SlideShare ist ein Scribd-Unternehmen logo
1 von 54
o Defence and Security is, by definition, an extended eco-
system in which civil and military, public and private
sector bodies must work together as a single team.
Although it is the framework for the collaboration on
which much of this activity depends, foundation IT
does tend to slip into the background.
• With the march of technology, the field of operations
for Defence and Security organizations is changing
rapidly. The civil and military use of drones is a real
example of how technology changes the landscape.
Within hours, an apparently minor incident can echo
round the world in this new globalized Defence and
Security environment.
Right from designing to testing of arms, other equipment etc
computers are used. Besides that almost all of the modern
weapons and other defense equipments involve computers
for their proper functioning.
Besides that managing database of employees and all other
administration work also involves usage of computers.
Computers are ubiquitous, in which way defence is exempt ?
All activities in civilian side are replicated in defence services
(and ministry) also. Biggest and high-value user is Defence
Research & Development Organisation which was once
headed by Dr. Abdul Kalam.
Applications
1 - Unified Communications
Training is continuous in the armed forces – nobody can afford to stop
learning – the threats are, after all,in constant evolution.Unified
communications add real value in training,bringing informed expertise
to the learner no matter howremote the location.
2 - Adaptive Workplace
From fixed-location administrative positions to highly-mobile active units,
the Defence and Security sectorsrequire dynamic and highly varied IT
workplaces.
3 - IT Support
Most infantry soldiers are in their early twenties:these are young people
who have grown up with gaming and the internet. When they require IT
support, they are used to self-service and peer-to-peer approaches.
4-Application Testing
Our Defence and Security services have always lead the way as
catalysts for innovation. With the advent of cyber-security, this
leadership continues. New applications are needed to help
identify and counter new threats.
5- Smart Mobility
The history of Defence and Security is the history of positioning
resources in the right place at the right time. Today, for both
people and materiel,the sophistication of positioning
technology has changed the rules.
6- Data Center Rationalization
The Defence and Security services face particular challenges
in data center management. On the one hand, the
pressure is on to boost shared services. On the
other, access control must be managed with absolute
rigor.
7-Real-time Workflow
Intelligence services today are bombarded with
information. Correlating multiple streams of data
to create usable intelligence viewpoints becomes a critical
capability.
Other Applications in Defence
 Controlling UAV or unmannedair-crafts an example is Predator. I
would recommend watchingthe shows " Future Weapons" and "
Modern Marvles". The show future weapons gives an entire hour to
the predator.
 They are also used on Intercontinental Ballistic Missiles (ICBMs) that
uses GPS and Computers to help the missile get weapons systems
onto the incoming target to destroy them.
 Computers are used in the logistic and ordering functions of getting
equipments to and around the battlefield.
 Computers are used to hold records of personnel and very usefulin
field hospitals.
 Computers are used in tanks and planes and ships to target enemy
forces, help run the platform and more recently to help diagnose
anyproblems with the platforms.
• Information Technology (IT) provides new ways for
providers and their patients to readily access and use
health information. Information Technology (IT)
allows health care providers to collect, store, retrieve,
transfer, information electronically.
• Information Technology (IT) has the potential to
improve the quality, safety and efficiency of health
care.
• Information Technology (IT) enables faster, more
accurate diagnosis of disease. Using IT, clinicians can
assemble data about all aspects of patients care,
consult with specialists remotely and get evaluation
of lab data and images by specialists around the
world in real time.
we have CCTV security systems, alarms to protect
hospitals against potential threats. CCTVs help
monitoring people moving through an area and
reporting that an object has been removed or
left behind.
• information technology plays a very important
role in keeping the hospital information secured
by not allowing unauthorized users to access .
• Electronic processing of care providers and insurance
companies speeds up the approval of claims and
payments to clinicians.
• Diagnosing and treating illness require the patient’s
medical and treatment history to be available for anyone
who sees a particular patient. EHRs save clinicians time by
not having to search for information or duplicate it in
multiple locations.
• Social media outlets allow patients with specific diseases
to share information about specific treatments and
outcomes with one another and with clinicians. As the
data sets at social media sites grow, they have increasing
clinical value for research
ROLE OF I.T. IN
DISASTER MANAGEMENT
Advancement in Information Technology in the
form of :-
 G.I.S.,
 REMOTE SENSING,
 INTERNET,
 SATELLITE COMMUNICATION, etc.
help in planning and implementation of emergency
preparedness and response action.
A geographic information system lets us visualize, question,
analyse, interpret, and understand data to reveal relationships,
patterns, and trend.
• Improve quality and power of analysis of natural hazards
assessments.
• Guide development activities, e.g., proper geographical area
for construction.
• Assist disaster planning by issuing regular reports.
G.I.S.
(Geographic Information System)
.
An example of use of layers in an GIS application.
G.I.S. Image : showing the probability
of an EARTHQUAKE
A picture depicting flood prone areas
in Orissa.
( through G.I.S. Technology )
Remote Sensing refers to the technology of acquiring
Information about the Earth's surface and atmosphere using
sensors on-board air crafts, balloons, satellites, space shuttles
or
other platforms.
• Helps in identifying hazardous areas.
• It identify the changes occurring in atmosphere.
• Thus, helps in providing early warnings for impending
disasters.
REMOTE SENSING
An example of how Remote Sensing
Technology works.
Remote sensors visualizing the effects of
global warming.
 Advance system of forecasting, monitoring and
issuing early warning signals through T.V., radio,
internet, etc.
 At the time of communication failure, internet is the
only effective way to communicate.
 It can be used to locate missing persons, joining
families, donor contribution.
 Nowadays, social media is an effective way for relief
measures like appeal for donations, etc.
 It helps to spread disaster management awareness
through information technology.
INTERNET & COMMUNICATION
[Backbone for all technologies]
Use of I.T. Tools to spread awareness of
disaster management.
Use of social media as disaster relief
measures.
Early Warning Signals System.
 Satellite data is used to target potential ground water
sites.
 A database of different atmospheric conditions from
time to time is build to have better disaster
forecasting.
 Helps in the preparation of seismic hazards maps in
order to trace earthquake prone areas.
 GIS can be used in carrying out search and rescue
operations in a more efficient way
OTHER FUNCTIONS :-
Functions of I.T. to prevent and
recover from disaster.
Risk Reduction Mitigation and
Prevention
Response Recovery
GIS √√√ √√√ √
Internet √√ √√ √√ √√√
Mobile
(voice) √√√ √√√
Mobile
(non-voice) √√√ √√√
Satellite
Communication √√√ √√√ √√√ √√√
Social Networking
√ √√√
TV, Radio √√√ √√√
Use of different technologies for
disaster management
IT AND WOMEN SAFETY
1) ICE- Mumbai Police
The recent gang rape in Mumbai has taken off the comforting
blanket of women’s safety from Mumbai. In an attempt to curb the
onslaught of violence against women, The Mumbai Police has
developed an android App called ICE- ‘In Case of Emergency’.
Key features
• Multilingual app- available in English, Hindi, Marathi
• Send SOS message in one touch
• Tips of personal and cyber safety
• Access to guidelines for disaster preparations, first aid, police,
ambulance numbers
• Find the nearest hospitals automatically based on your GPS
location. Also, search for hospitals across major cities in the country
• Store critical information useful during emergency such as
Contact details of Family members, Doctors and SOS contacts,
Current and past medication, Blood group, Allergies etc
Advantages
• Easy to Use
Disadvantages
• Huge storage space of 10.46 MB required
2) VithU – Channel V
Crime against women have prodded Channel [V] to take initiative
and develop an App with an eye on Woman’s safety.
Key features
• A message, along with the location details is sent to pre-loaded
contacts on tapping the Power icon on the screen twice.
• The App also sends out general updates on the Crime Scene in
India.
• An option ‘Tips Feed’ gives safety tips in case of emergency
situations.
• There is an alert option for the Crime Show Gumrah that sends a
reminder to watch it when it is aired.
Advantages
• Quick & Discreet
Disadvantages
• GPS & Internet needs to be turned ON always for tracking
location. This will drain battery faster.
• The Panic button could be triggered by mistake also.
• Accessible only on high end Android phone.
3) Bachao
Three women- Chinmayee S K, Ankita Herurkar, and Sanik
Sahasrabuddhe- have decided to take a bat for woman’s
safety. They developed ‘Bachchao’- an Android App
designed to trigger SOS alert in case of emergency.
Key Features
• Location Coordinates can be sent to preloaded contacts
by pressing a red button in the app.
• The app supports video recording which can act as digital
witness.
• The alarm SMS can be read even in the most basic of
phones.
• There is provision to update your family of your location
on an hourly basis.
Advantages
• Less Storage Space required and easy to use.
Disadvantages
• Available only in android as of now.
4) iFollow-Ladies safety
Developed by Aucupa Innovative Solutions, this App is
one of the ‘Nasscom sponsored ‘FameApp contest’
award winning safety app and is available for both
android and Apple smart phones.
Key Features
• Victim has to shake the phone thrice in a span of five
seconds and a call is placed to the first contact person
stored.
• If he/she doesn’t respond to the call iFollow will
shoot an SMS along with your geographical location to
select personal contacts (max 3).
• After the first message, on every ten meters change
in location, the app will send SOS distress message
with new location details
Advantages
• Consumes less power and CPU usage.
Disadvantages
• This app will fail in case of zero balance.
5) Google Latitude determines your actual
position (only if your GPRS is ON) and lets you
add your friends to the network. Make sure
you’ve added few friends who are tech savvy
and understand the usage of Google Latitude.
If you’re venturing out on a slightly unsafe
route (i/e if it’s important and unavoidable) or
if you’re stepping out or going back home late
night; make sure you ask them to keep a check
on you through it.
6) Computer Aided Dispatch (CAD) is an emergency
response system for women who may face violence. It is an
integrated system using Geographical Information System
(GIS) based call-taking and Geographical Positioning System
(GPS) based police vehicle dispatch system. This system will
ensure a rapid response to distress calls and ensure a
speedy assistance to women.
7) FIGHTBACK, India’s first Mobile Application for Women
Safety. Powered by CanvasM , FightBack, the women’s
safety application, sends SOS alerts from your phone.
FightBack uses GPS, SMS, location maps, GPRS ,email and
your Facebook account to inform your loved ones in case
you are in danger. The app is available on
iPhone, Android, Black Berry, Windows
8)Circle of 6 is designed mainly for college students. The
app is also useful for high school students or any
female who wants an easy-to-use system to alert
friends when she’s in a threatening situation. The app
is also available in Hindi and the Delhi women’s hotline
number is built in.
9)Scream Alarm! This is a FREE safety alarm that does
only one thing: push the button for making the phone
scream loudly with a woman’s voice! Perfect for
females that need some kind of safety alarm.Have the
app on, and instantly push the button if you feel
threatened! It is available on Android.
10)She Taxi, the 24X7 taxi service operated by women for women
travellers has been designed to ensure a safe and reliable mode of
transport for women as well as to encourage entrepreneurship and self-
employment among women.
• Travellers can book the cab via online or mobile on a 24X7 basis.
• . The traveller will have the option to make payment via cash, debit card or
credit card.Various other features such as refreshment mini bar and
entertainment facilities including music, play stations are also provided in
the cabs.
• The cab, designed and integrated with Global Positioning system(GPS) will
enable to monitor and track the activities of the traveller as well as the
driver and will facilitate immediate aid in case of any emergency situation.
• Safe Bus, Safe Me, Safe Me Mobile and Safe City Response Ecosystem are
the major safety offering technologies used in She Taxi service.
11) Amrita Personal Safety System. (APSS )is an inconspicuous,
wearable device that empowers women to secretly trigger
communication with family and police when in distress. Button- and
voice-activated, the device can record conversations and
communicate immediately via text-message and voice calls to
multiple predetermined destinations. It also supplies its wearer
with automated information regarding the nearest police stations,
hospitals and fire-stations.
• The device is designed to function even in rural areas over low-
speed data connections.
• The device is designed to provide flexibility and choices for the
wearer. Women will be able to wear it either on the waist or on a
necklace, with multiple remote-activation capabilities, including a
separate activation device to be embedded in an earring studs.
12) The Delhi Multimodal Transport System (DIMTS)
has come out with “Telltail”, a security
application on android and smartphones
• Telltail, will help the user raise a security alert
by contacting the police, friends and family
simultaneously. The application will also provide
visual tracking information of the user.
• The application will have three button options
— “Track Me,” “Track By Vehicle” and “Panic
Button” — by clicking which the user will reach
her primary contacts within seconds.
13)The stun gun
This small gun charges an attacker with an
electric shock. The shock weakens the attacker
temporarily, giving you ample chance to escape
the scene. When its trigger is pulled, a stun gun
pumps about 700,000 volts into the attacker’s
body. Some stun guns are small enough to be
concealed in a pack of cigarettes. They run on
Lithium batteries and can be carried either in
handbags or held in waist straps.
14) The stun rings
• A stun ring is an attractive ring that looks
elegant and can pass for fashion ring. But
more importantly, it offers safety and
instills confidence. The ring contains
pepper spray, and it protects you in times
of attack, rape, violence and crisis.
15) The lightning strike personal
protection device
• This torch-like device was originally
developed for use by police officers, but
many civilians now use it as well. It
protects you by shortly blinding and
disorienting the attacker – thanks to the
several lumens of strong white light
produced by the LEDs in the device. The
lightning strike device is light and small;
you can carry it even while jogging.
16)The TASER device
• This personal protection device can stun an attacker
from a distance of about 15 feet away. Yet, it doubles
as a powerful contact stun device. The device is very
easy to use because hitting it anywhere on the
attacker’s body will render him incapacitated. This is
quite unlike pepper sprays and other self-defense
devices, all of which must be targeted directly at the
assailant’s face for any effect to be produced.
IT IN BANKING SAFETY
.
IT has increased the level of competition and forced
them to integrate the new technologies in order to
satisfy their customers. They have already developed
and implemented a certain number of solutions
among them for safety of banking system and for
customers transactions .
Some of them are :
• Self-inquiry facility
• Remote banking
• Anytime banking- Anywhere banking
• Tele banking
• Electronic Banking
The technology used to provide this service is called
electronic data interchange (EDI)
Security of a customer's
financial information
PIN : Personal Identification Number
PIN represents a password, used for the login , it is
numeric password of mostly 4 digits .
mainly use for ATM s , debit cards , credit cards
TAN : Transaction Authentication Number
TANs representing one-time passwords to authenticate
transactions.
• Signature based online banking
where all transactions are signed and encrypted
digitally. The Keys for the signature generation and
encryption can be stored on smartcards or any memory
medium, depending on the concrete implementation
Secure Electronic Transaction (SET)
• Secure Electronic Transaction (SET) software system, the
global standard for secure card payments on the Internet,
which is defined by various international companies
such as Visa MasterCard,
• IBM, Microsoft, Netscape Communications Corp., GTE,
SAIC, Terisa Systems and Verisign. SET promises to
secure bank-card transactions online. Lockhart, CEO of
MasterCard said, “ …We are glad to work with Visa and
all of the technology partners to craft SET. This action
means that consumers will be able to use their bank cards
to conduct transactions in cyberspace as securely and
easily as they use cards in retail stores today.
Internet banking security
The security of the Bank Internet banking
application is addressed at three levels.
• The first concern is the security of customer
information as it is sent from the customer's
PC to the Web server.
• The second area concerns the security of the
environment in which the Internet banking
server and customer information database
reside.
• Finally, security measures are in place to
prevent unauthorized users from attempting
to log into the online banking section of the
Web site.
How Encryption Protects You
• The privacy of the communications
between you (your browser) and
our servers is ensured using
encryption. Encryption scrambles
messages exchanged between your
browser and our online banking
server.
QUESTIONS
• What are the basic features you find in any
women safety app.? what other features
would you suggest that will improve such
apps?
• What is the full form of GIS,GPS and CAD?
• How can we access GIS ?
• What is the full form of TAN / PIN ?
• What are the facilities provide by banking
system for safety of customer’s transaction ?
It and safety

Weitere ähnliche Inhalte

Was ist angesagt?

Leveraging technology in disaster management
Leveraging technology in disaster managementLeveraging technology in disaster management
Leveraging technology in disaster managementDhananjay Singh
 
Autonomous drones against covid 19
Autonomous drones against covid 19Autonomous drones against covid 19
Autonomous drones against covid 19Aboul Ella Hassanien
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveDawn Nash Pfeiffer
 
Autonomous systems and its applications for covid 19
Autonomous systems and its applications for covid 19Autonomous systems and its applications for covid 19
Autonomous systems and its applications for covid 19Aboul Ella Hassanien
 
Networking smartphones for disaster recovery using teamphone
Networking smartphones for disaster recovery using teamphoneNetworking smartphones for disaster recovery using teamphone
Networking smartphones for disaster recovery using teamphoneIJARIIT
 
The Future of mHealth - Jay Srini - March 2011
The Future of mHealth - Jay Srini - March 2011The Future of mHealth - Jay Srini - March 2011
The Future of mHealth - Jay Srini - March 2011LifeWIRE Corp
 
Module 9 ict for disaster preparedness
Module 9   ict for disaster preparednessModule 9   ict for disaster preparedness
Module 9 ict for disaster preparednessunapcict
 
Information Technology in Pandemic
Information Technology in PandemicInformation Technology in Pandemic
Information Technology in PandemicSwati Karn
 
Webinar 20111011
Webinar 20111011Webinar 20111011
Webinar 20111011Retired
 
communication's application in medical field
communication's application in medical fieldcommunication's application in medical field
communication's application in medical fieldSharanjit Kaur
 
Camera surveilance 7 seminar salman
Camera surveilance 7 seminar salmanCamera surveilance 7 seminar salman
Camera surveilance 7 seminar salmanRameez Raja
 
Communication Technology in the Medical Field in 2025
Communication Technology in the Medical Field in 2025Communication Technology in the Medical Field in 2025
Communication Technology in the Medical Field in 2025jsscot07
 
500 13031111 r1-_gsc_tf_report_on_emergency_communications_v012_rev5
500 13031111 r1-_gsc_tf_report_on_emergency_communications_v012_rev5500 13031111 r1-_gsc_tf_report_on_emergency_communications_v012_rev5
500 13031111 r1-_gsc_tf_report_on_emergency_communications_v012_rev5gulangyu9521
 

Was ist angesagt? (13)

Leveraging technology in disaster management
Leveraging technology in disaster managementLeveraging technology in disaster management
Leveraging technology in disaster management
 
Autonomous drones against covid 19
Autonomous drones against covid 19Autonomous drones against covid 19
Autonomous drones against covid 19
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator Perspective
 
Autonomous systems and its applications for covid 19
Autonomous systems and its applications for covid 19Autonomous systems and its applications for covid 19
Autonomous systems and its applications for covid 19
 
Networking smartphones for disaster recovery using teamphone
Networking smartphones for disaster recovery using teamphoneNetworking smartphones for disaster recovery using teamphone
Networking smartphones for disaster recovery using teamphone
 
The Future of mHealth - Jay Srini - March 2011
The Future of mHealth - Jay Srini - March 2011The Future of mHealth - Jay Srini - March 2011
The Future of mHealth - Jay Srini - March 2011
 
Module 9 ict for disaster preparedness
Module 9   ict for disaster preparednessModule 9   ict for disaster preparedness
Module 9 ict for disaster preparedness
 
Information Technology in Pandemic
Information Technology in PandemicInformation Technology in Pandemic
Information Technology in Pandemic
 
Webinar 20111011
Webinar 20111011Webinar 20111011
Webinar 20111011
 
communication's application in medical field
communication's application in medical fieldcommunication's application in medical field
communication's application in medical field
 
Camera surveilance 7 seminar salman
Camera surveilance 7 seminar salmanCamera surveilance 7 seminar salman
Camera surveilance 7 seminar salman
 
Communication Technology in the Medical Field in 2025
Communication Technology in the Medical Field in 2025Communication Technology in the Medical Field in 2025
Communication Technology in the Medical Field in 2025
 
500 13031111 r1-_gsc_tf_report_on_emergency_communications_v012_rev5
500 13031111 r1-_gsc_tf_report_on_emergency_communications_v012_rev5500 13031111 r1-_gsc_tf_report_on_emergency_communications_v012_rev5
500 13031111 r1-_gsc_tf_report_on_emergency_communications_v012_rev5
 

Andere mochten auch

Radioisotopes : Properties
Radioisotopes : PropertiesRadioisotopes : Properties
Radioisotopes : PropertiesAman Verma
 
Land acquisition
Land acquisitionLand acquisition
Land acquisitionAman Verma
 
20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_Light20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_LightVincent Lebunetel
 
Dentistry @ Its Finest
Dentistry @ Its FinestDentistry @ Its Finest
Dentistry @ Its FinestMichael Ayzin
 
Com346 grossology case presentation
Com346 grossology case presentationCom346 grossology case presentation
Com346 grossology case presentationWeston Suggs
 
Magfúzió
MagfúzióMagfúzió
Magfúziótaxy223
 
Matura2014 liceum plastyczne_koszalin
Matura2014 liceum plastyczne_koszalinMatura2014 liceum plastyczne_koszalin
Matura2014 liceum plastyczne_koszalinplastyk
 
GSM fundamentals
GSM fundamentalsGSM fundamentals
GSM fundamentalstushar05
 
Com346 grossology case presentation
Com346 grossology case presentationCom346 grossology case presentation
Com346 grossology case presentationWeston Suggs
 
Essay 3 sergei eisenstein cinematic principle & ideogram
Essay 3 sergei eisenstein cinematic principle & ideogramEssay 3 sergei eisenstein cinematic principle & ideogram
Essay 3 sergei eisenstein cinematic principle & ideogramRyan Wariki
 
For Sidney Bechet
For Sidney BechetFor Sidney Bechet
For Sidney Bechetnaomil16
 
Vinayak company & product introduction
Vinayak company & product introductionVinayak company & product introduction
Vinayak company & product introductionKishor S
 

Andere mochten auch (20)

Radioisotopes : Properties
Radioisotopes : PropertiesRadioisotopes : Properties
Radioisotopes : Properties
 
Land acquisition
Land acquisitionLand acquisition
Land acquisition
 
20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_Light20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_Light
 
Coad slide show
Coad slide showCoad slide show
Coad slide show
 
Обзор C# WPF MVVM
Обзор C# WPF MVVMОбзор C# WPF MVVM
Обзор C# WPF MVVM
 
Dentistry @ Its Finest
Dentistry @ Its FinestDentistry @ Its Finest
Dentistry @ Its Finest
 
Haykinver4
Haykinver4 Haykinver4
Haykinver4
 
Com346 grossology case presentation
Com346 grossology case presentationCom346 grossology case presentation
Com346 grossology case presentation
 
Algorithmiin shinjilgee
Algorithmiin shinjilgeeAlgorithmiin shinjilgee
Algorithmiin shinjilgee
 
51asd
51asd51asd
51asd
 
Magfúzió
MagfúzióMagfúzió
Magfúzió
 
001cclass 120926194905-phpapp02
001cclass 120926194905-phpapp02001cclass 120926194905-phpapp02
001cclass 120926194905-phpapp02
 
Matura2014 liceum plastyczne_koszalin
Matura2014 liceum plastyczne_koszalinMatura2014 liceum plastyczne_koszalin
Matura2014 liceum plastyczne_koszalin
 
GSM fundamentals
GSM fundamentalsGSM fundamentals
GSM fundamentals
 
Com346 grossology case presentation
Com346 grossology case presentationCom346 grossology case presentation
Com346 grossology case presentation
 
Essay 3 sergei eisenstein cinematic principle & ideogram
Essay 3 sergei eisenstein cinematic principle & ideogramEssay 3 sergei eisenstein cinematic principle & ideogram
Essay 3 sergei eisenstein cinematic principle & ideogram
 
I&E- Phone
I&E- PhoneI&E- Phone
I&E- Phone
 
For Sidney Bechet
For Sidney BechetFor Sidney Bechet
For Sidney Bechet
 
Vinayak company & product introduction
Vinayak company & product introductionVinayak company & product introduction
Vinayak company & product introduction
 
Resolution/coda
Resolution/codaResolution/coda
Resolution/coda
 

Ähnlich wie It and safety

Clout efforts-in-reaching-the-17th-and-169th-sdg-goals-by-2030
Clout efforts-in-reaching-the-17th-and-169th-sdg-goals-by-2030Clout efforts-in-reaching-the-17th-and-169th-sdg-goals-by-2030
Clout efforts-in-reaching-the-17th-and-169th-sdg-goals-by-2030Assem mousa
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxbagotjesusa
 
Next generation architecture examination for Mass Notification System(MNS) co...
Next generation architecture examination for Mass Notification System(MNS) co...Next generation architecture examination for Mass Notification System(MNS) co...
Next generation architecture examination for Mass Notification System(MNS) co...IJERA Editor
 
Running Head INTERNET TECHNOLOGY AND ITS UESES IN VARIOUS AREAS .docx
Running Head INTERNET TECHNOLOGY AND ITS UESES IN VARIOUS AREAS  .docxRunning Head INTERNET TECHNOLOGY AND ITS UESES IN VARIOUS AREAS  .docx
Running Head INTERNET TECHNOLOGY AND ITS UESES IN VARIOUS AREAS .docxcharisellington63520
 
IRJET- Virtual Assistant for Medical Emergency
IRJET-  	  Virtual Assistant for Medical EmergencyIRJET-  	  Virtual Assistant for Medical Emergency
IRJET- Virtual Assistant for Medical EmergencyIRJET Journal
 
Role of ICT (information communication technology) in disaster management.pdf
Role of ICT (information communication technology) in disaster management.pdfRole of ICT (information communication technology) in disaster management.pdf
Role of ICT (information communication technology) in disaster management.pdfharsh519504
 
Crisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareCrisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareI-Pix Technologies
 
Universal adoption of clout tech in fighting coronavirus spreading in the ent...
Universal adoption of clout tech in fighting coronavirus spreading in the ent...Universal adoption of clout tech in fighting coronavirus spreading in the ent...
Universal adoption of clout tech in fighting coronavirus spreading in the ent...Assem mousa
 
Common Alerting Protocol Overview
Common Alerting Protocol OverviewCommon Alerting Protocol Overview
Common Alerting Protocol OverviewNuwan Waidyanatha
 
Accessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsAccessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsIJARIIT
 
Smart ICT extended
Smart ICT extendedSmart ICT extended
Smart ICT extendedTzar Umang
 
CYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOURCYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOURDr. Sushma H.B
 
Design and Implementation of Smart Monitoring Systems in Hospital Wagon using...
Design and Implementation of Smart Monitoring Systems in Hospital Wagon using...Design and Implementation of Smart Monitoring Systems in Hospital Wagon using...
Design and Implementation of Smart Monitoring Systems in Hospital Wagon using...ijtsrd
 
Technology evolutions in disaster medicine - Crisis Response Journal
Technology evolutions in disaster medicine - Crisis Response JournalTechnology evolutions in disaster medicine - Crisis Response Journal
Technology evolutions in disaster medicine - Crisis Response JournalEmily Hough
 
Cloud Computing: A Key to Effective & Efficient Disease Surveillance System
Cloud Computing: A Key to Effective & Efficient Disease Surveillance SystemCloud Computing: A Key to Effective & Efficient Disease Surveillance System
Cloud Computing: A Key to Effective & Efficient Disease Surveillance Systemidescitation
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
IRJET - Blockchain for Medical Data Access and Permission Management
IRJET - Blockchain for Medical Data Access and Permission ManagementIRJET - Blockchain for Medical Data Access and Permission Management
IRJET - Blockchain for Medical Data Access and Permission ManagementIRJET Journal
 

Ähnlich wie It and safety (20)

Clout efforts-in-reaching-the-17th-and-169th-sdg-goals-by-2030
Clout efforts-in-reaching-the-17th-and-169th-sdg-goals-by-2030Clout efforts-in-reaching-the-17th-and-169th-sdg-goals-by-2030
Clout efforts-in-reaching-the-17th-and-169th-sdg-goals-by-2030
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
 
Next generation architecture examination for Mass Notification System(MNS) co...
Next generation architecture examination for Mass Notification System(MNS) co...Next generation architecture examination for Mass Notification System(MNS) co...
Next generation architecture examination for Mass Notification System(MNS) co...
 
Running Head INTERNET TECHNOLOGY AND ITS UESES IN VARIOUS AREAS .docx
Running Head INTERNET TECHNOLOGY AND ITS UESES IN VARIOUS AREAS  .docxRunning Head INTERNET TECHNOLOGY AND ITS UESES IN VARIOUS AREAS  .docx
Running Head INTERNET TECHNOLOGY AND ITS UESES IN VARIOUS AREAS .docx
 
IRJET- Virtual Assistant for Medical Emergency
IRJET-  	  Virtual Assistant for Medical EmergencyIRJET-  	  Virtual Assistant for Medical Emergency
IRJET- Virtual Assistant for Medical Emergency
 
Role of ICT (information communication technology) in disaster management.pdf
Role of ICT (information communication technology) in disaster management.pdfRole of ICT (information communication technology) in disaster management.pdf
Role of ICT (information communication technology) in disaster management.pdf
 
Fast and fire-walled IOT healthcare-Baseer
Fast and fire-walled  IOT healthcare-BaseerFast and fire-walled  IOT healthcare-Baseer
Fast and fire-walled IOT healthcare-Baseer
 
Crisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareCrisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced Software
 
Universal adoption of clout tech in fighting coronavirus spreading in the ent...
Universal adoption of clout tech in fighting coronavirus spreading in the ent...Universal adoption of clout tech in fighting coronavirus spreading in the ent...
Universal adoption of clout tech in fighting coronavirus spreading in the ent...
 
Common Alerting Protocol Overview
Common Alerting Protocol OverviewCommon Alerting Protocol Overview
Common Alerting Protocol Overview
 
Accessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsAccessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of Things
 
Smart ICT extended
Smart ICT extendedSmart ICT extended
Smart ICT extended
 
CYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOURCYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOUR
 
Design and Implementation of Smart Monitoring Systems in Hospital Wagon using...
Design and Implementation of Smart Monitoring Systems in Hospital Wagon using...Design and Implementation of Smart Monitoring Systems in Hospital Wagon using...
Design and Implementation of Smart Monitoring Systems in Hospital Wagon using...
 
Technology evolutions in disaster medicine - Crisis Response Journal
Technology evolutions in disaster medicine - Crisis Response JournalTechnology evolutions in disaster medicine - Crisis Response Journal
Technology evolutions in disaster medicine - Crisis Response Journal
 
IoT
IoTIoT
IoT
 
Cloud Computing: A Key to Effective & Efficient Disease Surveillance System
Cloud Computing: A Key to Effective & Efficient Disease Surveillance SystemCloud Computing: A Key to Effective & Efficient Disease Surveillance System
Cloud Computing: A Key to Effective & Efficient Disease Surveillance System
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Apictpaper
ApictpaperApictpaper
Apictpaper
 
IRJET - Blockchain for Medical Data Access and Permission Management
IRJET - Blockchain for Medical Data Access and Permission ManagementIRJET - Blockchain for Medical Data Access and Permission Management
IRJET - Blockchain for Medical Data Access and Permission Management
 

Kürzlich hochgeladen

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 

Kürzlich hochgeladen (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

It and safety

  • 1.
  • 2.
  • 3. o Defence and Security is, by definition, an extended eco- system in which civil and military, public and private sector bodies must work together as a single team. Although it is the framework for the collaboration on which much of this activity depends, foundation IT does tend to slip into the background. • With the march of technology, the field of operations for Defence and Security organizations is changing rapidly. The civil and military use of drones is a real example of how technology changes the landscape. Within hours, an apparently minor incident can echo round the world in this new globalized Defence and Security environment.
  • 4.
  • 5. Right from designing to testing of arms, other equipment etc computers are used. Besides that almost all of the modern weapons and other defense equipments involve computers for their proper functioning. Besides that managing database of employees and all other administration work also involves usage of computers. Computers are ubiquitous, in which way defence is exempt ? All activities in civilian side are replicated in defence services (and ministry) also. Biggest and high-value user is Defence Research & Development Organisation which was once headed by Dr. Abdul Kalam.
  • 6. Applications 1 - Unified Communications Training is continuous in the armed forces – nobody can afford to stop learning – the threats are, after all,in constant evolution.Unified communications add real value in training,bringing informed expertise to the learner no matter howremote the location. 2 - Adaptive Workplace From fixed-location administrative positions to highly-mobile active units, the Defence and Security sectorsrequire dynamic and highly varied IT workplaces. 3 - IT Support Most infantry soldiers are in their early twenties:these are young people who have grown up with gaming and the internet. When they require IT support, they are used to self-service and peer-to-peer approaches.
  • 7. 4-Application Testing Our Defence and Security services have always lead the way as catalysts for innovation. With the advent of cyber-security, this leadership continues. New applications are needed to help identify and counter new threats. 5- Smart Mobility The history of Defence and Security is the history of positioning resources in the right place at the right time. Today, for both people and materiel,the sophistication of positioning technology has changed the rules.
  • 8. 6- Data Center Rationalization The Defence and Security services face particular challenges in data center management. On the one hand, the pressure is on to boost shared services. On the other, access control must be managed with absolute rigor. 7-Real-time Workflow Intelligence services today are bombarded with information. Correlating multiple streams of data to create usable intelligence viewpoints becomes a critical capability.
  • 9. Other Applications in Defence  Controlling UAV or unmannedair-crafts an example is Predator. I would recommend watchingthe shows " Future Weapons" and " Modern Marvles". The show future weapons gives an entire hour to the predator.  They are also used on Intercontinental Ballistic Missiles (ICBMs) that uses GPS and Computers to help the missile get weapons systems onto the incoming target to destroy them.  Computers are used in the logistic and ordering functions of getting equipments to and around the battlefield.  Computers are used to hold records of personnel and very usefulin field hospitals.  Computers are used in tanks and planes and ships to target enemy forces, help run the platform and more recently to help diagnose anyproblems with the platforms.
  • 10.
  • 11.
  • 12. • Information Technology (IT) provides new ways for providers and their patients to readily access and use health information. Information Technology (IT) allows health care providers to collect, store, retrieve, transfer, information electronically. • Information Technology (IT) has the potential to improve the quality, safety and efficiency of health care. • Information Technology (IT) enables faster, more accurate diagnosis of disease. Using IT, clinicians can assemble data about all aspects of patients care, consult with specialists remotely and get evaluation of lab data and images by specialists around the world in real time.
  • 13. we have CCTV security systems, alarms to protect hospitals against potential threats. CCTVs help monitoring people moving through an area and reporting that an object has been removed or left behind. • information technology plays a very important role in keeping the hospital information secured by not allowing unauthorized users to access .
  • 14. • Electronic processing of care providers and insurance companies speeds up the approval of claims and payments to clinicians. • Diagnosing and treating illness require the patient’s medical and treatment history to be available for anyone who sees a particular patient. EHRs save clinicians time by not having to search for information or duplicate it in multiple locations. • Social media outlets allow patients with specific diseases to share information about specific treatments and outcomes with one another and with clinicians. As the data sets at social media sites grow, they have increasing clinical value for research
  • 15. ROLE OF I.T. IN DISASTER MANAGEMENT
  • 16. Advancement in Information Technology in the form of :-  G.I.S.,  REMOTE SENSING,  INTERNET,  SATELLITE COMMUNICATION, etc. help in planning and implementation of emergency preparedness and response action.
  • 17. A geographic information system lets us visualize, question, analyse, interpret, and understand data to reveal relationships, patterns, and trend. • Improve quality and power of analysis of natural hazards assessments. • Guide development activities, e.g., proper geographical area for construction. • Assist disaster planning by issuing regular reports. G.I.S. (Geographic Information System) .
  • 18. An example of use of layers in an GIS application.
  • 19. G.I.S. Image : showing the probability of an EARTHQUAKE
  • 20. A picture depicting flood prone areas in Orissa. ( through G.I.S. Technology )
  • 21. Remote Sensing refers to the technology of acquiring Information about the Earth's surface and atmosphere using sensors on-board air crafts, balloons, satellites, space shuttles or other platforms. • Helps in identifying hazardous areas. • It identify the changes occurring in atmosphere. • Thus, helps in providing early warnings for impending disasters. REMOTE SENSING
  • 22. An example of how Remote Sensing Technology works.
  • 23.
  • 24. Remote sensors visualizing the effects of global warming.
  • 25.  Advance system of forecasting, monitoring and issuing early warning signals through T.V., radio, internet, etc.  At the time of communication failure, internet is the only effective way to communicate.  It can be used to locate missing persons, joining families, donor contribution.  Nowadays, social media is an effective way for relief measures like appeal for donations, etc.  It helps to spread disaster management awareness through information technology. INTERNET & COMMUNICATION [Backbone for all technologies]
  • 26. Use of I.T. Tools to spread awareness of disaster management.
  • 27. Use of social media as disaster relief measures.
  • 29.  Satellite data is used to target potential ground water sites.  A database of different atmospheric conditions from time to time is build to have better disaster forecasting.  Helps in the preparation of seismic hazards maps in order to trace earthquake prone areas.  GIS can be used in carrying out search and rescue operations in a more efficient way OTHER FUNCTIONS :-
  • 30. Functions of I.T. to prevent and recover from disaster.
  • 31. Risk Reduction Mitigation and Prevention Response Recovery GIS √√√ √√√ √ Internet √√ √√ √√ √√√ Mobile (voice) √√√ √√√ Mobile (non-voice) √√√ √√√ Satellite Communication √√√ √√√ √√√ √√√ Social Networking √ √√√ TV, Radio √√√ √√√ Use of different technologies for disaster management
  • 32. IT AND WOMEN SAFETY
  • 33.
  • 34. 1) ICE- Mumbai Police The recent gang rape in Mumbai has taken off the comforting blanket of women’s safety from Mumbai. In an attempt to curb the onslaught of violence against women, The Mumbai Police has developed an android App called ICE- ‘In Case of Emergency’. Key features • Multilingual app- available in English, Hindi, Marathi • Send SOS message in one touch • Tips of personal and cyber safety • Access to guidelines for disaster preparations, first aid, police, ambulance numbers • Find the nearest hospitals automatically based on your GPS location. Also, search for hospitals across major cities in the country • Store critical information useful during emergency such as Contact details of Family members, Doctors and SOS contacts, Current and past medication, Blood group, Allergies etc Advantages • Easy to Use Disadvantages • Huge storage space of 10.46 MB required
  • 35. 2) VithU – Channel V Crime against women have prodded Channel [V] to take initiative and develop an App with an eye on Woman’s safety. Key features • A message, along with the location details is sent to pre-loaded contacts on tapping the Power icon on the screen twice. • The App also sends out general updates on the Crime Scene in India. • An option ‘Tips Feed’ gives safety tips in case of emergency situations. • There is an alert option for the Crime Show Gumrah that sends a reminder to watch it when it is aired. Advantages • Quick & Discreet Disadvantages • GPS & Internet needs to be turned ON always for tracking location. This will drain battery faster. • The Panic button could be triggered by mistake also. • Accessible only on high end Android phone.
  • 36. 3) Bachao Three women- Chinmayee S K, Ankita Herurkar, and Sanik Sahasrabuddhe- have decided to take a bat for woman’s safety. They developed ‘Bachchao’- an Android App designed to trigger SOS alert in case of emergency. Key Features • Location Coordinates can be sent to preloaded contacts by pressing a red button in the app. • The app supports video recording which can act as digital witness. • The alarm SMS can be read even in the most basic of phones. • There is provision to update your family of your location on an hourly basis. Advantages • Less Storage Space required and easy to use. Disadvantages • Available only in android as of now.
  • 37. 4) iFollow-Ladies safety Developed by Aucupa Innovative Solutions, this App is one of the ‘Nasscom sponsored ‘FameApp contest’ award winning safety app and is available for both android and Apple smart phones. Key Features • Victim has to shake the phone thrice in a span of five seconds and a call is placed to the first contact person stored. • If he/she doesn’t respond to the call iFollow will shoot an SMS along with your geographical location to select personal contacts (max 3). • After the first message, on every ten meters change in location, the app will send SOS distress message with new location details Advantages • Consumes less power and CPU usage. Disadvantages • This app will fail in case of zero balance.
  • 38. 5) Google Latitude determines your actual position (only if your GPRS is ON) and lets you add your friends to the network. Make sure you’ve added few friends who are tech savvy and understand the usage of Google Latitude. If you’re venturing out on a slightly unsafe route (i/e if it’s important and unavoidable) or if you’re stepping out or going back home late night; make sure you ask them to keep a check on you through it.
  • 39. 6) Computer Aided Dispatch (CAD) is an emergency response system for women who may face violence. It is an integrated system using Geographical Information System (GIS) based call-taking and Geographical Positioning System (GPS) based police vehicle dispatch system. This system will ensure a rapid response to distress calls and ensure a speedy assistance to women. 7) FIGHTBACK, India’s first Mobile Application for Women Safety. Powered by CanvasM , FightBack, the women’s safety application, sends SOS alerts from your phone. FightBack uses GPS, SMS, location maps, GPRS ,email and your Facebook account to inform your loved ones in case you are in danger. The app is available on iPhone, Android, Black Berry, Windows
  • 40. 8)Circle of 6 is designed mainly for college students. The app is also useful for high school students or any female who wants an easy-to-use system to alert friends when she’s in a threatening situation. The app is also available in Hindi and the Delhi women’s hotline number is built in. 9)Scream Alarm! This is a FREE safety alarm that does only one thing: push the button for making the phone scream loudly with a woman’s voice! Perfect for females that need some kind of safety alarm.Have the app on, and instantly push the button if you feel threatened! It is available on Android.
  • 41. 10)She Taxi, the 24X7 taxi service operated by women for women travellers has been designed to ensure a safe and reliable mode of transport for women as well as to encourage entrepreneurship and self- employment among women. • Travellers can book the cab via online or mobile on a 24X7 basis. • . The traveller will have the option to make payment via cash, debit card or credit card.Various other features such as refreshment mini bar and entertainment facilities including music, play stations are also provided in the cabs. • The cab, designed and integrated with Global Positioning system(GPS) will enable to monitor and track the activities of the traveller as well as the driver and will facilitate immediate aid in case of any emergency situation. • Safe Bus, Safe Me, Safe Me Mobile and Safe City Response Ecosystem are the major safety offering technologies used in She Taxi service.
  • 42. 11) Amrita Personal Safety System. (APSS )is an inconspicuous, wearable device that empowers women to secretly trigger communication with family and police when in distress. Button- and voice-activated, the device can record conversations and communicate immediately via text-message and voice calls to multiple predetermined destinations. It also supplies its wearer with automated information regarding the nearest police stations, hospitals and fire-stations. • The device is designed to function even in rural areas over low- speed data connections. • The device is designed to provide flexibility and choices for the wearer. Women will be able to wear it either on the waist or on a necklace, with multiple remote-activation capabilities, including a separate activation device to be embedded in an earring studs.
  • 43. 12) The Delhi Multimodal Transport System (DIMTS) has come out with “Telltail”, a security application on android and smartphones • Telltail, will help the user raise a security alert by contacting the police, friends and family simultaneously. The application will also provide visual tracking information of the user. • The application will have three button options — “Track Me,” “Track By Vehicle” and “Panic Button” — by clicking which the user will reach her primary contacts within seconds. 13)The stun gun This small gun charges an attacker with an electric shock. The shock weakens the attacker temporarily, giving you ample chance to escape the scene. When its trigger is pulled, a stun gun pumps about 700,000 volts into the attacker’s body. Some stun guns are small enough to be concealed in a pack of cigarettes. They run on Lithium batteries and can be carried either in handbags or held in waist straps.
  • 44. 14) The stun rings • A stun ring is an attractive ring that looks elegant and can pass for fashion ring. But more importantly, it offers safety and instills confidence. The ring contains pepper spray, and it protects you in times of attack, rape, violence and crisis. 15) The lightning strike personal protection device • This torch-like device was originally developed for use by police officers, but many civilians now use it as well. It protects you by shortly blinding and disorienting the attacker – thanks to the several lumens of strong white light produced by the LEDs in the device. The lightning strike device is light and small; you can carry it even while jogging.
  • 45. 16)The TASER device • This personal protection device can stun an attacker from a distance of about 15 feet away. Yet, it doubles as a powerful contact stun device. The device is very easy to use because hitting it anywhere on the attacker’s body will render him incapacitated. This is quite unlike pepper sprays and other self-defense devices, all of which must be targeted directly at the assailant’s face for any effect to be produced.
  • 46.
  • 47. IT IN BANKING SAFETY
  • 48. . IT has increased the level of competition and forced them to integrate the new technologies in order to satisfy their customers. They have already developed and implemented a certain number of solutions among them for safety of banking system and for customers transactions . Some of them are : • Self-inquiry facility • Remote banking • Anytime banking- Anywhere banking • Tele banking • Electronic Banking The technology used to provide this service is called electronic data interchange (EDI)
  • 49. Security of a customer's financial information PIN : Personal Identification Number PIN represents a password, used for the login , it is numeric password of mostly 4 digits . mainly use for ATM s , debit cards , credit cards TAN : Transaction Authentication Number TANs representing one-time passwords to authenticate transactions. • Signature based online banking where all transactions are signed and encrypted digitally. The Keys for the signature generation and encryption can be stored on smartcards or any memory medium, depending on the concrete implementation
  • 50. Secure Electronic Transaction (SET) • Secure Electronic Transaction (SET) software system, the global standard for secure card payments on the Internet, which is defined by various international companies such as Visa MasterCard, • IBM, Microsoft, Netscape Communications Corp., GTE, SAIC, Terisa Systems and Verisign. SET promises to secure bank-card transactions online. Lockhart, CEO of MasterCard said, “ …We are glad to work with Visa and all of the technology partners to craft SET. This action means that consumers will be able to use their bank cards to conduct transactions in cyberspace as securely and easily as they use cards in retail stores today.
  • 51. Internet banking security The security of the Bank Internet banking application is addressed at three levels. • The first concern is the security of customer information as it is sent from the customer's PC to the Web server. • The second area concerns the security of the environment in which the Internet banking server and customer information database reside. • Finally, security measures are in place to prevent unauthorized users from attempting to log into the online banking section of the Web site.
  • 52. How Encryption Protects You • The privacy of the communications between you (your browser) and our servers is ensured using encryption. Encryption scrambles messages exchanged between your browser and our online banking server.
  • 53. QUESTIONS • What are the basic features you find in any women safety app.? what other features would you suggest that will improve such apps? • What is the full form of GIS,GPS and CAD? • How can we access GIS ? • What is the full form of TAN / PIN ? • What are the facilities provide by banking system for safety of customer’s transaction ?