Government Technology

Messaging System Links Texas Residents and Officials During Emergencies


Hurricane Ike struck in 2008, damaging or destroying every house on this street, which runs along Galveston Bay. Courtesy of Greg Henshall/FEMA.
Hurricane Ike struck in 2008, damaging or destroying every house on this street, which runs along Galveston Bay. Courtesy of Greg Henshall/FEMA.

May 6, 2010 By

Photo: Hurricane Ike struck in 2008, damaging or destroying every house on this street, which runs along Galveston Bay. Courtesy of Greg Henshall/FEMA.


The Alvin, Texas, public library was to be the voting site for a city election on April 28, but a two-alarm fire earlier in the morning forced officials to move voting to City Hall. The transition went smoothly, thanks to the city's community notification system that was already in place.

"The particular area where the early voting was talking place suffered smoke damage, so we had to move the early voting to City Hall," said Capt. Terry Lucas, the city's emergency management coordinator. The fire and resulting movement of voting demonstrated one of many uses for the notification system.

Alvin has had the system, known as Connect-CTY from Blackboard Connect, in place for two and a half years. The first major use of the system came as Hurricane Ike approached. During the response to the hurricane, Lucas sent 50 messages warning residents of the storm's approach and informing them of the city's preparations. Once Ike made landfall, Lucas sent messages letting residents know where and when they could pick up emergency supplies and meet with FEMA representatives.

In addition to notifications during emergencies, the city uses the system to inform residents of public hearings, street closures, city events and missing children.

Read more about Alvin's mass notification system at Emergency Management's website.

 


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Cybersecurity in an "All-IP World" Are You Prepared?
In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-IP world. Read how your cybersecurity strategies and attitudes compare with your peers.
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
Best Practice Guide for Cloud and As-A-Service Procurements
While technology service options for government continue to evolve, procurement processes and policies have remained firmly rooted in practices that are no longer effective. This guide, built upon the collaborative work of state and local government and industry executives, outlines and explains the changes needed for more flexible and agile procurement processes.
View All

Featured Papers