Why Teams call analytics are critical to your entire business
It and safety
1.
2.
3. o Defence and Security is, by definition, an extended eco-
system in which civil and military, public and private
sector bodies must work together as a single team.
Although it is the framework for the collaboration on
which much of this activity depends, foundation IT
does tend to slip into the background.
• With the march of technology, the field of operations
for Defence and Security organizations is changing
rapidly. The civil and military use of drones is a real
example of how technology changes the landscape.
Within hours, an apparently minor incident can echo
round the world in this new globalized Defence and
Security environment.
4.
5. Right from designing to testing of arms, other equipment etc
computers are used. Besides that almost all of the modern
weapons and other defense equipments involve computers
for their proper functioning.
Besides that managing database of employees and all other
administration work also involves usage of computers.
Computers are ubiquitous, in which way defence is exempt ?
All activities in civilian side are replicated in defence services
(and ministry) also. Biggest and high-value user is Defence
Research & Development Organisation which was once
headed by Dr. Abdul Kalam.
6. Applications
1 - Unified Communications
Training is continuous in the armed forces – nobody can afford to stop
learning – the threats are, after all,in constant evolution.Unified
communications add real value in training,bringing informed expertise
to the learner no matter howremote the location.
2 - Adaptive Workplace
From fixed-location administrative positions to highly-mobile active units,
the Defence and Security sectorsrequire dynamic and highly varied IT
workplaces.
3 - IT Support
Most infantry soldiers are in their early twenties:these are young people
who have grown up with gaming and the internet. When they require IT
support, they are used to self-service and peer-to-peer approaches.
7. 4-Application Testing
Our Defence and Security services have always lead the way as
catalysts for innovation. With the advent of cyber-security, this
leadership continues. New applications are needed to help
identify and counter new threats.
5- Smart Mobility
The history of Defence and Security is the history of positioning
resources in the right place at the right time. Today, for both
people and materiel,the sophistication of positioning
technology has changed the rules.
8. 6- Data Center Rationalization
The Defence and Security services face particular challenges
in data center management. On the one hand, the
pressure is on to boost shared services. On the
other, access control must be managed with absolute
rigor.
7-Real-time Workflow
Intelligence services today are bombarded with
information. Correlating multiple streams of data
to create usable intelligence viewpoints becomes a critical
capability.
9. Other Applications in Defence
Controlling UAV or unmannedair-crafts an example is Predator. I
would recommend watchingthe shows " Future Weapons" and "
Modern Marvles". The show future weapons gives an entire hour to
the predator.
They are also used on Intercontinental Ballistic Missiles (ICBMs) that
uses GPS and Computers to help the missile get weapons systems
onto the incoming target to destroy them.
Computers are used in the logistic and ordering functions of getting
equipments to and around the battlefield.
Computers are used to hold records of personnel and very usefulin
field hospitals.
Computers are used in tanks and planes and ships to target enemy
forces, help run the platform and more recently to help diagnose
anyproblems with the platforms.
10.
11.
12. • Information Technology (IT) provides new ways for
providers and their patients to readily access and use
health information. Information Technology (IT)
allows health care providers to collect, store, retrieve,
transfer, information electronically.
• Information Technology (IT) has the potential to
improve the quality, safety and efficiency of health
care.
• Information Technology (IT) enables faster, more
accurate diagnosis of disease. Using IT, clinicians can
assemble data about all aspects of patients care,
consult with specialists remotely and get evaluation
of lab data and images by specialists around the
world in real time.
13. we have CCTV security systems, alarms to protect
hospitals against potential threats. CCTVs help
monitoring people moving through an area and
reporting that an object has been removed or
left behind.
• information technology plays a very important
role in keeping the hospital information secured
by not allowing unauthorized users to access .
14. • Electronic processing of care providers and insurance
companies speeds up the approval of claims and
payments to clinicians.
• Diagnosing and treating illness require the patient’s
medical and treatment history to be available for anyone
who sees a particular patient. EHRs save clinicians time by
not having to search for information or duplicate it in
multiple locations.
• Social media outlets allow patients with specific diseases
to share information about specific treatments and
outcomes with one another and with clinicians. As the
data sets at social media sites grow, they have increasing
clinical value for research
16. Advancement in Information Technology in the
form of :-
G.I.S.,
REMOTE SENSING,
INTERNET,
SATELLITE COMMUNICATION, etc.
help in planning and implementation of emergency
preparedness and response action.
17. A geographic information system lets us visualize, question,
analyse, interpret, and understand data to reveal relationships,
patterns, and trend.
• Improve quality and power of analysis of natural hazards
assessments.
• Guide development activities, e.g., proper geographical area
for construction.
• Assist disaster planning by issuing regular reports.
G.I.S.
(Geographic Information System)
.
20. A picture depicting flood prone areas
in Orissa.
( through G.I.S. Technology )
21. Remote Sensing refers to the technology of acquiring
Information about the Earth's surface and atmosphere using
sensors on-board air crafts, balloons, satellites, space shuttles
or
other platforms.
• Helps in identifying hazardous areas.
• It identify the changes occurring in atmosphere.
• Thus, helps in providing early warnings for impending
disasters.
REMOTE SENSING
25. Advance system of forecasting, monitoring and
issuing early warning signals through T.V., radio,
internet, etc.
At the time of communication failure, internet is the
only effective way to communicate.
It can be used to locate missing persons, joining
families, donor contribution.
Nowadays, social media is an effective way for relief
measures like appeal for donations, etc.
It helps to spread disaster management awareness
through information technology.
INTERNET & COMMUNICATION
[Backbone for all technologies]
26. Use of I.T. Tools to spread awareness of
disaster management.
29. Satellite data is used to target potential ground water
sites.
A database of different atmospheric conditions from
time to time is build to have better disaster
forecasting.
Helps in the preparation of seismic hazards maps in
order to trace earthquake prone areas.
GIS can be used in carrying out search and rescue
operations in a more efficient way
OTHER FUNCTIONS :-
31. Risk Reduction Mitigation and
Prevention
Response Recovery
GIS √√√ √√√ √
Internet √√ √√ √√ √√√
Mobile
(voice) √√√ √√√
Mobile
(non-voice) √√√ √√√
Satellite
Communication √√√ √√√ √√√ √√√
Social Networking
√ √√√
TV, Radio √√√ √√√
Use of different technologies for
disaster management
34. 1) ICE- Mumbai Police
The recent gang rape in Mumbai has taken off the comforting
blanket of women’s safety from Mumbai. In an attempt to curb the
onslaught of violence against women, The Mumbai Police has
developed an android App called ICE- ‘In Case of Emergency’.
Key features
• Multilingual app- available in English, Hindi, Marathi
• Send SOS message in one touch
• Tips of personal and cyber safety
• Access to guidelines for disaster preparations, first aid, police,
ambulance numbers
• Find the nearest hospitals automatically based on your GPS
location. Also, search for hospitals across major cities in the country
• Store critical information useful during emergency such as
Contact details of Family members, Doctors and SOS contacts,
Current and past medication, Blood group, Allergies etc
Advantages
• Easy to Use
Disadvantages
• Huge storage space of 10.46 MB required
35. 2) VithU – Channel V
Crime against women have prodded Channel [V] to take initiative
and develop an App with an eye on Woman’s safety.
Key features
• A message, along with the location details is sent to pre-loaded
contacts on tapping the Power icon on the screen twice.
• The App also sends out general updates on the Crime Scene in
India.
• An option ‘Tips Feed’ gives safety tips in case of emergency
situations.
• There is an alert option for the Crime Show Gumrah that sends a
reminder to watch it when it is aired.
Advantages
• Quick & Discreet
Disadvantages
• GPS & Internet needs to be turned ON always for tracking
location. This will drain battery faster.
• The Panic button could be triggered by mistake also.
• Accessible only on high end Android phone.
36. 3) Bachao
Three women- Chinmayee S K, Ankita Herurkar, and Sanik
Sahasrabuddhe- have decided to take a bat for woman’s
safety. They developed ‘Bachchao’- an Android App
designed to trigger SOS alert in case of emergency.
Key Features
• Location Coordinates can be sent to preloaded contacts
by pressing a red button in the app.
• The app supports video recording which can act as digital
witness.
• The alarm SMS can be read even in the most basic of
phones.
• There is provision to update your family of your location
on an hourly basis.
Advantages
• Less Storage Space required and easy to use.
Disadvantages
• Available only in android as of now.
37. 4) iFollow-Ladies safety
Developed by Aucupa Innovative Solutions, this App is
one of the ‘Nasscom sponsored ‘FameApp contest’
award winning safety app and is available for both
android and Apple smart phones.
Key Features
• Victim has to shake the phone thrice in a span of five
seconds and a call is placed to the first contact person
stored.
• If he/she doesn’t respond to the call iFollow will
shoot an SMS along with your geographical location to
select personal contacts (max 3).
• After the first message, on every ten meters change
in location, the app will send SOS distress message
with new location details
Advantages
• Consumes less power and CPU usage.
Disadvantages
• This app will fail in case of zero balance.
38. 5) Google Latitude determines your actual
position (only if your GPRS is ON) and lets you
add your friends to the network. Make sure
you’ve added few friends who are tech savvy
and understand the usage of Google Latitude.
If you’re venturing out on a slightly unsafe
route (i/e if it’s important and unavoidable) or
if you’re stepping out or going back home late
night; make sure you ask them to keep a check
on you through it.
39. 6) Computer Aided Dispatch (CAD) is an emergency
response system for women who may face violence. It is an
integrated system using Geographical Information System
(GIS) based call-taking and Geographical Positioning System
(GPS) based police vehicle dispatch system. This system will
ensure a rapid response to distress calls and ensure a
speedy assistance to women.
7) FIGHTBACK, India’s first Mobile Application for Women
Safety. Powered by CanvasM , FightBack, the women’s
safety application, sends SOS alerts from your phone.
FightBack uses GPS, SMS, location maps, GPRS ,email and
your Facebook account to inform your loved ones in case
you are in danger. The app is available on
iPhone, Android, Black Berry, Windows
40. 8)Circle of 6 is designed mainly for college students. The
app is also useful for high school students or any
female who wants an easy-to-use system to alert
friends when she’s in a threatening situation. The app
is also available in Hindi and the Delhi women’s hotline
number is built in.
9)Scream Alarm! This is a FREE safety alarm that does
only one thing: push the button for making the phone
scream loudly with a woman’s voice! Perfect for
females that need some kind of safety alarm.Have the
app on, and instantly push the button if you feel
threatened! It is available on Android.
41. 10)She Taxi, the 24X7 taxi service operated by women for women
travellers has been designed to ensure a safe and reliable mode of
transport for women as well as to encourage entrepreneurship and self-
employment among women.
• Travellers can book the cab via online or mobile on a 24X7 basis.
• . The traveller will have the option to make payment via cash, debit card or
credit card.Various other features such as refreshment mini bar and
entertainment facilities including music, play stations are also provided in
the cabs.
• The cab, designed and integrated with Global Positioning system(GPS) will
enable to monitor and track the activities of the traveller as well as the
driver and will facilitate immediate aid in case of any emergency situation.
• Safe Bus, Safe Me, Safe Me Mobile and Safe City Response Ecosystem are
the major safety offering technologies used in She Taxi service.
42. 11) Amrita Personal Safety System. (APSS )is an inconspicuous,
wearable device that empowers women to secretly trigger
communication with family and police when in distress. Button- and
voice-activated, the device can record conversations and
communicate immediately via text-message and voice calls to
multiple predetermined destinations. It also supplies its wearer
with automated information regarding the nearest police stations,
hospitals and fire-stations.
• The device is designed to function even in rural areas over low-
speed data connections.
• The device is designed to provide flexibility and choices for the
wearer. Women will be able to wear it either on the waist or on a
necklace, with multiple remote-activation capabilities, including a
separate activation device to be embedded in an earring studs.
43. 12) The Delhi Multimodal Transport System (DIMTS)
has come out with “Telltail”, a security
application on android and smartphones
• Telltail, will help the user raise a security alert
by contacting the police, friends and family
simultaneously. The application will also provide
visual tracking information of the user.
• The application will have three button options
— “Track Me,” “Track By Vehicle” and “Panic
Button” — by clicking which the user will reach
her primary contacts within seconds.
13)The stun gun
This small gun charges an attacker with an
electric shock. The shock weakens the attacker
temporarily, giving you ample chance to escape
the scene. When its trigger is pulled, a stun gun
pumps about 700,000 volts into the attacker’s
body. Some stun guns are small enough to be
concealed in a pack of cigarettes. They run on
Lithium batteries and can be carried either in
handbags or held in waist straps.
44. 14) The stun rings
• A stun ring is an attractive ring that looks
elegant and can pass for fashion ring. But
more importantly, it offers safety and
instills confidence. The ring contains
pepper spray, and it protects you in times
of attack, rape, violence and crisis.
15) The lightning strike personal
protection device
• This torch-like device was originally
developed for use by police officers, but
many civilians now use it as well. It
protects you by shortly blinding and
disorienting the attacker – thanks to the
several lumens of strong white light
produced by the LEDs in the device. The
lightning strike device is light and small;
you can carry it even while jogging.
45. 16)The TASER device
• This personal protection device can stun an attacker
from a distance of about 15 feet away. Yet, it doubles
as a powerful contact stun device. The device is very
easy to use because hitting it anywhere on the
attacker’s body will render him incapacitated. This is
quite unlike pepper sprays and other self-defense
devices, all of which must be targeted directly at the
assailant’s face for any effect to be produced.
48. .
IT has increased the level of competition and forced
them to integrate the new technologies in order to
satisfy their customers. They have already developed
and implemented a certain number of solutions
among them for safety of banking system and for
customers transactions .
Some of them are :
• Self-inquiry facility
• Remote banking
• Anytime banking- Anywhere banking
• Tele banking
• Electronic Banking
The technology used to provide this service is called
electronic data interchange (EDI)
49. Security of a customer's
financial information
PIN : Personal Identification Number
PIN represents a password, used for the login , it is
numeric password of mostly 4 digits .
mainly use for ATM s , debit cards , credit cards
TAN : Transaction Authentication Number
TANs representing one-time passwords to authenticate
transactions.
• Signature based online banking
where all transactions are signed and encrypted
digitally. The Keys for the signature generation and
encryption can be stored on smartcards or any memory
medium, depending on the concrete implementation
50. Secure Electronic Transaction (SET)
• Secure Electronic Transaction (SET) software system, the
global standard for secure card payments on the Internet,
which is defined by various international companies
such as Visa MasterCard,
• IBM, Microsoft, Netscape Communications Corp., GTE,
SAIC, Terisa Systems and Verisign. SET promises to
secure bank-card transactions online. Lockhart, CEO of
MasterCard said, “ …We are glad to work with Visa and
all of the technology partners to craft SET. This action
means that consumers will be able to use their bank cards
to conduct transactions in cyberspace as securely and
easily as they use cards in retail stores today.
51. Internet banking security
The security of the Bank Internet banking
application is addressed at three levels.
• The first concern is the security of customer
information as it is sent from the customer's
PC to the Web server.
• The second area concerns the security of the
environment in which the Internet banking
server and customer information database
reside.
• Finally, security measures are in place to
prevent unauthorized users from attempting
to log into the online banking section of the
Web site.
52. How Encryption Protects You
• The privacy of the communications
between you (your browser) and
our servers is ensured using
encryption. Encryption scrambles
messages exchanged between your
browser and our online banking
server.
53. QUESTIONS
• What are the basic features you find in any
women safety app.? what other features
would you suggest that will improve such
apps?
• What is the full form of GIS,GPS and CAD?
• How can we access GIS ?
• What is the full form of TAN / PIN ?
• What are the facilities provide by banking
system for safety of customer’s transaction ?