1.The power or ability to return to the original form, position, etc., after being bent, compressed, or stretched; elasticity. 2. Ability to recover readily.

Slides:



Advertisements
Similar presentations
Report from the Networking in Times of Disaster. What is a Disaster? Networks that work in times of disaster should address: Events that affect a network.
Advertisements

802.1AF - directions define requirements to find and create connections in terms of Discovery - Authentication - Enable 1.Discover of what can be done.
EMS Checklist (ISO model)
Research Issues in Web Services CS 4244 Lecture Zaki Malik Department of Computer Science Virginia Tech
Planning for a Disaster: Individuals who use Assistive Technology and Families Carl T. Cameron, PhD Pat Heineman.
© 2008 Swan Island Networks Information Sharing and Common Alerting Protocol (CAP) – How Interoperable Data can enable Cross Organizational Communication.
Vendor Briefing May 26, 2006 AMI Overview & Communications TCM.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Understanding Active Directory
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Oct 31, 2000Database Management -- Fall R. Larson Database Management: Introduction to Terms and Concepts University of California, Berkeley School.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Collaborative Web Caching Based on Proxy Affinities Jiong Yang, Wei Wang in T. J.Watson Research Center Richard Muntz in Computer Science Department of.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
Emergency Notification It’s a shared responsibility…
DEFINITIONS OF MOTIVATION:
A tour of new features introducing LINQ. Agenda of LINQ Presentation We have features for every step of the way LINQ Fundamentals Anonymous Functions/Lambda.
Understanding Active Directory
Social Organization Framework BC Coalition of People with Disabilities.
Module 1: Introduction to Designing a Directory Services Infrastructure.
Chapter 1: Hierarchical Network Design
Public Health Preparedness & Leadership Louis Rowitz, PhD Director Mid-America Regional Public Health Leadership Institute.
Motivation and Emotion. How Are They Similar? Different? MOTIVATION EMOTION  A process that arouses, maintains, and guides behavior towards a goal 
Report from Breakout Session 1.2 Secure Consumerization: the Genuine Trustworthiness Revolution Chair: Craig Lee Rapporteur: Paolo Mazzetti.
Wisconsin Digital Summit Monona Terrace November 15, 2004 Justice and Public Safety Interoperability: Wisconsin’s Justice Information Sharing (WIJIS) Initiative.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
6 Chapter Databases and Information Management. File Organization Terms and Concepts Bit: Smallest unit of data; binary digit (0,1) Byte: Group of bits.
Resilience management in the Built Environment
Tools of Resilience Using Information Technology to Enhance Campus Security and Emergency Management Art Botterell, Community Warning System Manager, Office.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Storing Organizational Information - Databases
Metadata in Satellite Images, or, An Administrator’s View Prepared for the CUL Metadata Working Group August Karen Calhoun The Orion Nebula.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
Learning Package 2: Resilient buildings and infrastructure Disaster Resilience in the Built Environment Dr Richard Haigh Resilience Buildings and Infrastructure.
MANAGING DATA RESOURCES ~ pertemuan 7 ~ Oleh: Ir. Abdul Hayat, MTI.
An Operational System Description for Health Care Systems.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
A Tale of Two Stories: The Tools of Resilience Presented by Lisa Chavenson, Becky Crossfield, and Bernadette Janis.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
CJ 307 Week 8 Incident Command System. NIMS Outlines a Standard Incident Management Organization Called I.C.S.
The OCIO/PSCD, in collaboration with the Advisory Board’s Long Range Planning Committee, developed this Strategic Plan to foster the leadership and.
Hierarchical Topology Design. 2 Topology Design Topology is a map of an___________ that indicates network segments, interconnection points, and user communities.
11 June 2009Connectivity Week – OASIS: Integrated Emergency Management1 Integrated Emergency Management Overview
Introduction to Active Directory
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
11 June 2009Week – OASIS: Integrated Emergency Management1 Integrated Emergency Management Session Two: Incident Preparedness and Response.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Unit 6 Understanding and Implementing Crew Resource Management.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition (70-294) Chapter 1: Overview of the Active.
Planning an Active Directory Deployment Lesson 1.
Managing Data Resources File Organization and databases for business information systems.
RESILIENCY: OVERCOMING PHYSICIAN BURNOUT Facilitated by: Andy Kindler PRESENTED TO:
Announcing the 2014 National Digital Stewardship Agenda.
Overview Issues in Mobile Databases – Data management – Transaction management Mobile Databases and Information Retrieval.
Accessing the VI-SEEM infrastructure
Unit 8 Professional Practice Portfolio 1
Criteria for Assessing MHPSS Proposals Submitted through the CAP, CERF and HRF Funding Mechanisms to the Protection Cluster.
Active Directory Administration
Active Directory Stored collection of information about objects
Data Base System Lecture : Database Environment
Fostering Students with Skills and Tools
The Basics of FORCES.
Deschutes County Sheriff’s Office Emergency Services Manager
Presentation transcript:

1.The power or ability to return to the original form, position, etc., after being bent, compressed, or stretched; elasticity. 2. Ability to recover readily from illness, depression, adversity, or the like; buoyancy. Tools of Resilience Requirements for Emergency Networks

Functional requirements are the same as day-to-day Crises are very different: Abrupt changes in scale, topology, traffic volume Crises are no different:

What Makes a Crisis? Changes the operating environment that are: Abrupt Unexpected Substantial Resulting shock loads on infrastructure Heightened attention Emotional arousal

Applications in Public Safety and Emergency Management Receiving requests for service Dispatching and tracking resources Storing, retrieving and sharing knowledge Perceiving events and conditions Planning and coordination Maintaining morale and community

Resilience PredictabilityCapability Continuity Flexibility

Resilience PredictabilityCapability Continuity Flexibility Scalability QoS Security Interoperability

Resilience PredictabilityCapability Continuity Flexibility Scalability Mesh by Design Discovery Services QoS Security IdentityAuthority Attention / Announcement / Presence Interoperability

Key Concerns Discovery Identity Attention Management Mesh by Design

Discovery Whos who, where and when? Roles, relationships and capabilities Location and presence Hierarchy is just the beginning…

Identity Persistent constellations of attributes Human, but also collective and automatic Authority to cast an identity into being Domains of identity, webs of trust The half-life of identity

Attention Management Push and pull Multicasting Relevance and salience The normalcy bias and the affective filters Imputed motive: People buy sources We get what we measure

Mesh by Design Counteract the technical and organizational tendencies toward hierarchical topologies, SpoFs Mitigate the WAN / LAN distinction (fractal topology)

1.The power or ability to return to the original form, position, etc., after being bent, compressed, or stretched; elasticity. 2. Ability to recover readily from illness, depression, adversity, or the like; buoyancy. Art Botterell Office of the Sheriff Contra Costa County, California