SlideShare uma empresa Scribd logo
1 de 23
UN GLOBAL PULSE: Product Harnessing innovation to protect the vulnerable Sara Farmer Chief Platform Architect, UN Global Pulse Executive Office of the Secretary-General United Nations Headquarters New York, NY
Global Pulse has a clear vision and an ambitious mission our vision Close the information gap between the onset of a crisis and the availability of actionable information for decision makers our mission Harness innovation to protect the vulnerable
Which stocks would you buy today… … if this were all you knew? Dow-Jones Index 2001-2008
The Information Gap When the global economic crisis hit in 2008, world leaders needed to know how the crisis was affecting vulnerable populations. That turned out to be a bit of a problem.
Household-level stats take months to collect, and years to validate!
The information gap is real… ? First data becomes available
… as are its consequences.
“ Tracking” progress on the Millennium Development Goals
Yet during the global crisis, the world also changed in truly wondrous ways
Real-time “data exhaust” “ the incidental, or ambient data that is created as a by-product of simply carrying on with our daily lives ” ,[object Object],[object Object],[object Object],[object Object],[object Object]
Global Pulse Products: Real-time monitoring framework Open platform architecture Local innovation labs
1. Data and Analysis
Shared analytical framework on vulnerability Global Pulse Analytical Framework ,[object Object],[object Object],What is vulnerability? ,[object Object],[object Object],[object Object],How do we measure it? ,[object Object],[object Object],[object Object]
Analysis doesn't happen without data Open and Generated Data ,[object Object],[object Object],[object Object],[object Object],UN and Government Data ,[object Object],[object Object],[object Object],[object Object],[object Object],Private and Donated Data ,[object Object],[object Object],[object Object],[object Object],[object Object]
Analysis & Visualisation Methods Collaborative analysis ,[object Object],[object Object],Big Data methods ,[object Object],[object Object],Traditional methods ,[object Object],[object Object],Test case: food insecurity (2008, 2011)
2. Platform and Tools
Global Pulse will add new tools to traditional approach to transform vulnerability monitoring 1. Establish Baseline 2. Monitor baseline 3. Investigate anomalies 4. Respond Traditional indicators  (Statistical vulnerability indicators) Proxy indicators  (Non-traditional indicators of vulnerability) Active monitoring  (ongoing door to door surveys) Passive monitoring (Real time observation of data streams) Physical verification  (on site investigation via for eg. ad hoc household survey) Community/Network alert (Make community leaders sensitive to potential event) Response Baseline is established based on traditional and proxy indicators. This baseline may include a model of the risk terrain Baseline is monitored actively and passively for anomalies and changes Teams investigate anomalies to verify vulnerability events If vulnerabilities are identified then responses is mobilized and targeted If vulnerability corroborated Physical verification  (on site investigation via for eg. ad hoc household survey) Traditional Approach New tools
Pulse Collaboration Platform ,[object Object],[object Object],[object Object]
Pulse Collaboration Platform
3. Innovation and Labs
Innovation labs have four roles ,[object Object],[object Object],[object Object],[object Object]
Linked to local communities! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You  http://unglobalpulse.org/ @unglobalpulse ,[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

VOST Teams: Dispatchers of the Future?
VOST Teams: Dispatchers of the Future?VOST Teams: Dispatchers of the Future?
VOST Teams: Dispatchers of the Future?Cheryl Bledsoe
 
Digital Volunteers and Emergency Management
Digital Volunteers and Emergency Management Digital Volunteers and Emergency Management
Digital Volunteers and Emergency Management Patrice Cloutier
 
Talk for NextGen October 2013
Talk for NextGen October 2013Talk for NextGen October 2013
Talk for NextGen October 2013Laura James
 
Open data for aid and development
Open data for aid and developmentOpen data for aid and development
Open data for aid and developmentmysociety
 
Virtual VOAD: Creating and Operating Virtual Social Media Teams for VOADs
Virtual VOAD: Creating and Operating Virtual Social Media Teams for VOADsVirtual VOAD: Creating and Operating Virtual Social Media Teams for VOADs
Virtual VOAD: Creating and Operating Virtual Social Media Teams for VOADsScott Reuter
 
Knowing Your Place - Smart Education - Schools - AC18
Knowing Your Place - Smart Education - Schools - AC18Knowing Your Place - Smart Education - Schools - AC18
Knowing Your Place - Smart Education - Schools - AC18Esri UK
 
Introduction to FSU VOST - Spring 2013
Introduction to FSU VOST - Spring 2013Introduction to FSU VOST - Spring 2013
Introduction to FSU VOST - Spring 2013David Merrick II
 
ICCM 2013 Panel 1: What's so Big about Big Data?
ICCM 2013 Panel 1: What's so Big about Big Data?ICCM 2013 Panel 1: What's so Big about Big Data?
ICCM 2013 Panel 1: What's so Big about Big Data?Tom Weinandy
 
#GSMCon2016 Virtual Team Presentation
#GSMCon2016 Virtual Team Presentation#GSMCon2016 Virtual Team Presentation
#GSMCon2016 Virtual Team PresentationCheryl Bledsoe
 
Building Data-centric Media Organizations
Building Data-centric Media OrganizationsBuilding Data-centric Media Organizations
Building Data-centric Media OrganizationsJ T "Tom" Johnson
 
New Zealand VOST Training Guide - 2012
New Zealand VOST Training Guide - 2012New Zealand VOST Training Guide - 2012
New Zealand VOST Training Guide - 2012Caroline Milligan
 
Show me the Data! Seminar on Innovative Approaches to Turn Statistics into K...
Show me the Data!  Seminar on Innovative Approaches to Turn Statistics into K...Show me the Data!  Seminar on Innovative Approaches to Turn Statistics into K...
Show me the Data! Seminar on Innovative Approaches to Turn Statistics into K...2Paths
 
Data Journalism - Introduction
Data Journalism - IntroductionData Journalism - Introduction
Data Journalism - IntroductionBahareh Heravi
 
Fact Checking & Information Retrieval
Fact Checking & Information RetrievalFact Checking & Information Retrieval
Fact Checking & Information RetrievalMatthew Lease
 
Big data and development
Big data and developmentBig data and development
Big data and developmentSimone Sala
 
Biosurveillance2.0 ranck digihealth feb 25
Biosurveillance2.0 ranck digihealth feb 25Biosurveillance2.0 ranck digihealth feb 25
Biosurveillance2.0 ranck digihealth feb 25Jody Ranck
 
The Good, the Bad and the Ugly: a portrait of health social media trends and ...
The Good, the Bad and the Ugly: a portrait of health social media trends and ...The Good, the Bad and the Ugly: a portrait of health social media trends and ...
The Good, the Bad and the Ugly: a portrait of health social media trends and ...Luis Fernandez Luque
 
Innovation, KM, and Data.gov
Innovation, KM, and Data.govInnovation, KM, and Data.gov
Innovation, KM, and Data.govJeanne Holm
 

Mais procurados (20)

VOST Teams: Dispatchers of the Future?
VOST Teams: Dispatchers of the Future?VOST Teams: Dispatchers of the Future?
VOST Teams: Dispatchers of the Future?
 
Digital Volunteers and Emergency Management
Digital Volunteers and Emergency Management Digital Volunteers and Emergency Management
Digital Volunteers and Emergency Management
 
Talk for NextGen October 2013
Talk for NextGen October 2013Talk for NextGen October 2013
Talk for NextGen October 2013
 
Open data for aid and development
Open data for aid and developmentOpen data for aid and development
Open data for aid and development
 
Virtual VOAD: Creating and Operating Virtual Social Media Teams for VOADs
Virtual VOAD: Creating and Operating Virtual Social Media Teams for VOADsVirtual VOAD: Creating and Operating Virtual Social Media Teams for VOADs
Virtual VOAD: Creating and Operating Virtual Social Media Teams for VOADs
 
Knowing Your Place - Smart Education - Schools - AC18
Knowing Your Place - Smart Education - Schools - AC18Knowing Your Place - Smart Education - Schools - AC18
Knowing Your Place - Smart Education - Schools - AC18
 
Introduction to FSU VOST - Spring 2013
Introduction to FSU VOST - Spring 2013Introduction to FSU VOST - Spring 2013
Introduction to FSU VOST - Spring 2013
 
ICCM 2013 Panel 1: What's so Big about Big Data?
ICCM 2013 Panel 1: What's so Big about Big Data?ICCM 2013 Panel 1: What's so Big about Big Data?
ICCM 2013 Panel 1: What's so Big about Big Data?
 
#GSMCon2016 Virtual Team Presentation
#GSMCon2016 Virtual Team Presentation#GSMCon2016 Virtual Team Presentation
#GSMCon2016 Virtual Team Presentation
 
VOST Training/Exercise Program - Epicenter Media & Training Info Deck
VOST Training/Exercise Program - Epicenter Media & Training Info DeckVOST Training/Exercise Program - Epicenter Media & Training Info Deck
VOST Training/Exercise Program - Epicenter Media & Training Info Deck
 
Building Data-centric Media Organizations
Building Data-centric Media OrganizationsBuilding Data-centric Media Organizations
Building Data-centric Media Organizations
 
New Zealand VOST Training Guide - 2012
New Zealand VOST Training Guide - 2012New Zealand VOST Training Guide - 2012
New Zealand VOST Training Guide - 2012
 
Show me the Data! Seminar on Innovative Approaches to Turn Statistics into K...
Show me the Data!  Seminar on Innovative Approaches to Turn Statistics into K...Show me the Data!  Seminar on Innovative Approaches to Turn Statistics into K...
Show me the Data! Seminar on Innovative Approaches to Turn Statistics into K...
 
Data Journalism - Introduction
Data Journalism - IntroductionData Journalism - Introduction
Data Journalism - Introduction
 
Fact Checking & Information Retrieval
Fact Checking & Information RetrievalFact Checking & Information Retrieval
Fact Checking & Information Retrieval
 
Big data and development
Big data and developmentBig data and development
Big data and development
 
Mis database 2
Mis database 2Mis database 2
Mis database 2
 
Biosurveillance2.0 ranck digihealth feb 25
Biosurveillance2.0 ranck digihealth feb 25Biosurveillance2.0 ranck digihealth feb 25
Biosurveillance2.0 ranck digihealth feb 25
 
The Good, the Bad and the Ugly: a portrait of health social media trends and ...
The Good, the Bad and the Ugly: a portrait of health social media trends and ...The Good, the Bad and the Ugly: a portrait of health social media trends and ...
The Good, the Bad and the Ugly: a portrait of health social media trends and ...
 
Innovation, KM, and Data.gov
Innovation, KM, and Data.govInnovation, KM, and Data.gov
Innovation, KM, and Data.gov
 

Semelhante a Global pulse technology

Global pulse technology summary
Global pulse technology summaryGlobal pulse technology summary
Global pulse technology summarySara-Jayne Terp
 
Framework for open data and impacts in agriculture and nutrition
Framework for open data and impacts in agriculture and nutritionFramework for open data and impacts in agriculture and nutrition
Framework for open data and impacts in agriculture and nutritiongodanSec
 
Big Data For Development A Primer
Big Data For Development A PrimerBig Data For Development A Primer
Big Data For Development A PrimerUN Global Pulse
 
Big data, democratized analytics and deep context,
Big data, democratized analytics and deep context, Big data, democratized analytics and deep context,
Big data, democratized analytics and deep context, CIDPNSI
 
Big Data, Democratized Analytics and International Development
Big Data, Democratized Analytics and International Development Big Data, Democratized Analytics and International Development
Big Data, Democratized Analytics and International Development CIDPNSI
 
What's Next: The World of Fake News
What's Next: The World of Fake NewsWhat's Next: The World of Fake News
What's Next: The World of Fake NewsOgilvy Consulting
 
Crowdsourcing and crowfeeding - second version
Crowdsourcing and crowfeeding - second versionCrowdsourcing and crowfeeding - second version
Crowdsourcing and crowfeeding - second versionAnahi Iacucci
 
"Big Data for Development: Opportunities and Challenges"
"Big Data for Development: Opportunities and Challenges" "Big Data for Development: Opportunities and Challenges"
"Big Data for Development: Opportunities and Challenges" UN Global Pulse
 
Lew Short emergency response & recovery conference
Lew Short emergency response & recovery conferenceLew Short emergency response & recovery conference
Lew Short emergency response & recovery conferenceBlackash Bushfire Consulting
 
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...Katie Whipkey
 
CDC 2.0: Using Social Media to Increase the Impact of CDC's Science / Forum O...
CDC 2.0: Using Social Media to Increase the Impact of CDC's Science / Forum O...CDC 2.0: Using Social Media to Increase the Impact of CDC's Science / Forum O...
CDC 2.0: Using Social Media to Increase the Impact of CDC's Science / Forum O...Forum One
 
What's up at Kno.e.sis?
What's up at Kno.e.sis? What's up at Kno.e.sis?
What's up at Kno.e.sis? Amit Sheth
 
Using Smart Technology to Improve Global Health Initiatives
Using Smart Technology to Improve Global Health InitiativesUsing Smart Technology to Improve Global Health Initiatives
Using Smart Technology to Improve Global Health Initiativesguestfddc18
 
Big Data for International Development
Big Data for International DevelopmentBig Data for International Development
Big Data for International DevelopmentAlex Rascanu
 
Presentation atun et al
Presentation atun et alPresentation atun et al
Presentation atun et alknow4drr
 
Using Behavioral Data - Netquest - NewMR May 22.pptx.pdf
Using Behavioral Data - Netquest - NewMR May 22.pptx.pdfUsing Behavioral Data - Netquest - NewMR May 22.pptx.pdf
Using Behavioral Data - Netquest - NewMR May 22.pptx.pdfRay Poynter
 
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Saurabh Mishra
 
Role of data science during covid times
Role of data science during covid timesRole of data science during covid times
Role of data science during covid timesTanyaAgarwal71
 
Social media gaucher
Social media gaucherSocial media gaucher
Social media gaucherRob Camp
 

Semelhante a Global pulse technology (20)

Global pulse technology summary
Global pulse technology summaryGlobal pulse technology summary
Global pulse technology summary
 
Framework for open data and impacts in agriculture and nutrition
Framework for open data and impacts in agriculture and nutritionFramework for open data and impacts in agriculture and nutrition
Framework for open data and impacts in agriculture and nutrition
 
Big Data For Development A Primer
Big Data For Development A PrimerBig Data For Development A Primer
Big Data For Development A Primer
 
Big data, democratized analytics and deep context,
Big data, democratized analytics and deep context, Big data, democratized analytics and deep context,
Big data, democratized analytics and deep context,
 
Big Data, Democratized Analytics and International Development
Big Data, Democratized Analytics and International Development Big Data, Democratized Analytics and International Development
Big Data, Democratized Analytics and International Development
 
What's Next: The World of Fake News
What's Next: The World of Fake NewsWhat's Next: The World of Fake News
What's Next: The World of Fake News
 
Crowdsourcing and crowfeeding - second version
Crowdsourcing and crowfeeding - second versionCrowdsourcing and crowfeeding - second version
Crowdsourcing and crowfeeding - second version
 
"Big Data for Development: Opportunities and Challenges"
"Big Data for Development: Opportunities and Challenges" "Big Data for Development: Opportunities and Challenges"
"Big Data for Development: Opportunities and Challenges"
 
Lew Short emergency response & recovery conference
Lew Short emergency response & recovery conferenceLew Short emergency response & recovery conference
Lew Short emergency response & recovery conference
 
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
 
CDC 2.0: Using Social Media to Increase the Impact of CDC's Science / Forum O...
CDC 2.0: Using Social Media to Increase the Impact of CDC's Science / Forum O...CDC 2.0: Using Social Media to Increase the Impact of CDC's Science / Forum O...
CDC 2.0: Using Social Media to Increase the Impact of CDC's Science / Forum O...
 
What's up at Kno.e.sis?
What's up at Kno.e.sis? What's up at Kno.e.sis?
What's up at Kno.e.sis?
 
Big datafordevelopment un-globalpulsejune2012
Big datafordevelopment un-globalpulsejune2012Big datafordevelopment un-globalpulsejune2012
Big datafordevelopment un-globalpulsejune2012
 
Using Smart Technology to Improve Global Health Initiatives
Using Smart Technology to Improve Global Health InitiativesUsing Smart Technology to Improve Global Health Initiatives
Using Smart Technology to Improve Global Health Initiatives
 
Big Data for International Development
Big Data for International DevelopmentBig Data for International Development
Big Data for International Development
 
Presentation atun et al
Presentation atun et alPresentation atun et al
Presentation atun et al
 
Using Behavioral Data - Netquest - NewMR May 22.pptx.pdf
Using Behavioral Data - Netquest - NewMR May 22.pptx.pdfUsing Behavioral Data - Netquest - NewMR May 22.pptx.pdf
Using Behavioral Data - Netquest - NewMR May 22.pptx.pdf
 
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
 
Role of data science during covid times
Role of data science during covid timesRole of data science during covid times
Role of data science during covid times
 
Social media gaucher
Social media gaucherSocial media gaucher
Social media gaucher
 

Mais de Sara-Jayne Terp

Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Sara-Jayne Terp
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageSara-Jayne Terp
 
disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...Sara-Jayne Terp
 
Cognitive security: all the other things
Cognitive security: all the other thingsCognitive security: all the other things
Cognitive security: all the other thingsSara-Jayne Terp
 
The Business(es) of Disinformation
The Business(es) of DisinformationThe Business(es) of Disinformation
The Business(es) of DisinformationSara-Jayne Terp
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umarylandSara-Jayne Terp
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...Sara-Jayne Terp
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeleySara-Jayne Terp
 
Using AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworksUsing AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworksSara-Jayne Terp
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_secSara-Jayne Terp
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copySara-Jayne Terp
 
BSidesLV 2018 talk: social engineering at scale, a community guide
BSidesLV 2018 talk: social engineering at scale, a community guideBSidesLV 2018 talk: social engineering at scale, a community guide
BSidesLV 2018 talk: social engineering at scale, a community guideSara-Jayne Terp
 
Social engineering at scale
Social engineering at scaleSocial engineering at scale
Social engineering at scaleSara-Jayne Terp
 
engineering misinformation
engineering misinformationengineering misinformation
engineering misinformationSara-Jayne Terp
 
Online misinformation: they're coming for our brainz now
Online misinformation: they're coming for our brainz nowOnline misinformation: they're coming for our brainz now
Online misinformation: they're coming for our brainz nowSara-Jayne Terp
 
Sj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSara-Jayne Terp
 
Belief: learning about new problems from old things
Belief: learning about new problems from old thingsBelief: learning about new problems from old things
Belief: learning about new problems from old thingsSara-Jayne Terp
 
risks and mitigations of releasing data
risks and mitigations of releasing datarisks and mitigations of releasing data
risks and mitigations of releasing dataSara-Jayne Terp
 
Session 10 handling bigger data
Session 10 handling bigger dataSession 10 handling bigger data
Session 10 handling bigger dataSara-Jayne Terp
 

Mais de Sara-Jayne Terp (20)

Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...
 
Cognitive security: all the other things
Cognitive security: all the other thingsCognitive security: all the other things
Cognitive security: all the other things
 
The Business(es) of Disinformation
The Business(es) of DisinformationThe Business(es) of Disinformation
The Business(es) of Disinformation
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
 
Using AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworksUsing AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworks
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec
 
2020 09-01 disclosure
2020 09-01 disclosure2020 09-01 disclosure
2020 09-01 disclosure
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy
 
BSidesLV 2018 talk: social engineering at scale, a community guide
BSidesLV 2018 talk: social engineering at scale, a community guideBSidesLV 2018 talk: social engineering at scale, a community guide
BSidesLV 2018 talk: social engineering at scale, a community guide
 
Social engineering at scale
Social engineering at scaleSocial engineering at scale
Social engineering at scale
 
engineering misinformation
engineering misinformationengineering misinformation
engineering misinformation
 
Online misinformation: they're coming for our brainz now
Online misinformation: they're coming for our brainz nowOnline misinformation: they're coming for our brainz now
Online misinformation: they're coming for our brainz now
 
Sj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_belief
 
Belief: learning about new problems from old things
Belief: learning about new problems from old thingsBelief: learning about new problems from old things
Belief: learning about new problems from old things
 
risks and mitigations of releasing data
risks and mitigations of releasing datarisks and mitigations of releasing data
risks and mitigations of releasing data
 
Session 10 handling bigger data
Session 10 handling bigger dataSession 10 handling bigger data
Session 10 handling bigger data
 

Último

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Global pulse technology

  • 1. UN GLOBAL PULSE: Product Harnessing innovation to protect the vulnerable Sara Farmer Chief Platform Architect, UN Global Pulse Executive Office of the Secretary-General United Nations Headquarters New York, NY
  • 2. Global Pulse has a clear vision and an ambitious mission our vision Close the information gap between the onset of a crisis and the availability of actionable information for decision makers our mission Harness innovation to protect the vulnerable
  • 3. Which stocks would you buy today… … if this were all you knew? Dow-Jones Index 2001-2008
  • 4. The Information Gap When the global economic crisis hit in 2008, world leaders needed to know how the crisis was affecting vulnerable populations. That turned out to be a bit of a problem.
  • 5. Household-level stats take months to collect, and years to validate!
  • 6. The information gap is real… ? First data becomes available
  • 7. … as are its consequences.
  • 8. “ Tracking” progress on the Millennium Development Goals
  • 9. Yet during the global crisis, the world also changed in truly wondrous ways
  • 10.
  • 11. Global Pulse Products: Real-time monitoring framework Open platform architecture Local innovation labs
  • 12. 1. Data and Analysis
  • 13.
  • 14.
  • 15.
  • 17. Global Pulse will add new tools to traditional approach to transform vulnerability monitoring 1. Establish Baseline 2. Monitor baseline 3. Investigate anomalies 4. Respond Traditional indicators (Statistical vulnerability indicators) Proxy indicators (Non-traditional indicators of vulnerability) Active monitoring (ongoing door to door surveys) Passive monitoring (Real time observation of data streams) Physical verification (on site investigation via for eg. ad hoc household survey) Community/Network alert (Make community leaders sensitive to potential event) Response Baseline is established based on traditional and proxy indicators. This baseline may include a model of the risk terrain Baseline is monitored actively and passively for anomalies and changes Teams investigate anomalies to verify vulnerability events If vulnerabilities are identified then responses is mobilized and targeted If vulnerability corroborated Physical verification (on site investigation via for eg. ad hoc household survey) Traditional Approach New tools
  • 18.
  • 21.
  • 22.
  • 23.