SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Traffic congestion. What can the designer do but despair?
Congestion
• Defined

• Causes

 • Network overload

 • Traffic disturbances
Congestion
• Define

• Causes

 • Network overload

 • Traffic disturbances

 • Security concerns
Congestion
• Define

• Causes

 • Network overload

 • Traffic disturbances

 • Security concerns

 • Irrationality
Solutions
• Get rid of transportation
• Infrastructure spending
Traffic congestion. What can the designer do but despair?
Solutions
• Get rid of transportation
• Infrastructure spending
• Technology fixes
Traffic congestion. What can the designer do but despair?
Solutions
• Get rid of transportation
• Infrastructure spending
• Technology fixes
• Modal shift
• Accommodate
• Getting more from the existing infrastructure
System                     Swarm
• Hierarchical             • Network

• Locus of control lies    • Locus of control lies 
  with system                with individual

• Infrastructure           • Behavioural
  engineering                engineering

• Alienating               • Engaging
Human solutions
Use the data
• Situation awareness
Human solutions
Use the data
• Situation awareness

• Social networking
Traffic congestion. What can the designer do but despair?
Traffic congestion. What can the designer do but despair?
Traffic congestion. What can the designer do but despair?

Weitere ähnliche Inhalte

Andere mochten auch

Traffic Congestion PowerPoint Presentation with Images
Traffic Congestion PowerPoint Presentation with ImagesTraffic Congestion PowerPoint Presentation with Images
Traffic Congestion PowerPoint Presentation with ImagesRoad Safety
 
Transport Problems And Solutions!
Transport  Problems And  Solutions!Transport  Problems And  Solutions!
Transport Problems And Solutions!adtastic2001
 
Smart Traffic Congestion Control System
Smart Traffic Congestion Control SystemSmart Traffic Congestion Control System
Smart Traffic Congestion Control SystemMuzzamil Shaikh
 
Traffic Congestion PowerPoint Presentation
Traffic Congestion PowerPoint PresentationTraffic Congestion PowerPoint Presentation
Traffic Congestion PowerPoint PresentationRoad Safety
 
Traffic congestion
Traffic congestionTraffic congestion
Traffic congestionBipin Parab
 
10 Tips for Connecting with Your Audience
10 Tips for Connecting with Your Audience10 Tips for Connecting with Your Audience
10 Tips for Connecting with Your AudienceSketchBubble
 
Leading the Perfect Q&A in Any Presentation
Leading the Perfect Q&A in Any PresentationLeading the Perfect Q&A in Any Presentation
Leading the Perfect Q&A in Any PresentationSketchBubble
 
5 tools for an awesome presentation-By Samid Razzak
5 tools for an awesome presentation-By Samid Razzak5 tools for an awesome presentation-By Samid Razzak
5 tools for an awesome presentation-By Samid RazzakMd. Samid Razzak
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 
Free Download Powerpoint Slides
Free Download Powerpoint SlidesFree Download Powerpoint Slides
Free Download Powerpoint SlidesGeorge
 

Andere mochten auch (13)

Traffic Congestion PowerPoint Presentation with Images
Traffic Congestion PowerPoint Presentation with ImagesTraffic Congestion PowerPoint Presentation with Images
Traffic Congestion PowerPoint Presentation with Images
 
Transport Problems And Solutions!
Transport  Problems And  Solutions!Transport  Problems And  Solutions!
Transport Problems And Solutions!
 
Smart Traffic Congestion Control System
Smart Traffic Congestion Control SystemSmart Traffic Congestion Control System
Smart Traffic Congestion Control System
 
Traffic congestion
Traffic congestionTraffic congestion
Traffic congestion
 
Traffic Congestion PowerPoint Presentation
Traffic Congestion PowerPoint PresentationTraffic Congestion PowerPoint Presentation
Traffic Congestion PowerPoint Presentation
 
Traffic congestion
Traffic congestionTraffic congestion
Traffic congestion
 
10 Tips for Connecting with Your Audience
10 Tips for Connecting with Your Audience10 Tips for Connecting with Your Audience
10 Tips for Connecting with Your Audience
 
Leading the Perfect Q&A in Any Presentation
Leading the Perfect Q&A in Any PresentationLeading the Perfect Q&A in Any Presentation
Leading the Perfect Q&A in Any Presentation
 
How to Manage Your Anxiety When Presenting
How to Manage Your Anxiety When PresentingHow to Manage Your Anxiety When Presenting
How to Manage Your Anxiety When Presenting
 
5 tools for an awesome presentation-By Samid Razzak
5 tools for an awesome presentation-By Samid Razzak5 tools for an awesome presentation-By Samid Razzak
5 tools for an awesome presentation-By Samid Razzak
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
5 Ways To Surprise Your Audience (and keep their attention)
5 Ways To Surprise Your Audience (and keep their attention)5 Ways To Surprise Your Audience (and keep their attention)
5 Ways To Surprise Your Audience (and keep their attention)
 
Free Download Powerpoint Slides
Free Download Powerpoint SlidesFree Download Powerpoint Slides
Free Download Powerpoint Slides
 

Ähnlich wie Traffic congestion. What can the designer do but despair?

Traffic congestion. What can the designer do but despair?
Traffic congestion. What can the designer do but despair?Traffic congestion. What can the designer do but despair?
Traffic congestion. What can the designer do but despair?Raphael De Robiano
 
Data Mining Intro
Data Mining IntroData Mining Intro
Data Mining IntroAsma CHERIF
 
Data Management - NA CACS 2009
Data Management - NA CACS 2009Data Management - NA CACS 2009
Data Management - NA CACS 2009CISA1567
 
The Evolution of Disaster Early Warning Systems in the TRIDEC Project
The Evolution of Disaster Early Warning Systems in the TRIDEC Project The Evolution of Disaster Early Warning Systems in the TRIDEC Project
The Evolution of Disaster Early Warning Systems in the TRIDEC Project Peter Löwe
 
Applicability of Machine learning in computer networks
Applicability of Machine learning in computer networksApplicability of Machine learning in computer networks
Applicability of Machine learning in computer networksChetan Kumar S
 
Artificial Intelligence in Security and Surveillance
Artificial Intelligence in Security and SurveillanceArtificial Intelligence in Security and Surveillance
Artificial Intelligence in Security and SurveillanceGaurav Patwardhan
 
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slides
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slidesLMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slides
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slidesRoger Oldham
 
CBTC Technical Recruiting and Training Challenges
CBTC Technical Recruiting and Training ChallengesCBTC Technical Recruiting and Training Challenges
CBTC Technical Recruiting and Training Challengesmark_engels
 
840 Santoso Perkembangan Tik Bab 2
840 Santoso Perkembangan Tik Bab 2840 Santoso Perkembangan Tik Bab 2
840 Santoso Perkembangan Tik Bab 2guestdad76b5
 
840 Santoso Perkembangan Tik Bab 2
840 Santoso Perkembangan Tik Bab 2840 Santoso Perkembangan Tik Bab 2
840 Santoso Perkembangan Tik Bab 2guestdad76b5
 
Preparing Your Business For A Disaster
Preparing Your Business For A DisasterPreparing Your Business For A Disaster
Preparing Your Business For A DisasterCIOOffice
 
Anomaly Detection and Spark Implementation - Meetup Presentation.pptx
Anomaly Detection and Spark Implementation - Meetup Presentation.pptxAnomaly Detection and Spark Implementation - Meetup Presentation.pptx
Anomaly Detection and Spark Implementation - Meetup Presentation.pptxImpetus Technologies
 
Rob Bernard: IT Solutions For A Low Carbon Economy
Rob Bernard: IT Solutions For A Low Carbon EconomyRob Bernard: IT Solutions For A Low Carbon Economy
Rob Bernard: IT Solutions For A Low Carbon EconomyGigaom
 
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
Anomaly Detection - Real World Scenarios, Approaches and Live ImplementationAnomaly Detection - Real World Scenarios, Approaches and Live Implementation
Anomaly Detection - Real World Scenarios, Approaches and Live ImplementationImpetus Technologies
 
Online Neural Data Processing with Plexon OmniPlex: Referencing, Sorting and ...
Online Neural Data Processing with Plexon OmniPlex: Referencing, Sorting and ...Online Neural Data Processing with Plexon OmniPlex: Referencing, Sorting and ...
Online Neural Data Processing with Plexon OmniPlex: Referencing, Sorting and ...InsideScientific
 
2023-ICFS2023-Zahedan-Akbarzadeh-v4-March-8-March2023.pdf
2023-ICFS2023-Zahedan-Akbarzadeh-v4-March-8-March2023.pdf2023-ICFS2023-Zahedan-Akbarzadeh-v4-March-8-March2023.pdf
2023-ICFS2023-Zahedan-Akbarzadeh-v4-March-8-March2023.pdfakbazar
 
Supply Demand Chain
Supply Demand ChainSupply Demand Chain
Supply Demand ChainRon Calonica
 
Routing Security
Routing SecurityRouting Security
Routing SecurityRIPE NCC
 

Ähnlich wie Traffic congestion. What can the designer do but despair? (20)

Traffic congestion. What can the designer do but despair?
Traffic congestion. What can the designer do but despair?Traffic congestion. What can the designer do but despair?
Traffic congestion. What can the designer do but despair?
 
Data Mining Intro
Data Mining IntroData Mining Intro
Data Mining Intro
 
Data Management - NA CACS 2009
Data Management - NA CACS 2009Data Management - NA CACS 2009
Data Management - NA CACS 2009
 
The Evolution of Disaster Early Warning Systems in the TRIDEC Project
The Evolution of Disaster Early Warning Systems in the TRIDEC Project The Evolution of Disaster Early Warning Systems in the TRIDEC Project
The Evolution of Disaster Early Warning Systems in the TRIDEC Project
 
Applicability of Machine learning in computer networks
Applicability of Machine learning in computer networksApplicability of Machine learning in computer networks
Applicability of Machine learning in computer networks
 
Artificial Intelligence in Security and Surveillance
Artificial Intelligence in Security and SurveillanceArtificial Intelligence in Security and Surveillance
Artificial Intelligence in Security and Surveillance
 
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slides
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slidesLMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slides
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slides
 
CBTC Technical Recruiting and Training Challenges
CBTC Technical Recruiting and Training ChallengesCBTC Technical Recruiting and Training Challenges
CBTC Technical Recruiting and Training Challenges
 
IPAS at Penn State
IPAS at Penn StateIPAS at Penn State
IPAS at Penn State
 
840 Santoso Perkembangan Tik Bab 2
840 Santoso Perkembangan Tik Bab 2840 Santoso Perkembangan Tik Bab 2
840 Santoso Perkembangan Tik Bab 2
 
840 Santoso Perkembangan Tik Bab 2
840 Santoso Perkembangan Tik Bab 2840 Santoso Perkembangan Tik Bab 2
840 Santoso Perkembangan Tik Bab 2
 
Preparing Your Business For A Disaster
Preparing Your Business For A DisasterPreparing Your Business For A Disaster
Preparing Your Business For A Disaster
 
Anomaly Detection and Spark Implementation - Meetup Presentation.pptx
Anomaly Detection and Spark Implementation - Meetup Presentation.pptxAnomaly Detection and Spark Implementation - Meetup Presentation.pptx
Anomaly Detection and Spark Implementation - Meetup Presentation.pptx
 
Rob Bernard: IT Solutions For A Low Carbon Economy
Rob Bernard: IT Solutions For A Low Carbon EconomyRob Bernard: IT Solutions For A Low Carbon Economy
Rob Bernard: IT Solutions For A Low Carbon Economy
 
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
Anomaly Detection - Real World Scenarios, Approaches and Live ImplementationAnomaly Detection - Real World Scenarios, Approaches and Live Implementation
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
 
Online Neural Data Processing with Plexon OmniPlex: Referencing, Sorting and ...
Online Neural Data Processing with Plexon OmniPlex: Referencing, Sorting and ...Online Neural Data Processing with Plexon OmniPlex: Referencing, Sorting and ...
Online Neural Data Processing with Plexon OmniPlex: Referencing, Sorting and ...
 
Pace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks WiredPace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks Wired
 
2023-ICFS2023-Zahedan-Akbarzadeh-v4-March-8-March2023.pdf
2023-ICFS2023-Zahedan-Akbarzadeh-v4-March-8-March2023.pdf2023-ICFS2023-Zahedan-Akbarzadeh-v4-March-8-March2023.pdf
2023-ICFS2023-Zahedan-Akbarzadeh-v4-March-8-March2023.pdf
 
Supply Demand Chain
Supply Demand ChainSupply Demand Chain
Supply Demand Chain
 
Routing Security
Routing SecurityRouting Security
Routing Security
 

Kürzlich hochgeladen

Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 

Kürzlich hochgeladen (20)

Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 

Traffic congestion. What can the designer do but despair?