SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
Use thousande of eyes and ears to make your
environment Clean, Safe and Secure.
Activate and motivate your citizens to take their
responsibility with this easy tool.
➢
Mobile phones become your eyes and ears and will registrate:
➢
Junk on the street, suspicious circumstances, traffic accidents, graffiti, drug deal, damaged bus
shelters, loitering, defective light, strange behaviour, litter, misconduct, neglected animals, child
abuse, crime, terrorist threat, slave labor, and more.
➢
Quick simple reporting > efficient handling > effective safety
ObserveObserve
Receive data
ActAct
Deploy
LearnLearn
Improve
DecideDecide
Plan
OrientOrient
Analyze
The OODA loop (for observe, orient, decide, and act) is a concept originally applied to the combat operations process, often at the strategic level in
military operations. The concept was developed by military strategist and USAF Colonel John Boyd.
Step 1. Observe
 Receiving data
 SafeCity users make live video from location
 Fixed cameras provide continuous picture
 Phone alerts
 Automated alarms from sensors
 Information from social media (twitter, facebook)
 Regular monitoring verifies local situation
Receive dataReceive data
SafeCity live video
Phone calls
Social Media
Neighborhood watch
Sensors
Step 2. Orient
Not clean
Not intact
Not secure
Incident reports
AnalyzeAnalyze
Collection
Categorize
Orient
Visualize
Step 3. Decide
 Follow-up based on analysis and policyPlanPlan
Prioritize
Deployment proposals
Mobilize
Step 4. Act
DeploymentDeployment
Police
Security companies
Cleaning companies
Restoration companies
Step 5. Learn
ImproveImprove
Feedback of monitoring reports
Preventive measures
Proactie efforts
Impact on life measure
Evaluating follow-up
For more information or free trial, mail: info@safecity.eu

Weitere ähnliche Inhalte

Ähnlich wie SafeCity presentation

Protecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsProtecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsNovoQuad
 
IRJET- Enactment of Smart Child Monitoring System
IRJET- Enactment of Smart Child Monitoring SystemIRJET- Enactment of Smart Child Monitoring System
IRJET- Enactment of Smart Child Monitoring SystemIRJET Journal
 
Open Nature Park Ops & Security Solutions
Open Nature Park Ops & Security SolutionsOpen Nature Park Ops & Security Solutions
Open Nature Park Ops & Security Solutionskoottummel
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace SurveilanceSampath
 
IRJET - Ensuring Women Safety by Offline Tracking
IRJET -  	  Ensuring Women Safety by Offline TrackingIRJET -  	  Ensuring Women Safety by Offline Tracking
IRJET - Ensuring Women Safety by Offline TrackingIRJET Journal
 
Life Safety and Property Protection
Life Safety and Property ProtectionLife Safety and Property Protection
Life Safety and Property ProtectionQuality CCTV
 
Verfied Response Is Your Business Protected 071712
Verfied Response Is Your Business Protected 071712Verfied Response Is Your Business Protected 071712
Verfied Response Is Your Business Protected 071712angeloslideshare
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensicsnoorashams
 
Best Android Spy Apps_ Ensuring Safety and Monitoring with Consent.pdf
Best Android Spy Apps_ Ensuring Safety and Monitoring with Consent.pdfBest Android Spy Apps_ Ensuring Safety and Monitoring with Consent.pdf
Best Android Spy Apps_ Ensuring Safety and Monitoring with Consent.pdfonestore3
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
NNID texting and driving prevention No Apps Needed
NNID texting and driving prevention No Apps NeededNNID texting and driving prevention No Apps Needed
NNID texting and driving prevention No Apps NeededGraham Crispin MBA
 
Top 5 Uses of Biometrics Around The World
Top 5 Uses of Biometrics Around The WorldTop 5 Uses of Biometrics Around The World
Top 5 Uses of Biometrics Around The Worldmehedi76
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone SecurityMalasta Hill
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devicesJ A Bhavsar
 

Ähnlich wie SafeCity presentation (20)

Protecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsProtecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big Events
 
Survillance description
Survillance descriptionSurvillance description
Survillance description
 
IRJET- Enactment of Smart Child Monitoring System
IRJET- Enactment of Smart Child Monitoring SystemIRJET- Enactment of Smart Child Monitoring System
IRJET- Enactment of Smart Child Monitoring System
 
Open Nature Park Ops & Security Solutions
Open Nature Park Ops & Security SolutionsOpen Nature Park Ops & Security Solutions
Open Nature Park Ops & Security Solutions
 
My ppt
My pptMy ppt
My ppt
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
 
IRJET - Ensuring Women Safety by Offline Tracking
IRJET -  	  Ensuring Women Safety by Offline TrackingIRJET -  	  Ensuring Women Safety by Offline Tracking
IRJET - Ensuring Women Safety by Offline Tracking
 
Life Safety and Property Protection
Life Safety and Property ProtectionLife Safety and Property Protection
Life Safety and Property Protection
 
Verfied Response Is Your Business Protected 071712
Verfied Response Is Your Business Protected 071712Verfied Response Is Your Business Protected 071712
Verfied Response Is Your Business Protected 071712
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
Jeruf resume
Jeruf resumeJeruf resume
Jeruf resume
 
Best Android Spy Apps_ Ensuring Safety and Monitoring with Consent.pdf
Best Android Spy Apps_ Ensuring Safety and Monitoring with Consent.pdfBest Android Spy Apps_ Ensuring Safety and Monitoring with Consent.pdf
Best Android Spy Apps_ Ensuring Safety and Monitoring with Consent.pdf
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
NNID texting and driving prevention No Apps Needed
NNID texting and driving prevention No Apps NeededNNID texting and driving prevention No Apps Needed
NNID texting and driving prevention No Apps Needed
 
G0533441
G0533441G0533441
G0533441
 
Top 5 Uses of Biometrics Around The World
Top 5 Uses of Biometrics Around The WorldTop 5 Uses of Biometrics Around The World
Top 5 Uses of Biometrics Around The World
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
 

Kürzlich hochgeladen

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Kürzlich hochgeladen (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

SafeCity presentation

  • 1.
  • 2. Use thousande of eyes and ears to make your environment Clean, Safe and Secure.
  • 3. Activate and motivate your citizens to take their responsibility with this easy tool.
  • 4. ➢ Mobile phones become your eyes and ears and will registrate: ➢ Junk on the street, suspicious circumstances, traffic accidents, graffiti, drug deal, damaged bus shelters, loitering, defective light, strange behaviour, litter, misconduct, neglected animals, child abuse, crime, terrorist threat, slave labor, and more. ➢ Quick simple reporting > efficient handling > effective safety
  • 5. ObserveObserve Receive data ActAct Deploy LearnLearn Improve DecideDecide Plan OrientOrient Analyze The OODA loop (for observe, orient, decide, and act) is a concept originally applied to the combat operations process, often at the strategic level in military operations. The concept was developed by military strategist and USAF Colonel John Boyd.
  • 6. Step 1. Observe  Receiving data  SafeCity users make live video from location  Fixed cameras provide continuous picture  Phone alerts  Automated alarms from sensors  Information from social media (twitter, facebook)  Regular monitoring verifies local situation Receive dataReceive data SafeCity live video Phone calls Social Media Neighborhood watch Sensors
  • 7. Step 2. Orient Not clean Not intact Not secure Incident reports AnalyzeAnalyze Collection Categorize Orient Visualize
  • 8. Step 3. Decide  Follow-up based on analysis and policyPlanPlan Prioritize Deployment proposals Mobilize
  • 9. Step 4. Act DeploymentDeployment Police Security companies Cleaning companies Restoration companies
  • 10. Step 5. Learn ImproveImprove Feedback of monitoring reports Preventive measures Proactie efforts Impact on life measure Evaluating follow-up
  • 11. For more information or free trial, mail: info@safecity.eu