You are here

Knowledge Science

Primary tabs

The Knowledge Science working group is focused on exploring the advancement of knowledge science.

The mission of the Knowledge Science working group is to explore the advancement of knowledge science.

Members

Joyce Fedeczko Kathy Gilbeaux Maeryn Obley mdmcdonald mike kraft Siftar
tkm tom.mcginn

Email address for group

knowledge-science@m.resiliencesystem.org

Cheap Mobile Technology is Vital in Disaster Recovery

submitted by Mike Kraft

      

Jason Hall of Stansell Electric, left, talks with project manager Daron Whitehead as Nashville Wire and other vendors help repair the electrical systems after floodwaters inundated the company in May 2010, destroying $1.2 million in inventory alone./ Dipti Vaidya / File / The Tennessean

tennessean.com - by J. J. Rosen - December 8, 2013

In May 2010, after 36 hours of continuous rain, Nashville was in serious trouble. The “Flood of 2010,” as it came to be known, created a disaster that affected almost everyone in the city. . .

. . . In 2010, the idea of servers and applications being remotely hosted in the cloud was relatively new, and mobile technology was not as prevalent as it is today. Combining mobile and cloud, small- and medium-size businesses can now afford to design and implement disaster-recovery and business-continuity plans that have the same features as their larger competitors.

(READ COMPLETE ARTICLE)

Country / Region Tags: 
Problem, Solution, SitRep, or ?: 

Superheroes of the Solar Fields


bloomberg.com - October 14th, 2013

Solar is a $140 billion dollar industry. Qbotix, a Silicon Valley robotics firm, wants a piece of the pie. Their "SolBots," each sporting a superhero name, move through the solar fields adjusting panels once every 45 minutes maximizing the efficiency of the sun and increasing the value for the owner. Bloomberg Television's Rachel Crane reports. (Source: Bloomberg)

(VIEW ARTICLE)

Country / Region Tags: 
General Topic Tags: 
Problem, Solution, SitRep, or ?: 

Defending an Open, Global, Secure, and Resilient Internet

cfr.org - Council on Foreign Relations - June 2013

Overview

This CFR-sponsored Independent Task Force warns that "escalating attacks on countries, companies, and individuals, as well as pervasive criminal activity, threaten the security and safety of the Internet." The number of "state-backed operations continues to rise, and future attacks will become more sophisticated and disruptive," argues the Task Force report, Defending an Open, Global, Secure, and Resilient Internet.

With the ideal vision of an open and secure Internet increasingly at risk, the Task Force urges the United States, with its friends and allies, "to act quickly to encourage a global cyberspace that reflects shared values of free expression and free markets."

(CLICK HERE FOR ADDITIONAL INFORMATION, AND TO DOWNLOAD THE REPORT)

Country / Region Tags: 
Problem, Solution, SitRep, or ?: 

The Infrastructure Security Partnership

tisp.org

In a rapid response to the terrorist attacks on Sept. 11, 2001, federal and state agencies, corporations and professional societies met to discuss how they could collaborate and coordinate to improve the security of the built environment of the United States.

In a unanimous conclusion to their meeting, The Infrastructure Security Partnership (TISP) was established as a non-profit partnership to facilitate a forum for advancing practice and policy for the protection of our nation’s critical infrastructure.

On Nov. 20, 2001, Lt. Gen. Robert B. Flowers, Commanding General and Chief of Engineers, U.S. Army Corps of Engineers, signed the Organizational Charter drafted by the partnership’s steering committee consisting of representatives from the American Institute of Architects, the Society of American Military Engineers, the American Society of Civil Engineers, the American Council of Engineering Companies, the Associated General Contractors of America, the U.S. Army Corps of Engineers, the Federal Facilities Council, the Federal Emergency Management Agency, and the Naval Facilities Engineering Command.

Country / Region Tags: 
Problem, Solution, SitRep, or ?: 

bRight: Taking Human-Machine Interaction to the Next Level

submitted by Samuel Bendett

gizmag.com - by Paul Ridden - July 16, 2013

Mozilla Ignite Challenge - Real-Time Emergency Response

                                                   (CLICK ON IMAGE BELOW TO ENLARGE)

      

mozillaignite.org - March 31, 2013

Mozilla Ignite is an open innovation challenge hosted by Mozilla and the National Science Foundation as part of the US Ignite initiative. The goal: imagine and build apps that show the full potential of next-generation networks, in areas that matter -- like healthcare, education, energy, manufacturing and public safety.

Real-Time Emergency Response - What problem are you intending to solve?

Detection, observation, and assessment of situations requiring intervention by emergency responders depends on high-quality "live" data.

(READ COMPLETE ARTICLE)

Country / Region Tags: 
Problem, Solution, SitRep, or ?: 

NSA Warned to Rein in Surveillance as Agency Reveals Even Greater Scope

NSA officials James Cole, Robert S Litt and John Inglis appear before House committee. Photograph: J Scott Applewhite/AP

NSA officials testify to angry House panel that agency can perform 'three-hop queries' through Americans' data and records

guardian.co.uk - by Spencer Ackerman - July 17, 2013

The National Security Agency revealed to an angry congressional panel on Wednesday that its analysis of phone records and online behavior goes exponentially beyond what it had previously disclosed.

John C Inglis, the deputy director of the surveillance agency, told a member of the House judiciary committee that NSA analysts can perform "a second or third hop query" through its collections of telephone data and internet records in order to find connections to terrorist organizations.

NSA warned to rein in surveillance as agency reveals even greater scope

Spender Ackerman in Washington

guadian.co.uk, Wednesday 17 July 2013


The National Security Agency revealed to an angry congressional panel on Wednesday that its analysis of phone records and online behavior goes exponentially beyond what it had previously disclosed.

John C Inglis, the deputy director of the surveillance agency, told a member of the House judiciary committee that NSA analysts can perform "a second or third hop query" through its collections of telephone data and internet records in order to find connections to terrorist organizations.

"Hops" refers to a technical term indicating connections between people. A three-hop query means that the NSA can look at data not only from a suspected terrorist, but from everyone that suspect communicated with, and then from everyone those people communicated with, and then from everyone all of those people communicated with....

FULL ARTICLE HERE

Anonymous claims hack of US's Fema in retaliation for 'implied threats'

Amanda Holpuch in New York
guardian.co.uk,  Wednesday, 17 July 2013

The Anonymous hacking collective claims it has compromised US Federal Emergency Management Agency (Fema) servers and has posted the contact information of people connected to the agency online.

Anonymous said it released the information because recent events, including the NSA surveillance revelations, have brought "oblique and cowardly implied threats against Anonymous very much back into the forefront of the hive's consciousness"....

FULL ARTICLE HERE

Geofeedia - Pioneering Location-Based Social Media Monitoring

geofeedia.com

Location-based streaming, search, monitoring, and analytics.

Create live, location-based social media streams, or “Geofeeds”. Once you create a Geofeed – by simply entering an address or drawing a boundary around a location on a map – you can search, monitor and analyze all social media activity from that location.

http://corp.geofeedia.com/company/how-it-works/

Country / Region Tags: 
Problem, Solution, SitRep, or ?: 

Pages

howdy folks
Page loaded in 0.693 seconds.