SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
I am…,[object Object],AccolAdeS y s t e m sOpen Source Project,[object Object]
AccolAdeS y s t e m s,[object Object],Formed Oct 1st 2010,[object Object],Northbrook,[object Object],Mobile / Application Developers,[object Object],Android / WP7,[object Object]
Who are we?,[object Object],A nerd true to the bone,[object Object],Fans of Hackathons,[object Object],Tech in the Middle Hackathon (2010),[object Object],Social Dev Camp Hackathon (2010),[object Object],Midwest Give Camp,[object Object],2010 Code Camp (Android Training),[object Object],2011 Code Camp (Robotics),[object Object]
A Short Story…,[object Object],UN,[object Object],1998 December,[object Object],Deployed KRISys Net,[object Object],Operation Desert Fox,[object Object],Albania,[object Object],Jordan = > Cyprus,[object Object]
I am…,[object Object],3 in 1 I am…,[object Object],Quick and easy,[object Object],Check In System,[object Object],Relief Aid Providers (NGOs),[object Object],ICRC Support Crew,[object Object],Family and Friends,[object Object],College Students,[object Object],DOD Contractors,[object Object]
I am…,[object Object],Start Application,[object Object],Register,[object Object],First TimePIN SETUP,[object Object],login,[object Object],Setup PIN,[object Object],Setup L/P,[object Object],Server Side,[object Object],L1 – Notify Once,[object Object],L2 – Notify Every hour until turn off,[object Object],L3 – Notify Every ½ hour until turn off,[object Object],L4 – Notify Every 5 Min,[object Object],(All Geo Tagged),[object Object],Start page,[object Object],ALERT BEACON,[object Object],ViewICEContact List,[object Object]
I am…,[object Object]

Weitere ähnliche Inhalte

Ähnlich wie RHoK 2 Chicago - IMOK/IMNotOk

M4D 2010: Mobile Human Rights Reporting in the Niger Delta
M4D 2010: Mobile Human Rights Reporting in the Niger DeltaM4D 2010: Mobile Human Rights Reporting in the Niger Delta
M4D 2010: Mobile Human Rights Reporting in the Niger DeltaMarcus Wagenaar
 
Noritown Studio
Noritown StudioNoritown Studio
Noritown StudioAndy Song
 
NATURAL OBJECT ORIENTED PROGRAMMING USING ELICA
NATURAL OBJECT ORIENTED PROGRAMMING USING ELICANATURAL OBJECT ORIENTED PROGRAMMING USING ELICA
NATURAL OBJECT ORIENTED PROGRAMMING USING ELICANIKHIL NAWATHE
 
Noritown company introduction
Noritown company introductionNoritown company introduction
Noritown company introductionNori Town
 
FVH Open Up The city: 8 Open Up The City Rufus Pollock
FVH Open Up The city: 8 Open Up The City Rufus PollockFVH Open Up The city: 8 Open Up The City Rufus Pollock
FVH Open Up The city: 8 Open Up The City Rufus Pollockforumvirium
 
Future Perspective in Information Technology (1998)
Future Perspective in Information Technology (1998)Future Perspective in Information Technology (1998)
Future Perspective in Information Technology (1998)Leo Plugge
 
Open source & mobile development - Be open, and sleep well
Open source & mobile development - Be open, and sleep wellOpen source & mobile development - Be open, and sleep well
Open source & mobile development - Be open, and sleep wellAlessio Biancalana
 
IoT - The Building Block for IR 4.0
IoT - The Building Block for IR 4.0IoT - The Building Block for IR 4.0
IoT - The Building Block for IR 4.0Dr. Mazlan Abbas
 
Advanced Concepts From Computer Science
Advanced Concepts From Computer ScienceAdvanced Concepts From Computer Science
Advanced Concepts From Computer ScienceMarie Smith
 
PyCon JP 2011 Lightning Talk No.10
PyCon JP 2011 Lightning Talk No.10PyCon JP 2011 Lightning Talk No.10
PyCon JP 2011 Lightning Talk No.10Yoji TAKEUCHI
 
Technologies and Trends that are Changing the World
Technologies and Trends that are Changing the WorldTechnologies and Trends that are Changing the World
Technologies and Trends that are Changing the WorldCarlos Dominguez
 
Gatsby kaken-2017-pfn okanohara
Gatsby kaken-2017-pfn okanoharaGatsby kaken-2017-pfn okanohara
Gatsby kaken-2017-pfn okanoharaPreferred Networks
 
Online Python Resources
Online Python ResourcesOnline Python Resources
Online Python ResourcesJonathan Fine
 
ACCJ - Safecast March 2016
ACCJ - Safecast March 2016ACCJ - Safecast March 2016
ACCJ - Safecast March 2016Safecast
 

Ähnlich wie RHoK 2 Chicago - IMOK/IMNotOk (20)

M4D 2010: Mobile Human Rights Reporting in the Niger Delta
M4D 2010: Mobile Human Rights Reporting in the Niger DeltaM4D 2010: Mobile Human Rights Reporting in the Niger Delta
M4D 2010: Mobile Human Rights Reporting in the Niger Delta
 
Noritown Studio
Noritown StudioNoritown Studio
Noritown Studio
 
NATURAL OBJECT ORIENTED PROGRAMMING USING ELICA
NATURAL OBJECT ORIENTED PROGRAMMING USING ELICANATURAL OBJECT ORIENTED PROGRAMMING USING ELICA
NATURAL OBJECT ORIENTED PROGRAMMING USING ELICA
 
Noritown company introduction
Noritown company introductionNoritown company introduction
Noritown company introduction
 
Charles Lim - Honeynet Indonesia Chapter
Charles Lim - Honeynet Indonesia Chapter Charles Lim - Honeynet Indonesia Chapter
Charles Lim - Honeynet Indonesia Chapter
 
Dec2018 istanbul-2
Dec2018 istanbul-2Dec2018 istanbul-2
Dec2018 istanbul-2
 
OLPC to Sudan
OLPC to SudanOLPC to Sudan
OLPC to Sudan
 
FVH Open Up The city: 8 Open Up The City Rufus Pollock
FVH Open Up The city: 8 Open Up The City Rufus PollockFVH Open Up The city: 8 Open Up The City Rufus Pollock
FVH Open Up The city: 8 Open Up The City Rufus Pollock
 
Future Internet Research
Future Internet ResearchFuture Internet Research
Future Internet Research
 
Future Perspective in Information Technology (1998)
Future Perspective in Information Technology (1998)Future Perspective in Information Technology (1998)
Future Perspective in Information Technology (1998)
 
Open source & mobile development - Be open, and sleep well
Open source & mobile development - Be open, and sleep wellOpen source & mobile development - Be open, and sleep well
Open source & mobile development - Be open, and sleep well
 
IoT - The Building Block for IR 4.0
IoT - The Building Block for IR 4.0IoT - The Building Block for IR 4.0
IoT - The Building Block for IR 4.0
 
CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in AfricaCTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
 
Advanced Concepts From Computer Science
Advanced Concepts From Computer ScienceAdvanced Concepts From Computer Science
Advanced Concepts From Computer Science
 
PyCon JP 2011 Lightning Talk No.10
PyCon JP 2011 Lightning Talk No.10PyCon JP 2011 Lightning Talk No.10
PyCon JP 2011 Lightning Talk No.10
 
Technologies and Trends that are Changing the World
Technologies and Trends that are Changing the WorldTechnologies and Trends that are Changing the World
Technologies and Trends that are Changing the World
 
The Power of One
The Power of OneThe Power of One
The Power of One
 
Gatsby kaken-2017-pfn okanohara
Gatsby kaken-2017-pfn okanoharaGatsby kaken-2017-pfn okanohara
Gatsby kaken-2017-pfn okanohara
 
Online Python Resources
Online Python ResourcesOnline Python Resources
Online Python Resources
 
ACCJ - Safecast March 2016
ACCJ - Safecast March 2016ACCJ - Safecast March 2016
ACCJ - Safecast March 2016
 

Kürzlich hochgeladen

Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Kürzlich hochgeladen (20)

Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

RHoK 2 Chicago - IMOK/IMNotOk

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.