safety Mobile CommunicationsInternet of Things for Next-Generation Public Safety Mobile Communications
Internet of Things for Next-Generation Public Safety Mobile Communications
 
Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...
 
Interop Concepts Dhs Preso Contestabile 09 27 11
Interop Concepts Dhs Preso Contestabile 09 27 11Interop Concepts Dhs Preso Contestabile 09 27 11
Interop Concepts Dhs Preso Contestabile 09 27 11
 
Connect And Protect
Connect And ProtectConnect And Protect
Connect And Protect
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Empires Idhs Red Cell White Paper
Empires Idhs Red Cell White PaperEmpires Idhs Red Cell White Paper
Empires Idhs Red Cell White Paper
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
 

More from Jack Brown

Medical Body Area Networks - MBAN
Medical Body Area Networks - MBANMedical Body Area Networks - MBAN
Medical Body Area Networks - MBANJack Brown
 
Machine 2 Machine - Internet of Things - Real World Internet
Machine 2 Machine  - Internet of Things  -  Real World InternetMachine 2 Machine  - Internet of Things  -  Real World Internet
Machine 2 Machine - Internet of Things - Real World Internet
Jack Brown
 
Roaming Analytics Platform V1.1
Roaming Analytics Platform V1.1Roaming Analytics Platform V1.1
Roaming Analytics Platform V1.1
Jack Brown
 
Etv
EtvEtv
Fmc Ver 1.3 June 27 2007
Fmc Ver 1.3 June 27 2007Fmc Ver 1.3 June 27 2007
Fmc Ver 1.3 June 27 2007
Jack Brown
 
Location Application Protocol Trap Jack Brown
Location Application Protocol Trap Jack BrownLocation Application Protocol Trap Jack Brown
Location Application Protocol Trap Jack Brown
Jack Brown
 

More from Jack Brown (6)

Medical Body Area Networks - MBAN
Medical Body Area Networks - MBANMedical Body Area Networks - MBAN
Medical Body Area Networks - MBAN
 
Machine 2 Machine - Internet of Things - Real World Internet
Machine 2 Machine  - Internet of Things  -  Real World InternetMachine 2 Machine  - Internet of Things  -  Real World Internet
Machine 2 Machine - Internet of Things - Real World Internet
 
Roaming Analytics Platform V1.1
Roaming Analytics Platform V1.1Roaming Analytics Platform V1.1
Roaming Analytics Platform V1.1
 
Etv
EtvEtv
Etv
 
Fmc Ver 1.3 June 27 2007
Fmc Ver 1.3 June 27 2007Fmc Ver 1.3 June 27 2007
Fmc Ver 1.3 June 27 2007
 
Location Application Protocol Trap Jack Brown
Location Application Protocol Trap Jack BrownLocation Application Protocol Trap Jack Brown
Location Application Protocol Trap Jack Brown
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 

Public safety in a multi media era facilitating incident management response

  • 1. Facilitating Incident Management Response Public Safety in a Multimedia Era Information Draft Jack Brown Jan 11, 2008
  • 2. Situational Awareness When the first aircraft struck the World Trade Center, what were your thoughts? Did you think about terrorists? Or, was your first thought something more like “How could that happen?” The first crash left most people trying to figure out what human or mechanical error could have caused the crash. However, a little over 15 minutes later – and the instant Flight 175 came into view – we knew we were under attack. As the jet slammed into the South Tower of the World Trade Center, our view changed and the response of police and fire personnel to the WTC and the other incidents changed. Our reaction changed because the additional information of the second aircraft altered our perception of the first crash. Our perceptions moved closer to reality because more data gave meaning to and enhanced our comprehension of what we were observing. Situational awareness “Situational awareness” was a term originally used to describe the tactical situation during aerial combat . While the literal term doesn’t go back as far as World War I, the idea surfaced then, when pilots first took to the sky in combat. At first, the term referred to the pilot’s ability to know where he was in relation to the enemy and the other pilots of his flight. In reality, that is only positional awareness. However, when pilots added their knowledge of aircraft capabilities and known battle tactics with positional awareness, they were able to interpret, comprehend and anticipate. The comprehension of observations is the essence of situational awareness.
  • 3. Public Safety in a Multimedia Era Public safety agencies have made significant investments in CAD system, records- management systems, GIS, crisis information management, and facility preplan drawing and management systems. These are stand-alone systems and are incapable of easily sharing data with other programs. Their proliferation has created a series of data silos requiring service command or other response personnel to perform “swivel chair” integration, rolling back and forth between the user interfaces of several different systems or books to build a composite picture of the situation in their minds. The emergence of Internet standards for Web services and data integration now makes it possible to weave these systems together by providing the connections and data translations necessary to make each system's data understandable to the others. This establishes a true information-sharing environment in which various data sources can be brought together and woven into valuable information relevant to the incident being responded to. New capabilities such as video surveillance, fixed or mobile sensors, and plume modeling can be integrated easily in the future. Another benefit is that public safety personnel can focus on being decision-makers and not data-entry clerks.
  • 4. Public Safety in a Multimedia Era Public safety agencies work in a dynamic, complex and high-risk environment that demands current and relevant situational awareness. Time is of the essence when faced with saving lives, property and the environment. There is no time to copy and send files, pictures, or diagrams. The best case is to have all relevant information updated in real time to keep pace with the unfolding incident or situation. Responders, incident commanders and emergency managers need to be able to view the situation and collaborate in real time to communicate what is happening at present. With the systems tied together and the information flowing in real time, what is needed next is to fuse the information together and present it in a visualization environment that can be quickly understood and manipulated.
  • 5. Public Safety in a Multimedia Era Public safety and emergency management entities already operate in a geospatial environment: How do I get there? Where is the incident? Where is the fire? Where is the bad guy going? What and where are the exposures to this fire? Where is my water supply? Where are my resources? How does our coverage look for any other emergencies? Incident response organizations are used to dealing with maps and locations, and thus a geospatial picture makes a lot of sense as the primary visualization mechanism for incident data. With a map-based operating picture that is updated in real time, the information presented on that map can be adapted as appropriate to the roles and responsibilities of the individual responders. This will facilitate rapid comprehension and more effective decision-making for all disciplines that might be required.
  • 6. Public Safety in a Multimedia Era
  • 7. Public Safety in a Multimedia Era
  • 8. Public Safety in a Multimedia Era
  • 9. Public Safety in a Multimedia Era
  • 10. Public Safety in a Multimedia Era
  • 11. Public Safety in a Multimedia Era
  • 12. Public Safety in a Multimedia Era
  • 13. Public Safety in a Multimedia Era
  • 14. Public Safety in a Multimedia Era
  • 15. Communication Network Trends …..Extending the IP Network Edge • Network-based applications are increasingly important to transit operations More profitable, faster, safer operations is the goal • Advances in Wireless technologies Increased reliability, lower prices, better coverage 802.11a/b/g/n, UMTS, GPRS, CDMA, WiMAX, Satellite • Increased demand for Mobile Networking Real time access to information, increased productivity and lower costs, increased safety
  • 16. Public Safety in a Multimedia Era
  • 17. Public Safety in a Multimedia Era
  • 18. Public Safety in a Multimedia Era
  • 19. Public Safety in a Multimedia Era
  • 20. Public Safety in a Multimedia Era
  • 21. Public Safety in a Multimedia Era
  • 22. Public Safety in a Multimedia Era
  • 23. Public Safety in a Multimedia Era
  • 24. Public Safety in a Multimedia Era
  • 25. Public Safety in a Multimedia Era
  • 26. Public Safety in a Multimedia Era
  • 27. Public Safety in a Multimedia Era
  • 28. Public Safety in a Multimedia Era
  • 29. Public Safety in a Multimedia Era
  • 30. Public Safety in a Multimedia Era
  • 31. Public Safety in a Multimedia Era
  • 33.
  • 34.
  • 35.
  • 37. Cisco IPICS The Cisco IPICS portfolio of products and applications provides Communications interoperability between push-to-talk (PTT) radio systems and devices such as mobile phones, IP phones, public switched telephone network (PSTN) phones, and PC clients. Based on IP standards, Cisco IPICS takes advantage of IP networks to extend the reach of traditional communications networks and also to provide notification using email, pager notification, and Short Message Service (SMS). Using Cisco IPICS, public sector agencies and enterprises can intelligently apply resources to streamline operations and rapidly respond to routine events as well as emergencies. Cisco IPICS can be deployed in mobile command vehicles and included in tactical communications kits, connecting to IP or non-IP wired, wireless, or satellite networks.
  • 40. Cisco IPICS Solutions components include the following: Cisco IPICS Server: The core foundation for the Cisco IPICS solution, the Cisco IPICS Server is a security-enhanced, Linux-based platform that provides an administration console and resource management and hosts the optional Cisco IPICS Policy Engine and Operational Views applications. Cisco IPICS IP Phone Client: The Cisco IPICS IP Phone Client enables personnel to use their Cisco Unified IP phones to collaborate with other personnel on PTT channels. Cisco IPICS PMC: The Cisco IPICS PMC is a Windows-based PC client software package that enables personnel to use their PCs to collaborate with other personnel on PTT channels. Cisco IPICS Operational Views: Cisco IPICS Operational Views allows different organizations to manage and share resources across ownership and organizational boundaries.
  • 41. Cisco IPICS Cisco IPICS Policy Engine: The Cisco IPICS Policy Engine enables one-click activation of predefined policies for notification and talk-group establishment, and includes the ability to dial in and dial out to the PSTN. Intelligent Networking Cisco IPICS takes advantage of the Cisco Service-Oriented Network Architecture (SONA), an architectural framework that enables organizations to maximize the value of their network services and resources. The Cisco SONA framework makes it possible to centrally manage all radio systems, other voice systems, and data over a common, unified platform, increasing efficiency and the value of the agency’s network assets while lowering capital and management costs.
  • 42. Cisco Unified Contact Center Cisco Unified Contact Center Enterprise uses an IP infrastructure to deliver skills- based contact routing, voice self-service, computer telephony integration (CTI), and multichannel contact management. By combining multichannel automatic-call- distributor (ACD) functions with IP telephony in a unified solution, Cisco Unified Contact Center helps deploy a distributed voice-over-IP (VoIP) contact center infrastructure. The Unified Contact Center segments customers, monitors resource availability, and delivers each contact to the appropriate resource anywhere in the enterprise. The software profiles each customer contact using related data such as dialed number and calling line ID, caller entered digits, data submitted on a Web form, and information obtained from a customer database lookup. Simultaneously, the system monitors the resources available in the contact center including agent skills and availability, interactive-voice-response (IVR) status, and queue lengths.
  • 43. Cisco Unified Communications Manager Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, delivering a media-rich collaboration experience across business, government agency, and institutional workspaces. These applications use the network as the platform to enhance comparative advantage by accelerating decision time and reducing transaction time. The security, resilience, and scalability of the network enable users in any workspace to connect anywhere, anytime, and anyplace, using any media, device, or operating system. A Unified Communications is part of a solution that includes network infrastructure, security, wireless, management applications, lifecycle services, flexible deployment and outsourced management options, and third-party applications. The Cisco Unified Communications Manager (formerly known as Cisco Unified CallManager) is the call-processing component of the Cisco Unified Communications system.
  • 45. Cisco Unified Communications Manager IP voice call setup is initiated between the IP phone, IP videophone or gateway, and Cisco Unified CallManager. Cisco Unified CallManager classifies a call based on parameters such as application (voice or video) and Multilevel Precedence and Preemption (MLPP), and signals to the Cisco RSVP Agent in the access router. Bandwidth pools are preconfigured in the router on a per-application and per-interface basis. Using the classification provided by Cisco Unified CallManager, the Cisco RSVP Agent attempts to set up a call within the appropriate bandwidth pool and across the WAN to a far-end Cisco RSVP Agent for the receiving party. If RSVP bandwidth is secured, the Cisco RSVP Agent signals back to Cisco Unified CallManager. Cisco Unified CallManager in turn signals to the IP phone, IP videophone, or gateway and the call proceeds. The Cisco RSVP Agent can apply differentiated services code point (DSCP) marking to media packets based on instruction from the Cisco Unified CallManager. DSCP packet marking may be applied to place the RSVP secured media stream into the router priority queue. If RSVP bandwidth cannot be secured, the Cisco RSVP Agent signals back to Cisco Unified CallManager, which administers policies. The call is either disallowed or allowed to proceed with a lower-priority DSCP packet marking applied by the Cisco RSVP Agent as instructed by the Cisco Unified CallManager.
  • 46. Cisco Unified Communications Manager Mid-call policies may also be applied for handling of changes to the media stream such as transfers during a call. Network design using the Cisco RSVP Agent allows voice and video calls to proceed as part of a single unified network together with data. This setup allows for support of meshed designs, multitiered designs, adjustment to dynamic link changes, and redundant links. This single design helps reduce the costs for both infrastructure and management. Because CAC is managed and secured and QoS is applied as a network component, there is no reliance on end-user devices. Cisco RSVP Agent functions independently of the call-signaling protocol, and hence, Session Initiation Protocol (SIP), Skinny Client Control Protocol (SCCP), H.323, and Media Gateway Control Protocol (MGCP) are all supported. Figure 2 shows how the Cisco Unified CallManager and Cisco RSVP Agent in the router work together to optimize the voice quality across the IP network.