Skip to main content

You are here

Registration

Registration:

To register, please visit the conference registration webpage at:

http://www.cvent.com/d/3gqtw3?RefID=Summary


Scholarship:

Application for Scholarship


=======
 

Participation by Individuals not at the conference

 

Individuals not at the conference can participate in three ways:

1) View webcasts of oral presentations of the papers listed in the conference Program.

2) Observe Threat Exercise. Each day of the conference (at times shown in the Program) we will be conducting a tabletop exercise addressing the decision-making process during the evolution of a FICTIONAL asteroid threat.  The FICTIONAL threat is described in a press release that will be updated each day of the conference (the press release for the first day is posted at this link). At the times noted in the Program, experts will present details about the threat as it evolves.  On Tuesday afternoon and Friday morning, conference participants will use information presented on those days to develop recommendations for actions that might be taken.  Recommended action will be presented to a leadership group, which will make final decisions on actions. We are very interested in collecting comments during the threat exercise (see below). 

3) Provide inputs.  After registering on this Google form, people not at the conference can send short text messages to the conference.  The primary goal is to collect comments and suggestions during the tabletop exercise. Messages will be collected, selectively distributed to relevant exercise groups, and points raised may be included, with the sender’s prior permission (see checkbox during feedback submission), in the summary report for the conference. Those who register and provide an email address will be provided an electronic copy of the summary report after the conference.

Day 1 (No panel discussions). Discovery of the threat (threat description currently available at.

  • First reactions

Day 2 (threat presentation and panel session). The threat level increases. 

  • Reaction to the threat from
    • People on the threat corridor
    • People well away from the threat corridor.
  • Suggestions for action by
    • Disaster mitigation agencies
    • Space agencies
    • World Leaders/Decisionmakers

Day 3 (Threat update only, no panel session): Threat level increases, threat corridor shrinks

  • Reaction to the threat from
    • People on the threat corridor
    • People well away from the threat corridor
  • Suggestions for actions by
    • Disaster Mitigation agencies
    • Space agencies
    • World Leaders/Decisionmakers.

Day 4 (Threat update only, no panel session):  Mitigation attempt

  • Reaction to the threat from
    • People on the threat corridor
    • People well away from the threat corridor
  • Suggestions for actions by
    • Disaster Mitigation agencies
    • Space agencies
    • World Leaders/Decision makers.

Day 5 (Discussions and Panel Session): Consequences

  • Reaction to the threat from
    • People on the threat corridor
    • People well away from the threat corridor
  • Suggestions for actions by
    • Disaster Mitigation agencies
    • Space agencies
    • World Leaders/Decision makers.




 





 

Software developed by Astronautical Society of India