SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Microsoft’s Role in  International Disaster Risk Reduction Gisli Olafsson Disaster Management – Technical Advisor Microsoft Corporation
Our Vision ,[object Object],[object Object],Our Mission
Short Video
 
What are we working on? Public/Private Partnerships ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Disaster Management ICT Capacity Assessments
Challenges of Coordination Lack of  common operational picture impedes efficient  response Increasing  interagency coordination / complexity Mapping / topography  identification is outdated, slow and  paper-based Difficult to disseminate information quickly  People Process Technology ,[object Object],[object Object],Inter Governmental  Organization Private  Enterprise Critical Infrastructure Citizens Non-Governmental Organizations Nations ,[object Object],[object Object],Leadership
Role of Technology in Disaster Response Coordination with IGOs  ,[object Object],[object Object],[object Object],[object Object],United Nations Office for the Coordination of Humanitarian Affairs (UN OCHA)  Based on lesson’s learned from HIC Myanmar, the portal was deployed in subsequent disasters and became the tool for inter-agency coordination renamed as  OneResponse (http://oneresponse.info)
Disaster Management Infrastructure Optimization Standardized Rationalized Dynamic Basic Managed ICT  infrastructure with limited automation Managed and  consolidated ICT infrastructure with maximum automation Fully automated  management,  dynamic resource  usage, business  linked SLAs Uncoordinated, manual infrastructure  Manage Complexity and Achieve Agility Cost Center More Efficient Cost Center Business Enabler Strategic Asset Dynamic ICT
Disaster Management Infrastructure Optimization Uncoordinated, manual infrastructure  Managed ICT  infrastructure  with limited automation Managed and  consolidated ICT infrastructure with maximum automation Fully automated  management,  dynamic resource  usage, business  linked SLA’s ,[object Object],Standardized Rationalized Dynamic Basic Efficient Cost Center Business Enabler Strategic Asset Cost Center Citizen involvement Early warning Incident Management and Multi-Agency Collaboration Situational Awareness ICT Policy and Critical Infrastructure Protection
Disaster Management Infrastructure Optimization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],How Coutnry XYZ Scored DM IO Comparison Standardized Rationalized Dynamic Basic Citizen Involvement Situational Awareness Incident Mgmt & Multi-Agency  Early Warning ICT Policy and CIP 1 2 3 4 0 Citizen Involvement Situational Awareness Incident Mgmt & Multi-Agency Early Warning ICT Policy and CIP      XYZ  Country Peer Average
Microsoft Vine ,[object Object],[object Object],[object Object],[object Object],[object Object]
 

Weitere Àhnliche Inhalte

Was ist angesagt?

An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Managementguestc9f21b
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum Carolyn Slade, MS-HIM
 
Introduction to FSU VOST - Spring 2013
Introduction to FSU VOST - Spring 2013Introduction to FSU VOST - Spring 2013
Introduction to FSU VOST - Spring 2013David Merrick II
 
Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Jack Whitsitt
 
New Zealand VOST Training Guide - 2012
New Zealand VOST Training Guide - 2012New Zealand VOST Training Guide - 2012
New Zealand VOST Training Guide - 2012Caroline Milligan
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum Carolyn Slade, MS-HIM
 
Disaster Technology Trends & Digital Volunteerism
Disaster Technology Trends & Digital VolunteerismDisaster Technology Trends & Digital Volunteerism
Disaster Technology Trends & Digital VolunteerismBrandon Greenberg
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
ICT for NGO's
ICT for NGO'sICT for NGO's
ICT for NGO'sict4devwg
 
Digital Volunteers and Emergency Management
Digital Volunteers and Emergency Management Digital Volunteers and Emergency Management
Digital Volunteers and Emergency Management Patrice Cloutier
 
Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...Trilateral Research
 

Was ist angesagt? (12)

An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Introduction to FSU VOST - Spring 2013
Introduction to FSU VOST - Spring 2013Introduction to FSU VOST - Spring 2013
Introduction to FSU VOST - Spring 2013
 
Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...
 
New Zealand VOST Training Guide - 2012
New Zealand VOST Training Guide - 2012New Zealand VOST Training Guide - 2012
New Zealand VOST Training Guide - 2012
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Disaster Technology Trends & Digital Volunteerism
Disaster Technology Trends & Digital VolunteerismDisaster Technology Trends & Digital Volunteerism
Disaster Technology Trends & Digital Volunteerism
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
ICT for NGO's
ICT for NGO'sICT for NGO's
ICT for NGO's
 
Digital Volunteers and Emergency Management
Digital Volunteers and Emergency Management Digital Volunteers and Emergency Management
Digital Volunteers and Emergency Management
 
Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...
 

Ähnlich wie ICT and Disaster Risk Reduction

Crisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareCrisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareI-Pix Technologies
 
Insteddma08 1224025844002745-9
Insteddma08 1224025844002745-9Insteddma08 1224025844002745-9
Insteddma08 1224025844002745-9InSTEDD
 
Journal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docxJournal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docxchristiandean12115
 
Cloud computing opportunity and challenge for european foundations and gran...
Cloud computing   opportunity and challenge for european foundations and gran...Cloud computing   opportunity and challenge for european foundations and gran...
Cloud computing opportunity and challenge for european foundations and gran...TechSoup
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
Disaster Management Systems: Building Capacity for Developing Countries and ...
Disaster Management Systems: Building Capacity  for Developing Countries and ...Disaster Management Systems: Building Capacity  for Developing Countries and ...
Disaster Management Systems: Building Capacity for Developing Countries and ...Connie White
 
Emergency Response & Crisis Management for Resilience
Emergency Response & Crisis Management for ResilienceEmergency Response & Crisis Management for Resilience
Emergency Response & Crisis Management for ResilienceI-Pix Technologies
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureAnn Treacy
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For ActionBarry Greene
 
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...Ahad
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity reportKevin Leffew
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportSamantha Wagner
 
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
 Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats" Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"EC-Council
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorKnowledge Group
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxbagotjesusa
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 

Ähnlich wie ICT and Disaster Risk Reduction (20)

Crisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareCrisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced Software
 
Insteddma08 1224025844002745-9
Insteddma08 1224025844002745-9Insteddma08 1224025844002745-9
Insteddma08 1224025844002745-9
 
Journal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docxJournal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docx
 
Cloud computing opportunity and challenge for european foundations and gran...
Cloud computing   opportunity and challenge for european foundations and gran...Cloud computing   opportunity and challenge for european foundations and gran...
Cloud computing opportunity and challenge for european foundations and gran...
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Disaster Management Systems: Building Capacity for Developing Countries and ...
Disaster Management Systems: Building Capacity  for Developing Countries and ...Disaster Management Systems: Building Capacity  for Developing Countries and ...
Disaster Management Systems: Building Capacity for Developing Countries and ...
 
Emergency Response & Crisis Management for Resilience
Emergency Response & Crisis Management for ResilienceEmergency Response & Crisis Management for Resilience
Emergency Response & Crisis Management for Resilience
 
Olaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative SecurityOlaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative Security
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For Action
 
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources Report
 
University-of-Miami_MEDINA
University-of-Miami_MEDINAUniversity-of-Miami_MEDINA
University-of-Miami_MEDINA
 
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
 Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats" Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 

Mehr von Gisli Olafsson

Blockchain for NGOs
Blockchain for NGOsBlockchain for NGOs
Blockchain for NGOsGisli Olafsson
 
Disrupting Humanitarian Response
Disrupting Humanitarian ResponseDisrupting Humanitarian Response
Disrupting Humanitarian ResponseGisli Olafsson
 
Haiyan Response - ISCRAM Panel Presentation
Haiyan Response - ISCRAM Panel PresentationHaiyan Response - ISCRAM Panel Presentation
Haiyan Response - ISCRAM Panel PresentationGisli Olafsson
 
How Technology is Changing Disaster Management
How Technology is Changing Disaster ManagementHow Technology is Changing Disaster Management
How Technology is Changing Disaster ManagementGisli Olafsson
 
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle Gisli Olafsson
 
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour version
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour versionThe Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour version
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour versionGisli Olafsson
 
Humanitarian Innovation
Humanitarian InnovationHumanitarian Innovation
Humanitarian InnovationGisli Olafsson
 
Open Humanitarian Initiative - Presentation to IASC - May 2013
Open Humanitarian Initiative - Presentation to IASC - May 2013Open Humanitarian Initiative - Presentation to IASC - May 2013
Open Humanitarian Initiative - Presentation to IASC - May 2013Gisli Olafsson
 
Open Humanitarian Initiative - 2013 Plan
Open Humanitarian Initiative - 2013 PlanOpen Humanitarian Initiative - 2013 Plan
Open Humanitarian Initiative - 2013 PlanGisli Olafsson
 
Open Humanitarian Initiative - August 2012 update
Open Humanitarian Initiative - August 2012 updateOpen Humanitarian Initiative - August 2012 update
Open Humanitarian Initiative - August 2012 updateGisli Olafsson
 
Open Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference PresentationOpen Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference PresentationGisli Olafsson
 
Use of Digital Volunteer Groups
Use of Digital Volunteer GroupsUse of Digital Volunteer Groups
Use of Digital Volunteer GroupsGisli Olafsson
 
Humanitarian Response in Times of Mass Collaboration and Networked Intelligence
Humanitarian Response in Times of Mass Collaboration and Networked IntelligenceHumanitarian Response in Times of Mass Collaboration and Networked Intelligence
Humanitarian Response in Times of Mass Collaboration and Networked IntelligenceGisli Olafsson
 
Use of Social Media in Disasters
Use of Social Media in DisastersUse of Social Media in Disasters
Use of Social Media in DisastersGisli Olafsson
 
The importance of adding value
The importance of adding valueThe importance of adding value
The importance of adding valueGisli Olafsson
 
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...Gisli Olafsson
 
HumanityRoad training - Basic Crisis Information Management
HumanityRoad training - Basic Crisis Information ManagementHumanityRoad training - Basic Crisis Information Management
HumanityRoad training - Basic Crisis Information ManagementGisli Olafsson
 
Information Management Course - Reporting
Information Management Course - ReportingInformation Management Course - Reporting
Information Management Course - ReportingGisli Olafsson
 
Information Management Course - Dissemination and Displays
Information Management Course - Dissemination and DisplaysInformation Management Course - Dissemination and Displays
Information Management Course - Dissemination and DisplaysGisli Olafsson
 

Mehr von Gisli Olafsson (20)

Blockchain for NGOs
Blockchain for NGOsBlockchain for NGOs
Blockchain for NGOs
 
Disrupting Humanitarian Response
Disrupting Humanitarian ResponseDisrupting Humanitarian Response
Disrupting Humanitarian Response
 
Haiyan Response - ISCRAM Panel Presentation
Haiyan Response - ISCRAM Panel PresentationHaiyan Response - ISCRAM Panel Presentation
Haiyan Response - ISCRAM Panel Presentation
 
How Technology is Changing Disaster Management
How Technology is Changing Disaster ManagementHow Technology is Changing Disaster Management
How Technology is Changing Disaster Management
 
Lean Response
Lean ResponseLean Response
Lean Response
 
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle
 
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour version
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour versionThe Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour version
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour version
 
Humanitarian Innovation
Humanitarian InnovationHumanitarian Innovation
Humanitarian Innovation
 
Open Humanitarian Initiative - Presentation to IASC - May 2013
Open Humanitarian Initiative - Presentation to IASC - May 2013Open Humanitarian Initiative - Presentation to IASC - May 2013
Open Humanitarian Initiative - Presentation to IASC - May 2013
 
Open Humanitarian Initiative - 2013 Plan
Open Humanitarian Initiative - 2013 PlanOpen Humanitarian Initiative - 2013 Plan
Open Humanitarian Initiative - 2013 Plan
 
Open Humanitarian Initiative - August 2012 update
Open Humanitarian Initiative - August 2012 updateOpen Humanitarian Initiative - August 2012 update
Open Humanitarian Initiative - August 2012 update
 
Open Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference PresentationOpen Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference Presentation
 
Use of Digital Volunteer Groups
Use of Digital Volunteer GroupsUse of Digital Volunteer Groups
Use of Digital Volunteer Groups
 
Humanitarian Response in Times of Mass Collaboration and Networked Intelligence
Humanitarian Response in Times of Mass Collaboration and Networked IntelligenceHumanitarian Response in Times of Mass Collaboration and Networked Intelligence
Humanitarian Response in Times of Mass Collaboration and Networked Intelligence
 
Use of Social Media in Disasters
Use of Social Media in DisastersUse of Social Media in Disasters
Use of Social Media in Disasters
 
The importance of adding value
The importance of adding valueThe importance of adding value
The importance of adding value
 
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...
 
HumanityRoad training - Basic Crisis Information Management
HumanityRoad training - Basic Crisis Information ManagementHumanityRoad training - Basic Crisis Information Management
HumanityRoad training - Basic Crisis Information Management
 
Information Management Course - Reporting
Information Management Course - ReportingInformation Management Course - Reporting
Information Management Course - Reporting
 
Information Management Course - Dissemination and Displays
Information Management Course - Dissemination and DisplaysInformation Management Course - Dissemination and Displays
Information Management Course - Dissemination and Displays
 

KĂŒrzlich hochgeladen

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 

KĂŒrzlich hochgeladen (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 

ICT and Disaster Risk Reduction

  • 1. Microsoft’s Role in International Disaster Risk Reduction Gisli Olafsson Disaster Management – Technical Advisor Microsoft Corporation
  • 2.
  • 5.
  • 6.
  • 7.
  • 8. Disaster Management Infrastructure Optimization Standardized Rationalized Dynamic Basic Managed ICT infrastructure with limited automation Managed and consolidated ICT infrastructure with maximum automation Fully automated management, dynamic resource usage, business linked SLAs Uncoordinated, manual infrastructure Manage Complexity and Achieve Agility Cost Center More Efficient Cost Center Business Enabler Strategic Asset Dynamic ICT
  • 9.
  • 10.
  • 11.
  • 12.  

Hinweis der Redaktion

  1. 08/19/09 10:36 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.
  2. 08/19/09 10:36 © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.