FloodAlerts

Last updated

FloodAlerts is a software application, developed by software specialists Shoothill, which takes real-time flooding information, and displays the data on an interactive Bing map, updating and warning its users when they, their premises or the routes they need to travel could be at risk of flooding.

Contents

History

FloodAlerts was launched in 2012, originally as the world’s first Facebook flood warning app.[ citation needed ]

Operation

FloodAlerts is made available free of charge to individuals. Users are able to set up their own monitored locations and receive alerts via the application or their Facebook wall if the locations they are monitoring are at imminent risk of flooding.

Hosted in the Cloud, using the Microsoft Windows Azure platform, the FloodAlerts application processes the data received from the Environment Agency, automatically creates the required map tiles, pins and alerts and displays them on an interactive Bing map, updating the content every 15 minutes. Users are able to see the latest information on the map without having to refresh their browser.[ citation needed ]

FloodAlerts can also be provided as a customised risk management solution to businesses that require infrastructure or asset safety monitoring in areas where water levels are rising or receding.[ citation needed ]

Awards and recognition

FloodAlerts has received The Guardian and Virgin Media Business’s 2012 Innovation Nation Awards [1] and was shortlisted as a finalist for a further two national awards: the UK IT Industry Awards for Innovation and Entrepreneurship [2] and The Institution of Engineering and Technology Innovation Awards for Information Technology. [3]

In the press

The FloodAlerts application was reviewed on the BBC website. [4] [5] It was also reviewed on BBC Click. [4]

Related Research Articles

<span class="mw-page-title-main">Instant messaging</span> Form of computer communication over the internet or locally

Instant messaging (IM) technology is a type of synchronous computer-mediated communication involving the immediate (real-time) transmission of messages between two or more parties over the Internet or another computer network. Originally involving simple text message exchanges, modern IM applications and services tend to also feature the exchange of multimedia, emojis, file transfer, VoIP, and video chat capabilities.

<span class="mw-page-title-main">Esri</span> Geospatial software & SaaS company

Environmental Systems Research Institute, Inc., doing business as Esri, is an American multinational geographic information system (GIS) software company headquartered in Redlands, California. It is best known for its ArcGIS products. With a 40% market share in 2011, Esri is one of the world's leading supplier of GIS software, web GIS and geodatabase management applications.

<span class="mw-page-title-main">Telematics</span> Interdisciplinary field that encompasses telecommunications

Telematics is an interdisciplinary field encompassing telecommunications, vehicular technologies, electrical engineering, and computer science. Telematics can involve any of the following:

<span class="mw-page-title-main">Scareware</span> Malware designed to elicit fear, shock, or anxiety

Scareware is a form of malware which uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software. Scareware is part of a class of malicious software that includes rogue security software, ransomware and other scam software that tricks users into believing their computer is infected with a virus, then suggests that they download and pay for fake antivirus software to remove it. Usually the virus is fictional and the software is non-functional or malware itself. According to the Anti-Phishing Working Group, the number of scareware packages in circulation rose from 2,850 to 9,287 in the second half of 2008. In the first half of 2009, the APWG identified a 585% increase in scareware programs.

<span class="mw-page-title-main">Microsoft MapPoint</span> Discontinued software by Microsoft

Microsoft MapPoint is a discontinued software program and service created by Microsoft that allows users to view, edit and integrate maps. The software and technology are designed to facilitate the geographical visualization and analysis of either included data or custom data. Numerous acquisitions have supplemented both data and feature integration.

Browser hijacking is a form of unwanted software that modifies a web browser's settings without a user's permission, to inject unwanted advertising into the user's browser. A browser hijacker may replace the existing home page, error page, or search engine with its own. These are generally used to force hits to a particular website, increasing its advertising revenue.

<span class="mw-page-title-main">Bing Maps</span> Web mapping service from Microsoft

Bing Maps is a web mapping service provided as a part of Microsoft's Bing suite of search engines and powered by the Bing Maps Platform framework which also support Bing Maps for Enterprise APIs and Azure Maps APIs. Since 2020, the map data is provided by TomTom, OpenStreetMap and others.

<span class="mw-page-title-main">Microsoft Advertising</span> Online advertising service

Microsoft Advertising is an online advertising platform developed by Microsoft, where advertisers bid to display brief ads, service offers, product listings and videos to web users. Provides pay per click advertising on search engines Bing, Yahoo! and DuckDuckGo, as well as on other websites, mobile apps, and videos.

<span class="mw-page-title-main">DeskSpace</span> Virtual desktop management software

DeskSpace, formerly known as Yod'm 3D is a virtual desktop manager available for Windows XP, Vista, 7 and 8.

Ushahidi is an open source software application which utilises user-generated reports to collate and map data. It uses the concept of crowdsourcing serving as an initial model for what has been coined as "activist mapping" – the combination of social activism, citizen journalism and geographic information. Ushahidi allows local observers to submit reports using their mobile phones or the Internet, creating an archive of events with geographic and time-date information.

<span class="mw-page-title-main">Here Technologies</span> Netherlands-based mapping data company

Here Technologies is a Dutch multinational group specialized in mapping technologies, location data, and related automotive services to individuals and companies. It is majority-owned by a consortium of German automotive companies and American semiconductor company Intel whilst other companies also own minority stakes. Its roots date back to U.S.-based Navteq in 1985, which was acquired by Finland-based Nokia in 2007. Here is currently based in The Netherlands.

Trapster was a navigation social networking mobile application and website, provided for free, that maps out and alerts users in real time to the presence of live police speed traps, DUI checkpoints, traffic, red light cameras, speed cameras, and areas where police often hide. Further, it allows users to record trip data and share it via the web, including interfaces with Facebook and Twitter. Trapster was recognized by Time Magazine as one of the 10 Best iPhone Apps for Dads in June 2009. In addition, Wired listed Trapster as the number 1 application in their 10 Mobile Applications that Make the Most of Location and CNET named Trapster as their number 1 free iPhone automotive app.

Security information and event management (SIEM) is a field within computer security that combines security information management (SIM) and security event management (SEM) to enable real-time analysis of security alerts generated by applications and network hardware. SIEM systems are central to the operation of security operations centers (SOCs), where they are employed to detect, investigate, and respond to security incidents. SIEM technology collects and aggregates data from various systems, allowing organizations to meet compliance requirements while safeguarding against threats.

Cambashi is an Anglo-American industry analyst firm, focused on the market for Information Technology in the manufacturing, distribution, energy, utilities and construction industries. The company serves both suppliers and users of Information technology. It provides advisory services suppliers in its field, especially in the fields of Product Lifecycle Management and Industrial Automation applications such as Manufacturing Operations Management.

<span class="mw-page-title-main">Toyota Entune</span> Multimedia system for Toyota automobiles

Toyota Entune is an integrated multimedia navigation and telematics system for Toyota automobiles that provides satellite-based information on traffic, weather, sports scores, stocks, and fuel prices via subscription through SiriusXM. When connected to a compatible mobile phone running the Entune app via radio or USB cable, the system provides a browser and other apps, including music services such as iHeartRadio, Pandora and XM Satellite Radio. The cell phone app supported iOS, Android, and Blackberry with different versions utilizing cell data. The system could be controlled with (limited) speech recognition, and optionally include the “Safety Connect” personalization system.

Cloud collaboration is a method of sharing and co-authoring computer files via cloud computing, whereby documents are uploaded to a central "cloud" for storage, where they can then be accessed by other users. Cloud collaboration technologies allow users to upload, comment and collaborate on documents and even amend the document itself, evolving the document. Businesses in the last few years have increasingly been switching to use of cloud collaboration.

In the field of information security, user activity monitoring (UAM) or user activity analysis (UAA) is the monitoring and recording of user actions. UAM captures user actions, including the use of applications, windows opened, system commands executed, checkboxes clicked, text entered/edited, URLs visited and nearly every other on-screen event to protect data by ensuring that employees and contractors are staying within their assigned tasks, and posing no risk to the organization.

Code Shikara is a computer worm, related to the Dorkbot family, that attacks through social engineering.

A cloud access security broker (CASB) is on-premises or cloud based software that sits between cloud service users and cloud applications, and monitors all activity and enforces security policies. A CASB can offer services such as monitoring user activity, warning administrators about potentially hazardous actions, enforcing security policy compliance, and automatically preventing malware.

<span class="mw-page-title-main">Advertising revenue</span> Income from displaying online ads

Advertising revenue is the monetary income that individuals and businesses earn from displaying paid advertisements on their websites, social media channels, or other platforms surrounding their internet-based content. In September 2018, the U.S Internet advertising market was estimated to be worth $111 billion, with market share being held mostly between Google, Facebook, Amazon, and Microsoft. These companies earn revenue through online advertising but also have initiated pathways for individual users and social media influencers to earn an income. Individuals and businesses can earn advertising revenue through advertising networks such as Google AdSense, YouTube monetization, or Outbrain.

References

  1. "Innovation Nation Awards - Winners | Innovation Nation Awards | Guardian Professional". Guardian. 2012-05-31. Retrieved 2013-07-06.
  2. "2012 shortlist - The UK IT Industry Awards 2013". Ukitindustryawards.co.uk. Archived from the original on 2013-03-25. Retrieved 2013-07-06.
  3. "The IET Excellence and Innovation Awards". innovationawards.theiet.org. Retrieved 2023-07-04.
  4. 1 2 "FloodAlerts Facebook Application Featured on BBC Click's Webscape". YouTube. 2012-06-11. Retrieved 2013-07-06.
  5. "Real-time flood map goes online in England and Wales", BBC News (Technology), 6 July 2012. Retrieved 2013-07-06.
Notes