A disaster relief team developed a mobile application to help first responders and victims during humanitarian crises by allowing them to locate each other in real-time and share updates on conditions in affected areas. They conducted surveys and over 45 hours of meetings to identify problems such as responders not knowing the locations of other responders or victims, or conditions in the area before arriving. The team's solution was to create a crowdsourced app allowing all levels of responders and victims to update locations and statuses.
The document is titled "gARGoyle H4D Final Project Video" and appears to be about a final project video for a class or program called "gARGoyle H4D". The video likely demonstrates the completion of a project involving augmented or virtual reality technology.
James Madison University Final PresentationH4Diadmin
James Madison University is a public research university located in Harrisonburg, Virginia. It has an enrollment of over 20,000 students and offers programs across liberal arts and professional fields at the undergraduate and graduate levels. This document appears to be for a final presentation being conducted at or about James Madison University.
The document describes a solution being developed by a team called 21st Century Frogman to address challenges in Navy SEAL training. It outlines problems such as training injuries leading to inefficiencies and attrition from the BUD/S program. The team's solution involves developing a predictive algorithm and dashboard to display safety risk, as well as an app to streamline real-time data entry for instructors during training evolutions. The document provides details on customer interviews conducted, challenges faced in database design and product development, and a proposed deployment roadmap for the solution.
The document summarizes a team's project for developing technologies to aid counterdrug operations in South America. Over 10 weeks, the team interviewed stakeholders, identified needs, and developed solutions. They initially focused on improving detection rates but learned monitoring was not the bottleneck. Their focus then shifted to enhancing efficiency of existing missions through predictive modeling and communication technologies. By week 10, they created a prototype combining satellite communication devices and a situational awareness app to increase coordination between US and foreign interdiction crews.
The document describes the development of a solution by the team Broadcom to provide internet access to denied areas like Syria and Iraq. It outlines their initial problem and proposed aerial-based solution, as well as their journey which included emotional highs and lows. They conducted interviews with domain experts, identified local citizens as beneficiaries, developed an MVP using commercial components that could be mounted on drones, and received positive feedback from military contacts.
The document outlines the development of an automated documentation tool (Week 1) and subsequent integration of that tool with a chatbot interface (Week 10). In Week 1, the problem of limited analyst knowledge retention due to lack of documentation is addressed by developing a software tool to automate documentation. In Week 10, the problem of useful tools not being integrated into analyst workflow is addressed by developing a chatbot interface to integrate various software tools and databases. The mission model canvas then provides details on partners, activities, value propositions, resources, and deployment for the Week 10 chatbot integration solution.
The team is working with USTRANSCOM to develop a framework to assess the cybersecurity of critical infrastructure at US strategic seaports, in order to improve resilience against cyber attacks. They conducted interviews with port authorities and cybersecurity experts, and visited the Port of Oakland to understand commercial needs. Their proposed solution is a partnership between USTRANSCOM and an Information Sharing and Analysis Organization to share cybersecurity data using a standardized framework.
The document summarizes the work of Team Surgency to develop solutions to improve combat casualty care. In the first 10 weeks, they focused on developing capability for robotic telesurgery to reduce time to treatment. In the next 10 weeks, they addressed bottlenecks in mass casualty triage and treatment at Battalion Aid Stations. Through stakeholder interviews and simulations, they identified that the problem was one of management, not patient care. Their Minimum Viable Product automates patient monitoring and prioritization to improve situational awareness and communication during mass casualty situations.
The document is titled "gARGoyle H4D Final Project Video" and appears to be about a final project video for a class or program called "gARGoyle H4D". The video likely demonstrates the completion of a project involving augmented or virtual reality technology.
James Madison University Final PresentationH4Diadmin
James Madison University is a public research university located in Harrisonburg, Virginia. It has an enrollment of over 20,000 students and offers programs across liberal arts and professional fields at the undergraduate and graduate levels. This document appears to be for a final presentation being conducted at or about James Madison University.
The document describes a solution being developed by a team called 21st Century Frogman to address challenges in Navy SEAL training. It outlines problems such as training injuries leading to inefficiencies and attrition from the BUD/S program. The team's solution involves developing a predictive algorithm and dashboard to display safety risk, as well as an app to streamline real-time data entry for instructors during training evolutions. The document provides details on customer interviews conducted, challenges faced in database design and product development, and a proposed deployment roadmap for the solution.
The document summarizes a team's project for developing technologies to aid counterdrug operations in South America. Over 10 weeks, the team interviewed stakeholders, identified needs, and developed solutions. They initially focused on improving detection rates but learned monitoring was not the bottleneck. Their focus then shifted to enhancing efficiency of existing missions through predictive modeling and communication technologies. By week 10, they created a prototype combining satellite communication devices and a situational awareness app to increase coordination between US and foreign interdiction crews.
The document describes the development of a solution by the team Broadcom to provide internet access to denied areas like Syria and Iraq. It outlines their initial problem and proposed aerial-based solution, as well as their journey which included emotional highs and lows. They conducted interviews with domain experts, identified local citizens as beneficiaries, developed an MVP using commercial components that could be mounted on drones, and received positive feedback from military contacts.
The document outlines the development of an automated documentation tool (Week 1) and subsequent integration of that tool with a chatbot interface (Week 10). In Week 1, the problem of limited analyst knowledge retention due to lack of documentation is addressed by developing a software tool to automate documentation. In Week 10, the problem of useful tools not being integrated into analyst workflow is addressed by developing a chatbot interface to integrate various software tools and databases. The mission model canvas then provides details on partners, activities, value propositions, resources, and deployment for the Week 10 chatbot integration solution.
The team is working with USTRANSCOM to develop a framework to assess the cybersecurity of critical infrastructure at US strategic seaports, in order to improve resilience against cyber attacks. They conducted interviews with port authorities and cybersecurity experts, and visited the Port of Oakland to understand commercial needs. Their proposed solution is a partnership between USTRANSCOM and an Information Sharing and Analysis Organization to share cybersecurity data using a standardized framework.
The document summarizes the work of Team Surgency to develop solutions to improve combat casualty care. In the first 10 weeks, they focused on developing capability for robotic telesurgery to reduce time to treatment. In the next 10 weeks, they addressed bottlenecks in mass casualty triage and treatment at Battalion Aid Stations. Through stakeholder interviews and simulations, they identified that the problem was one of management, not patient care. Their Minimum Viable Product automates patient monitoring and prioritization to improve situational awareness and communication during mass casualty situations.
The document describes the process an organization went through over 10 weeks to develop a solution for detecting improvised explosive devices (IEDs) using unmanned aerial vehicles (UAVs). They initially focused on developing new hardware but through stakeholder interviews pivoted to focus on developing image processing software that could augment human analysts' abilities to detect IEDs in drone footage. They validated this approach by successfully detecting simulated IEDs (potholes) in test images, positioning them to continue refining the algorithm and expanding its capabilities.
The DELPHI project aims to create an interactive workflow using a collaborative platform for subject matter experts and data scientists to predict improvised threats. This would help mitigate risks for warfighters. The DELPHI platform would allow for data-driven decisions on future threats and enable JIDO to appropriately allocate resources. The scope includes helping JIDO and other federal agencies, benefiting an estimated 112 people.
The document summarizes the findings of a project to develop a platform called Modern-Day Minutemen to connect US civilians with cybersecurity skills to the US military. It describes interviews conducted with potential users, experts, and buyers to understand opportunities and challenges. The initial hypotheses and mission model involved crowd-sourcing cyber missions to anonymous civilians. Through stakeholder discussions, the model pivoted to focus on cybersecurity reserves and university partnerships to provide legal and structured training opportunities. The document outlines various business model canvases explored, including establishing the platform as a non-profit, and lessons learned around the need for improved communication between the military and private sector on cybersecurity issues.
The document describes a team's project to enhance training for operators of the U.S. Special Operations Command's (USSOCOM) Light Tactical All-Terrain Vehicle (LTATV) through developing real-time audio-visual feedback systems. Over 15 weeks, the team conducted over 100 interviews and validated hypotheses with USSOCOM and operators. Their MVP is a training module for the MRZR vehicle that detects rollover danger and provides alerts. Testing showed it could fulfill a new USSOCOM requirement for rollover training. Mobility representatives supported deploying it to select units, and the team aims to further develop and test the system with USSOCOM and operators.
The team proposes to develop encryption solutions suitable for common microcontrollers used in IoT devices. Their goal is to create transparent encryption that is easy for makers to implement. Their initial idea is an open source encryption library, educating the public, and a website hosting the libraries. They discuss alternative ideas like encrypted chips or an encryption software optimized for medical devices. Their final MVP is a communication system design service to improve cybersecurity in medical devices, with the goal of transitioning to other applications.
This document summarizes the biographies of two Army Rangers, Master Sergeant Kevin Nelson and Sergeant First Class Chuck Evans. It notes that MSG Nelson has nearly 21 years experience in the 75th Ranger Regiment, including being severely wounded in Iraq in 2006. SFC Evans has served in various positions over a 17 year career since joining at age 17, and has worked closely with MSG Nelson on special projects for the past 1.5 years.
The document discusses how the military can visualize local sentiments and digital data. It describes aggregating raw digital data and showing relationships and frequencies to create a digital data layer. This layer can then be overlaid on a map to provide insight. The document presents a "status ring" concept that uses standardized military colors in a ring interface to display status alerts from different locations in a three-dimensional, interactive way. This helps transform aggregated two-dimensional data into a three-dimensional format.
SkySweep is a drone detection system that can detect, jam GPS signals, and capture drones. The system was created by a team of 5 students from various disciplines including computer science, engineering, nursing, and intelligence analysis.
The team aims to enhance force protection for U.S. Army commanders by analyzing social media data to identify probable hotspots of future unrest. They have fluency in critical languages and experience in data science, startups, and the tech industry. Their capabilities include indexing social media data and applying image, text, and sentiment analysis using machine learning. Their journey has included building recognition tools and prototyping a system called Spyglass to address the Army's need to analyze social media and predict threats in dense urban environments.
The document discusses using the Lean LaunchPad approach to solve national security problems. It outlines that problem definition is critical and technical solutions must be matched to real Department of Defense needs. Rapid prototyping teams combining industry, government mentors, and the Lean LaunchPad process can effectively solve emerging security issues. However, the large size of the Department of Defense can obscure overlapping efforts, and challenges remain in quickly deploying prototypes. The document emphasizes that hacking for defense through this approach is a team-based journey.
The document outlines the problem statement, team members, and mission model for the H4Drone team. The initial problem was to detect small unmanned aerial systems as threats, and the final problem aims to neutralize enemy drones used for surveillance and attacks. The team developed hypotheses for detection and neutralization, and created a mission model canvas to identify beneficiaries and key activities, resources, and partners to achieve the goal of countering drone threats.
Blue and Gray Berets H4D Final PresentationH4Diadmin
Here is a proposed framework for JIDO based on the key findings:
The JIDO Threat-Focused Framework
1. Define the Improvised Threat Domain
- Continuously monitor, analyze, and characterize evolving improvised threats
- Maintain expertise on adversary TTPs, capabilities, and intent
2. Anticipate Requirements
- Identify and assess potential capability gaps before they materialize
- Pursue emerging commercial and dual-use technologies proactively
3. Develop Rapid Solutions
- Leverage flexible authorities and funding to rapidly develop and deliver solutions
- Integrate operator and scientist perspectives for customized solutions
4. Implement and Support
- Support in-
The team developed a new method called a "Debris Responsibility Score" to evaluate and prevent space debris creation. They interviewed over 100 stakeholders, mapped the current collision avoidance process, and identified its weaknesses. The key insight was that collision warnings are imprecise, leaving satellite operators uncertain about maneuver risks. To address this, the team designed a scoring system to increase accountability, incentivize debris mitigation, and help establish international standards. Their proposal received positive feedback and has the potential to shape future policy and industry practices around space sustainability.
The document describes a software solution being developed to help the US State Department's Conflict and Stabilization Operations (CSO) acquire more information about informal leaders from US embassies. It details how the solution evolved based on feedback from diplomats and policymakers. The final proposed solution performs natural language processing on news articles and social media to extract contact information and suggest new contacts for diplomats based on their existing networks."
The document describes the development of a virtual assistant to help address the problem of refugees not having access to trusted information. It outlines the team's journey, from initial prototypes like a contact inventory and two-sided platform, to developing a chat-based intelligent virtual assistant. Feedback led the team to pivot their focus to refugees' needs and providing a centralized, publicly accessible, mobile-oriented knowledge database. Their minimum viable product was a chatbot that refugees can use to find information like locations of donated clothes. The team partnered with UNHCR and aims to continue improving the technology to better assist more refugees.
The document summarizes the progress of Team TRACE over 10 weeks in developing a platform to help companies identify and address forced labor in their shared supply chains. They initially thought companies just needed more data, but learned remediation requires resources companies lack. They then developed an idea for companies to find NGOs to help, but received negative feedback. In weeks 7-10, they partnered with the Sustainable Apparel Coalition to create a platform for companies to pool resources and collaborate on remediating shared problematic factories, helping workers and saving companies money.
The document discusses developing a centralized database to track missing and perished refugees by collecting data from refugees and organizations assisting them. It notes that detailed data on refugee movements does not currently exist. The proposed solution is a WhatsApp bot that refugees could use to share travel details in order to facilitate faster emergency response times and inform search efforts. Challenges include refugees' reluctance to share information and differences in languages/cultures along migration routes.
This document summarizes the process and findings of a project called "Hacking for Peacekeeping" that aimed to develop a solution to assess the effectiveness of peacekeeping forces and support programs. Over the course of 10 weeks, the team conducted 96 interviews with experts, developed standard metrics, determined how to obtain necessary data, created a mobile application called "PeaceStar" to aggregate and analyze the data, and gained buy-in from key stakeholders. The resulting PeaceStar solution is now ready for implementation and has the potential to improve decision-making, resource allocation, and the overall effectiveness of peacekeeping operations.
The document summarizes the journey of the team HackingCT in developing interventions to counter violent extremism. It describes how the team initially focused on crowdsourcing responses but then pivoted through different approaches focusing on the CVE ecosystem, incentives for local communities, providing an Ask Me Anything platform, and finally developing a textline for friends and family of individuals at risk of violent extremism. It outlines the minimum viable product developed as a textline for support and intervention as well as plans to pilot the textline in two cities in 2017.
The document discusses the challenge of detecting and defending against autonomous underwater vehicle swarms operated by non-state actors in the Strait of Hormuz. It notes the strategic importance of the strait and potential threats operating in the region. It then outlines the problem of detecting swarm threats using sonar and other sensors, classifying swarm types, and determining an appropriate tactical response. The document proposes a methodology for swarm defense including fusing sensor data, classifying threats, recommending reactions, and protecting lives and infrastructure from swarm attacks.
The document describes the process an organization went through over 10 weeks to develop a solution for detecting improvised explosive devices (IEDs) using unmanned aerial vehicles (UAVs). They initially focused on developing new hardware but through stakeholder interviews pivoted to focus on developing image processing software that could augment human analysts' abilities to detect IEDs in drone footage. They validated this approach by successfully detecting simulated IEDs (potholes) in test images, positioning them to continue refining the algorithm and expanding its capabilities.
The DELPHI project aims to create an interactive workflow using a collaborative platform for subject matter experts and data scientists to predict improvised threats. This would help mitigate risks for warfighters. The DELPHI platform would allow for data-driven decisions on future threats and enable JIDO to appropriately allocate resources. The scope includes helping JIDO and other federal agencies, benefiting an estimated 112 people.
The document summarizes the findings of a project to develop a platform called Modern-Day Minutemen to connect US civilians with cybersecurity skills to the US military. It describes interviews conducted with potential users, experts, and buyers to understand opportunities and challenges. The initial hypotheses and mission model involved crowd-sourcing cyber missions to anonymous civilians. Through stakeholder discussions, the model pivoted to focus on cybersecurity reserves and university partnerships to provide legal and structured training opportunities. The document outlines various business model canvases explored, including establishing the platform as a non-profit, and lessons learned around the need for improved communication between the military and private sector on cybersecurity issues.
The document describes a team's project to enhance training for operators of the U.S. Special Operations Command's (USSOCOM) Light Tactical All-Terrain Vehicle (LTATV) through developing real-time audio-visual feedback systems. Over 15 weeks, the team conducted over 100 interviews and validated hypotheses with USSOCOM and operators. Their MVP is a training module for the MRZR vehicle that detects rollover danger and provides alerts. Testing showed it could fulfill a new USSOCOM requirement for rollover training. Mobility representatives supported deploying it to select units, and the team aims to further develop and test the system with USSOCOM and operators.
The team proposes to develop encryption solutions suitable for common microcontrollers used in IoT devices. Their goal is to create transparent encryption that is easy for makers to implement. Their initial idea is an open source encryption library, educating the public, and a website hosting the libraries. They discuss alternative ideas like encrypted chips or an encryption software optimized for medical devices. Their final MVP is a communication system design service to improve cybersecurity in medical devices, with the goal of transitioning to other applications.
This document summarizes the biographies of two Army Rangers, Master Sergeant Kevin Nelson and Sergeant First Class Chuck Evans. It notes that MSG Nelson has nearly 21 years experience in the 75th Ranger Regiment, including being severely wounded in Iraq in 2006. SFC Evans has served in various positions over a 17 year career since joining at age 17, and has worked closely with MSG Nelson on special projects for the past 1.5 years.
The document discusses how the military can visualize local sentiments and digital data. It describes aggregating raw digital data and showing relationships and frequencies to create a digital data layer. This layer can then be overlaid on a map to provide insight. The document presents a "status ring" concept that uses standardized military colors in a ring interface to display status alerts from different locations in a three-dimensional, interactive way. This helps transform aggregated two-dimensional data into a three-dimensional format.
SkySweep is a drone detection system that can detect, jam GPS signals, and capture drones. The system was created by a team of 5 students from various disciplines including computer science, engineering, nursing, and intelligence analysis.
The team aims to enhance force protection for U.S. Army commanders by analyzing social media data to identify probable hotspots of future unrest. They have fluency in critical languages and experience in data science, startups, and the tech industry. Their capabilities include indexing social media data and applying image, text, and sentiment analysis using machine learning. Their journey has included building recognition tools and prototyping a system called Spyglass to address the Army's need to analyze social media and predict threats in dense urban environments.
The document discusses using the Lean LaunchPad approach to solve national security problems. It outlines that problem definition is critical and technical solutions must be matched to real Department of Defense needs. Rapid prototyping teams combining industry, government mentors, and the Lean LaunchPad process can effectively solve emerging security issues. However, the large size of the Department of Defense can obscure overlapping efforts, and challenges remain in quickly deploying prototypes. The document emphasizes that hacking for defense through this approach is a team-based journey.
The document outlines the problem statement, team members, and mission model for the H4Drone team. The initial problem was to detect small unmanned aerial systems as threats, and the final problem aims to neutralize enemy drones used for surveillance and attacks. The team developed hypotheses for detection and neutralization, and created a mission model canvas to identify beneficiaries and key activities, resources, and partners to achieve the goal of countering drone threats.
Blue and Gray Berets H4D Final PresentationH4Diadmin
Here is a proposed framework for JIDO based on the key findings:
The JIDO Threat-Focused Framework
1. Define the Improvised Threat Domain
- Continuously monitor, analyze, and characterize evolving improvised threats
- Maintain expertise on adversary TTPs, capabilities, and intent
2. Anticipate Requirements
- Identify and assess potential capability gaps before they materialize
- Pursue emerging commercial and dual-use technologies proactively
3. Develop Rapid Solutions
- Leverage flexible authorities and funding to rapidly develop and deliver solutions
- Integrate operator and scientist perspectives for customized solutions
4. Implement and Support
- Support in-
The team developed a new method called a "Debris Responsibility Score" to evaluate and prevent space debris creation. They interviewed over 100 stakeholders, mapped the current collision avoidance process, and identified its weaknesses. The key insight was that collision warnings are imprecise, leaving satellite operators uncertain about maneuver risks. To address this, the team designed a scoring system to increase accountability, incentivize debris mitigation, and help establish international standards. Their proposal received positive feedback and has the potential to shape future policy and industry practices around space sustainability.
The document describes a software solution being developed to help the US State Department's Conflict and Stabilization Operations (CSO) acquire more information about informal leaders from US embassies. It details how the solution evolved based on feedback from diplomats and policymakers. The final proposed solution performs natural language processing on news articles and social media to extract contact information and suggest new contacts for diplomats based on their existing networks."
The document describes the development of a virtual assistant to help address the problem of refugees not having access to trusted information. It outlines the team's journey, from initial prototypes like a contact inventory and two-sided platform, to developing a chat-based intelligent virtual assistant. Feedback led the team to pivot their focus to refugees' needs and providing a centralized, publicly accessible, mobile-oriented knowledge database. Their minimum viable product was a chatbot that refugees can use to find information like locations of donated clothes. The team partnered with UNHCR and aims to continue improving the technology to better assist more refugees.
The document summarizes the progress of Team TRACE over 10 weeks in developing a platform to help companies identify and address forced labor in their shared supply chains. They initially thought companies just needed more data, but learned remediation requires resources companies lack. They then developed an idea for companies to find NGOs to help, but received negative feedback. In weeks 7-10, they partnered with the Sustainable Apparel Coalition to create a platform for companies to pool resources and collaborate on remediating shared problematic factories, helping workers and saving companies money.
The document discusses developing a centralized database to track missing and perished refugees by collecting data from refugees and organizations assisting them. It notes that detailed data on refugee movements does not currently exist. The proposed solution is a WhatsApp bot that refugees could use to share travel details in order to facilitate faster emergency response times and inform search efforts. Challenges include refugees' reluctance to share information and differences in languages/cultures along migration routes.
This document summarizes the process and findings of a project called "Hacking for Peacekeeping" that aimed to develop a solution to assess the effectiveness of peacekeeping forces and support programs. Over the course of 10 weeks, the team conducted 96 interviews with experts, developed standard metrics, determined how to obtain necessary data, created a mobile application called "PeaceStar" to aggregate and analyze the data, and gained buy-in from key stakeholders. The resulting PeaceStar solution is now ready for implementation and has the potential to improve decision-making, resource allocation, and the overall effectiveness of peacekeeping operations.
The document summarizes the journey of the team HackingCT in developing interventions to counter violent extremism. It describes how the team initially focused on crowdsourcing responses but then pivoted through different approaches focusing on the CVE ecosystem, incentives for local communities, providing an Ask Me Anything platform, and finally developing a textline for friends and family of individuals at risk of violent extremism. It outlines the minimum viable product developed as a textline for support and intervention as well as plans to pilot the textline in two cities in 2017.
The document discusses the challenge of detecting and defending against autonomous underwater vehicle swarms operated by non-state actors in the Strait of Hormuz. It notes the strategic importance of the strait and potential threats operating in the region. It then outlines the problem of detecting swarm threats using sonar and other sensors, classifying swarm types, and determining an appropriate tactical response. The document proposes a methodology for swarm defense including fusing sensor data, classifying threats, recommending reactions, and protecting lives and infrastructure from swarm attacks.
The Antyodaya Saral Haryana Portal is a pioneering initiative by the Government of Haryana aimed at providing citizens with seamless access to a wide range of government services
Working with data is a challenge for many organizations. Nonprofits in particular may need to collect and analyze sensitive, incomplete, and/or biased historical data about people. In this talk, Dr. Cori Faklaris of UNC Charlotte provides an overview of current AI capabilities and weaknesses to consider when integrating current AI technologies into the data workflow. The talk is organized around three takeaways: (1) For better or sometimes worse, AI provides you with “infinite interns.” (2) Give people permission & guardrails to learn what works with these “interns” and what doesn’t. (3) Create a roadmap for adding in more AI to assist nonprofit work, along with strategies for bias mitigation.
Contributi dei parlamentari del PD - Contributi L. 3/2019Partito democratico
DI SEGUITO SONO PUBBLICATI, AI SENSI DELL'ART. 11 DELLA LEGGE N. 3/2019, GLI IMPORTI RICEVUTI DALL'ENTRATA IN VIGORE DELLA SUDDETTA NORMA (31/01/2019) E FINO AL MESE SOLARE ANTECEDENTE QUELLO DELLA PUBBLICAZIONE SUL PRESENTE SITO
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
UN WOD 2024 will take us on a journey of discovery through the ocean's vastness, tapping into the wisdom and expertise of global policy-makers, scientists, managers, thought leaders, and artists to awaken new depths of understanding, compassion, collaboration and commitment for the ocean and all it sustains. The program will expand our perspectives and appreciation for our blue planet, build new foundations for our relationship to the ocean, and ignite a wave of action toward necessary change.
United Nations World Oceans Day 2024; June 8th " Awaken new dephts".Christina Parmionova
The program will expand our perspectives and appreciation for our blue planet, build new foundations for our relationship to the ocean, and ignite a wave of action toward necessary change.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
10. Our ProblemHumanitarian Aid Disaster Relief operatives
CANNOT:
1. Locate other first responders and victims in a
region
2. Know conditions of the afflicted area before
arriving on scene
3. Have access to data and a map that updates
(in real time) who is doing what
AS A RESULT…
18. We would like to thank:
Commander Greg Sawtell
Our professors
Our interviewees
Dr. Laureen Donovan
Christine Goodwin
Editor's Notes
Emma--sit in the crowd and read over in the background instead of standing in front of everyone?
The civilian populace, as well as state, local, federal and international levels of government lack one common information sharing environment. As a result--there is a delay in disaster response--which then increases the loss of life
PAUSE
Our final problem statement took us weeks to determine. After streamlining our challenge statement, we concluded that essentially:
Humanitarian Aid-Disaster Relief operatives CANNOT:
Locate other first responders & victims in a region
Locate where and what critical supplies are in a region
Have access to data/a map that updates (in real time) who is doing what
As a result:
Information, time, and resources are wasted
And more importantly, human lives are lost.
We are Vital, a disaster relief application
Introduce selves here
“And we are Vital”
Jackie
The process for our team was messy and overwhelming at times
Emma
When we first started the project and read over our problem statement: we were Naive, a little confused, but we had no idea what we were getting ourselves into….
Emma
Honestly it was difficult at first--how does a team of nursing, writing, public policy, engineering, and biology majors work together to develop an app, when we did not even understand the problem?
We all have our different ways of thinking & different ways of problem solving
Emma: I was focusing on the medical aspects of Disaster Relief (interviewing Doctors, Nurses)
Jackie & Will: trying to put the problem in context
Adam and Cesar: started designing the app in Week 3
Jackie
We scrambled to get 10 interviews every week (emailing, calling, going to a professors Office hours), and it was difficult to find time to meet as a team, (we are all different majors and on opposite ends of campus)
In the beginning we were not getting much out of our interviews, none of us knew what to ask or had experience in Disaster relief work
We created a detailed questionarrie and started to focus on: “gaining empathy” and get a “day in the life” perspective during the interviews - get the details (understand all the little tasks)
30 hours on Google Hangout- when we wanted to give up or we felt stuck, our mentor would things through with us
Jackie
We interviewed firefighters, doctors, nurses, NGO workers, government officials, first responders, directors, victims, and other professionals.
Each interview brought a new perspective & new/MORE problems
Jackie
By about week 4 we were all over the place…….complete chaos- Caused chaos, each interview pulled/pushed us in different directions
All of our individual interviews influenced us - so we had a lot of disagreements: CREATIVE FRICTION
It got to the point where we would all meet as a team and not even know where to begin. - none of us knew how to solve this -
At one meeting it finally hit us….. that we were trying to solve every problem our interviewees threw at us.
Emma
Our mentor told us to read the surveys and look for similarities in the interviews: we began to notice patterns in our interviews….
We compiled all of our interview notes and created a word cloud. Certain words are bigger than others, these represent the most commonly used words. - We feel like this is a global problem, location of the words is random….
The words that really stick out here are: communicate and need
Communicate: it’s a problem that every group and every human faces; This is something that our interviewees cited as a problem over and over again.
Need: what do the victims need? What do first responders need? Is the data accurate? Where are our resources? What are the locations of victims?
Emma
Our challenge, brought to us by National Defense University’s Center for Technology and National Security Policy and Commander Greg Sawtell
You can refer to the full challenge statement on your handout.
Eventually we had to start saying “no”--to solving all the problems. We re-wrote the problem statement almost every weeks and finally settled on this
Our FINAL problem statement: This is what we focused on
Jackie
Commander Sawtell, Our Sponsor
Mentioned the concept of Waze on the second day of class when we learned about all the different problems that were going to be given out
Waze is a crowdsourcing, mobile app that is used for traffic and navigation. Essentially, you can report things like: an accident on the side of the road, and it will warn the other users that the accident is approaching.
Jackie
Navy pilot--biggest interview, week 4: JACKIE
He talked about flying around New Orleans after Hurricane Katrina
Uber: 1st to get the call got it, BUT should be people who are closest, that is the most efficient method he was SO EXCITED about this project and inspired US to work to make this happen
Emma: Founder of Ushahidi:
Worked at USA ID for 20 years -
Founded Ushahidi - crowdsources data and analyzes it
The week after this we changed the problem statement to include TRACKING SUPPLIES
EMMA: Member from Team Rubicon: Cesar’s talked to him:
We made a mistake by focusing on just logistics and supplies. We need to open It back up. We had good original idea; we should open it up to include as much data possible. The more you can provide the better. Super niche applications are a bad thing, not everyone will find it useful.
After this we cut out resources
Our final interview was Pablo Mayrgundter - EMMA
EMMA: this interview was a Confidence booster : After this interview, our Nursing major told me she was going to learn how to code so we could make this app
Emma
Big decisions that took awhile for to decide on: Who should this app target? Directors? Victims? First Responders? Or all of them??
Emma
We decided the app will on a national level, however we believe it can be scaled down and implemented on the state and local level as well.
EMMA
After weeks of research, disagreements, and pivots, we designed an app that would alleviate some of the major issues with disaster response.
Our app targets both the victim and the first responder--in which data is collected through crowdsourcing
This data is available for both the victim and the first responder to see. The victim, as well as the first responder, will be able to report the status of various infrastructure as well as the conditions of other victims.
This app also allows first responders to have a more clear picture of the status of the location in which they are being sent.
Our app gives victims a voice, allowing information on conditions and required resources to be known before a first responder gets to a disaster scene.
Jackie--add screenshot of uber and waze
Our app mixes various components of Uber and Waze, which we think offers the best possible solution.
Uber is an app where the user can download and get a ride virtually anywhere you wish. If the user wants to, they can sign up to be a driver, and receive money to drive people around.
Waze is a crowdsourcing, mobile app that is used for traffic and navigation. Essentially, you can report things like: an accident on the side of the road, and it will warn the other users that the accident is approaching.
Vital has a double interface--one for the victim, and one for the first responder--which mirrors Uber’s driver/rider concept.
Our app also contains a map with icons of damaged buildings/other infrastructure--which was inspired by Waze.
We also incorporated crowdsourcing to allow all users to report information, as well as credibility scores assigned to each report--features that Waze are famous for
Live speak what is going on in the app
Cesar and Adam both designed this app
Make it clear that there is a program
Clarify the red, green, yellow
Mention Patrick: He told us to look into crowdsourcing and SMS texting
EMMA
Are we ready to develop? Almost. We want to streamline our app further, and add things such as news and social media links.
Contact cell companies
Contact computer programmers
Reach out to Pablo Mayrgundter--founder of Google Crisis Response Team
Emma
Thank you to the professors: for believing in us
Greg: thanks for always being there for a quick phone call
Christine: where do I even begin?