Facebook Could Save Your Life

Having your cell phone with you and the location setting activated can save your life in case of a disaster. First responders use now a special Facebook service when conducting rescue missions.

Disaster Maps launched by Facebook last June is a feature produced by its Data for Good division.

In fact, the media giant had already introduced Safety Check widget in late 2014, which earned kudos for allowing people in crisis zones to signal they’re safe. However, it appeared that search and rescue teams needed better situational awareness, real-time data that shows where the most vulnerable people are located.

To generate Disaster Maps, Facebook takes time-stamped snapshots of users’ geographic coordinates to show where they’re moving.

As a result, Disaster Maps provide aid groups with near real-time data visualisations of how users react as a calamity unfolds, allowing for a more dynamic response, where to stage resources, how to evacuate those who are stuck, and how to reach folks who check in as safe but are nonetheless uprooted.

The service gathers account signals into population heat maps, revealing when and where people cluster via a shared dashboard that only Facebook and vetted disaster response partners can view.

Facebook app users don’t need to do anything but have their phones with them and the location setting activated. Their data is aggregated and anonymous: The program scrubs the exact identity associated with each signal but still tracks movement, allowing for hourly updates on sheltering and evacuations.

So far, the tech giant and various external relief teams have deployed Disaster Maps during more than 100 worldwide crises that have occurred in the past year, including hurricanes Harvey, Irma, and Maria, the California wildfires, a cyclone in Chennai, and a volcano eruption in Bali. About a dozen nonprofits, including the World Food Programme and UNICEF, have committed to the service.

I-HLS:

You MIght Also Read: 

Cloud Video Architecture Improves Emergency Services Response:

Emergency Connection - Teachers & Police:

 

« Instagram Allows Users To Download Everything Shared
DNA Data Storage Moves Closer To Becoming Reality »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IDnext

IDnext

IDnext is the open and independent platform to support innovative approaches in the world of the Digital identity.

Quorum Cyber

Quorum Cyber

Quorum Cyber offer end-to-end cyber security solutions, specialising in Managed Security Services, Consulting and Resourcing.

Alyne

Alyne

Alyne is a Munich based 2B RegTech offering organisations risk insight capabilities through a Software as a Service.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

Veracity Industrial Networks

Veracity Industrial Networks

Veracity provides an innovative industrial network platform that improves the reliability, efficiency, and security of industrial networks and devices.

Char49

Char49

Char49 specialize in Penetration Testing, Red Team Assessment, Social Engineering and Security Research.

Advantio

Advantio

Advantio offers a unique combination of technologies and managed, advisory and testing services to increase your cyber resilience and compliance.

Spike Reply

Spike Reply

Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection.

Trusted Technologies and Solutions (TTS)

Trusted Technologies and Solutions (TTS)

TTS is a security consulting company specialised on business continuity and crisis management, information security management, information risk management and identity and access management.

HORNE

HORNE

HORNE is a professional services firm supporting clients in public, private & government sectors nationwide.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

Prelude

Prelude

Prelude offer the first autonomous platform built to attack, defend and train critical assets through continuous red-teaming.

Identity Digital

Identity Digital

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities.

Cyber-Security Council Germany

Cyber-Security Council Germany

The German Cyber Security Council's objective is to consult businesses, government agencies and political decision-makers and to support them against cybercrime.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.

Digital Encode

Digital Encode

Digital Encode is a leading consulting and integration firm that specializes in the design, management, and security of business-critical networks, telecommunications, and IT infrastructures.