Cloud Crime Mapping: Top 3 Crime Mapping Startups to Watch in 2012

Cloud Crime Mapping: Top 3 Crime Mapping Startups to Watch in 2012

Cloud Crime Mapping

Crime Mapping is basically visualizing where crime happens on a map so that people can either avoid it or factor it in when calculating risk management. With big data such as crime and mapping predicted to be a major focus for Cloud computing in 2012, it offers great promise for many a startup in 2012. As such we have listed three of the more promising Crime Mapping Startups to watch for in 2012 which includes Crimedar, Mapacrime and Sgo (SureteGlobale.Org).

Crimedar.com

Designed to be more of a map-based online neighborhood watch, Crimedar.com currently covers several townships in the United States but it has the potential to cover global areas provided support for Crimedar grows enough to be sufficient in those areas. According to their site it is being marketed to law enforcement agencies as a custom crime map solution. For the general user, it is a free and easy to use yet interactive map of your neighborhood which you can then view and report crime 24/7 (according to the site this includes the usual crimes of theft, burglary, robbery, assault, arson, vandalism, gunfire and suspicious or threatening behavior).

The site uses Microsoft’s Silverlight technology to run the whole shebang (so you need to have it installed first to use it) while the maps are based on those from Bing. The information on these interactive maps can be shared on Facebook and Twitter along with other platforms. If your community is not covered you can create a map for your community by yourself, which basically makes this a crowd-sourced crime mapping system. However, spreading the word or marketing for your Crimedar community map is still your own prerogative with no visible signs that the site will do the marketing for your specific community just yet. While the technology and ease of use makes it very promising, it still remains to be seen whether or not it will catch on.

Sgo (SureteGlobale.org)

Sgo or SureteGlobale.org is a company in France that has had a history of two years helping Police Forces, Fire brigades and cities in France to deal with Crime Mapping, Predictive/Forecasting Crime Mapping and Crime Policing. The actual crime mapping startup was started by Pascal Frion two months ago and is aimed more at the enforcement agencies than the general public. According to their demo videos the main tool for crime mapping will be called Hotspot Map Commander and will provide a downloadable geographical analysis format .kml file that will interact with Google Earth or Microsoft Visual Earth to show the areas where crime is high. The main site shows that it can display more than just this but hasn’t showcased this in any demo videos just yet.

However, while their focus may be less public based, they provide more expertise in the field of criminology than some other startups. According to them they combine unique criminal behavior algorithms to help provide a clearer picture or analysis of the crime mapping in the area. Unlike some other sites, they only have demo videos to show for now but their experience in the field is promising to say the least. Again, only time will tell if a more professional approach is the answer to Crime Mapping for 2012 but we will see.

Mapacrime

Covering all corners of the globe Mapacrime.com targets Pakistan and the areas surrounding it. Based on the idea of Harassmap.org (which is a similar mapping site but more focused on harassment) Mapacrime was launched in August 2011. Members of the public are encouraged to report acts of crime happening to them or to others through the site. While this does make the crime mapping at the site crowd-sourced it is more of an actual crime mapping site than a tool like some other crime mapping startups.

So far the site has yet to reach its peak but it still perseveres by offering crime related statistics and news in the area for visitors to the site. Apart from a general zoomable map, the site also provides alerts based on area which it will email to respective submitters.

Other Crime mapping sites of note include the Trulia Crime Maps which acquired the Movity startup for its geo-data aggregation technology to help enable this feature. Since the Trulia Crime Maps is more of an offshoot of the Trulia real-estate site it was not included in the list above.

By Muz Ismail

Sorry, comments are closed for this post.

Comic
The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to helping teams win…

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do I am not going to mention names in this article, but if you want to be the best, you must look at what the best do – and do it better. The importance of investing in SaaS onboarding can be easily overlooked in favor of designing efficient and powerful software…

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data Future Today’s organizations should become more collaborative, virtual, adaptive, and agile in order to be successful in complex business world. They should be able to respond to changes and market needs. Many organizations found that the valuable data they possess and how they use it can make them different than others. In fact,…

Big Data’s Significant Role In Fintech

Big Data’s Significant Role In Fintech

Data Banking Fintech covers a range of financial fields such as retail banking, investments, and lending and thanks to the mobile and internet innovations of late is a thriving sector. Offering improvements which drive customer satisfaction and education in an area previously inscrutable and dictated by gigantic inflexible corporations, fintech is helping put the power…

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Multi-Instance vs. Multi-Tenant The cloud is part of everything we do. It’s always there backing up our data, pictures, and videos. To many, the cloud is considered to be a newer technology. However, cloud services actually got their start in the late 90s when large companies used it as a way to centralize computing, storage,…

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Business Intelligence (BI) Software  How does your company track its data? It’s a valuable resource—so much so that it’s known as Business Intelligence, or BI. But using it, integrating it into your daily processes, that can be significantly difficult. That’s why there’s software to help. But when it comes to software, there are lots of…

Cukes and the Cloud

Cukes and the Cloud

The Cloud, through bringing vast processing power to bear inexpensively, is enabling artificial intelligence. But, don’t think Skynet and the Terminator. Think cucumbers! Artificial Intelligence (A.I.) conjures up the images of vast cool intellects bent on our destruction or at best ignoring us the way we ignore ants. Reality is a lot different and much…

Ransomware’s Great Lessons

Ransomware’s Great Lessons

Ransomware The vision is chilling. It’s another busy day. An employee arrives and logs on to the network only to be confronted by a locked screen displaying a simple message: “Your files have been captured and encrypted. To release them, you must pay.” Ransomware has grown recently to become one of the primary threats to…