SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
Use thousande of eyes and ears to make your
environment Clean, Safe and Secure.
Activate and motivate your citizens to take their
responsibility with this easy tool.
➢
Mobile phones become your eyes and ears and will registrate:
➢
Junk on the street, suspicious circumstances, traffic accidents, graffiti, drug deal, damaged bus
shelters, loitering, defective light, strange behaviour, litter, misconduct, neglected animals, child
abuse, crime, terrorist threat, slave labor, and more.
➢
Quick simple reporting > efficient handling > effective safety
ObserveObserve
Receive data
ActAct
Deploy
LearnLearn
Improve
DecideDecide
Plan
OrientOrient
Analyze
The OODA loop (for observe, orient, decide, and act) is a concept originally applied to the combat operations process, often at the strategic level in
military operations. The concept was developed by military strategist and USAF Colonel John Boyd.
Step 1. Observe
 Receiving data
 SafeCity users make live video from location
 Fixed cameras provide continuous picture
 Phone alerts
 Automated alarms from sensors
 Information from social media (twitter, facebook)
 Regular monitoring verifies local situation
Receive dataReceive data
SafeCity live video
Phone calls
Social Media
Neighborhood watch
Sensors
Step 2. Orient
Not clean
Not intact
Not secure
Incident reports
AnalyzeAnalyze
Collection
Categorize
Orient
Visualize
Step 3. Decide
 Follow-up based on analysis and policyPlanPlan
Prioritize
Deployment proposals
Mobilize
Step 4. Act
DeploymentDeployment
Police
Security companies
Cleaning companies
Restoration companies
Step 5. Learn
ImproveImprove
Feedback of monitoring reports
Preventive measures
Proactie efforts
Impact on life measure
Evaluating follow-up
For more information or free trial, mail: info@safecity.eu

Más contenido relacionado

Similar a SafeCity presentation

Protecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsProtecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsNovoQuad
 
IRJET- Enactment of Smart Child Monitoring System
IRJET- Enactment of Smart Child Monitoring SystemIRJET- Enactment of Smart Child Monitoring System
IRJET- Enactment of Smart Child Monitoring SystemIRJET Journal
 
Open Nature Park Ops & Security Solutions
Open Nature Park Ops & Security SolutionsOpen Nature Park Ops & Security Solutions
Open Nature Park Ops & Security Solutionskoottummel
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace SurveilanceSampath
 
IRJET - Ensuring Women Safety by Offline Tracking
IRJET -  	  Ensuring Women Safety by Offline TrackingIRJET -  	  Ensuring Women Safety by Offline Tracking
IRJET - Ensuring Women Safety by Offline TrackingIRJET Journal
 
Life Safety and Property Protection
Life Safety and Property ProtectionLife Safety and Property Protection
Life Safety and Property ProtectionQuality CCTV
 
Verfied Response Is Your Business Protected 071712
Verfied Response Is Your Business Protected 071712Verfied Response Is Your Business Protected 071712
Verfied Response Is Your Business Protected 071712angeloslideshare
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensicsnoorashams
 
Best Android Spy Apps_ Ensuring Safety and Monitoring with Consent.pdf
Best Android Spy Apps_ Ensuring Safety and Monitoring with Consent.pdfBest Android Spy Apps_ Ensuring Safety and Monitoring with Consent.pdf
Best Android Spy Apps_ Ensuring Safety and Monitoring with Consent.pdfonestore3
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
NNID texting and driving prevention No Apps Needed
NNID texting and driving prevention No Apps NeededNNID texting and driving prevention No Apps Needed
NNID texting and driving prevention No Apps NeededGraham Crispin MBA
 
Top 5 Uses of Biometrics Around The World
Top 5 Uses of Biometrics Around The WorldTop 5 Uses of Biometrics Around The World
Top 5 Uses of Biometrics Around The Worldmehedi76
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone SecurityMalasta Hill
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devicesJ A Bhavsar
 

Similar a SafeCity presentation (20)

Protecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsProtecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big Events
 
Survillance description
Survillance descriptionSurvillance description
Survillance description
 
IRJET- Enactment of Smart Child Monitoring System
IRJET- Enactment of Smart Child Monitoring SystemIRJET- Enactment of Smart Child Monitoring System
IRJET- Enactment of Smart Child Monitoring System
 
Open Nature Park Ops & Security Solutions
Open Nature Park Ops & Security SolutionsOpen Nature Park Ops & Security Solutions
Open Nature Park Ops & Security Solutions
 
My ppt
My pptMy ppt
My ppt
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
 
IRJET - Ensuring Women Safety by Offline Tracking
IRJET -  	  Ensuring Women Safety by Offline TrackingIRJET -  	  Ensuring Women Safety by Offline Tracking
IRJET - Ensuring Women Safety by Offline Tracking
 
Life Safety and Property Protection
Life Safety and Property ProtectionLife Safety and Property Protection
Life Safety and Property Protection
 
Verfied Response Is Your Business Protected 071712
Verfied Response Is Your Business Protected 071712Verfied Response Is Your Business Protected 071712
Verfied Response Is Your Business Protected 071712
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
Jeruf resume
Jeruf resumeJeruf resume
Jeruf resume
 
Best Android Spy Apps_ Ensuring Safety and Monitoring with Consent.pdf
Best Android Spy Apps_ Ensuring Safety and Monitoring with Consent.pdfBest Android Spy Apps_ Ensuring Safety and Monitoring with Consent.pdf
Best Android Spy Apps_ Ensuring Safety and Monitoring with Consent.pdf
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
NNID texting and driving prevention No Apps Needed
NNID texting and driving prevention No Apps NeededNNID texting and driving prevention No Apps Needed
NNID texting and driving prevention No Apps Needed
 
G0533441
G0533441G0533441
G0533441
 
Top 5 Uses of Biometrics Around The World
Top 5 Uses of Biometrics Around The WorldTop 5 Uses of Biometrics Around The World
Top 5 Uses of Biometrics Around The World
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
 

Último

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 

Último (20)

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 

SafeCity presentation

  • 1.
  • 2. Use thousande of eyes and ears to make your environment Clean, Safe and Secure.
  • 3. Activate and motivate your citizens to take their responsibility with this easy tool.
  • 4. ➢ Mobile phones become your eyes and ears and will registrate: ➢ Junk on the street, suspicious circumstances, traffic accidents, graffiti, drug deal, damaged bus shelters, loitering, defective light, strange behaviour, litter, misconduct, neglected animals, child abuse, crime, terrorist threat, slave labor, and more. ➢ Quick simple reporting > efficient handling > effective safety
  • 5. ObserveObserve Receive data ActAct Deploy LearnLearn Improve DecideDecide Plan OrientOrient Analyze The OODA loop (for observe, orient, decide, and act) is a concept originally applied to the combat operations process, often at the strategic level in military operations. The concept was developed by military strategist and USAF Colonel John Boyd.
  • 6. Step 1. Observe  Receiving data  SafeCity users make live video from location  Fixed cameras provide continuous picture  Phone alerts  Automated alarms from sensors  Information from social media (twitter, facebook)  Regular monitoring verifies local situation Receive dataReceive data SafeCity live video Phone calls Social Media Neighborhood watch Sensors
  • 7. Step 2. Orient Not clean Not intact Not secure Incident reports AnalyzeAnalyze Collection Categorize Orient Visualize
  • 8. Step 3. Decide  Follow-up based on analysis and policyPlanPlan Prioritize Deployment proposals Mobilize
  • 9. Step 4. Act DeploymentDeployment Police Security companies Cleaning companies Restoration companies
  • 10. Step 5. Learn ImproveImprove Feedback of monitoring reports Preventive measures Proactie efforts Impact on life measure Evaluating follow-up
  • 11. For more information or free trial, mail: info@safecity.eu