IBM i2 Integrated Law Enforcement: Technical Architecture and Deployment Guide
An IBM Redpaper publication
Published 17 November 2014
IBM Form #: REDP-5130-00
Authors: Wil Jamison, John Dowling
IBM® i2® Integrated Law Enforcement is an IBM Smarter Cities® solution that addresses the needs of modern-day law enforcement agencies. It is a solution framework that provides the individual capabilities of the products that comprise the solution and extended capabilities developed through the synergistic integration of those product components.
As a framework, IBM i2 Integrated Law Enforcement allows for the continuous expansion of capabilities by putting together building blocks within the system and integrating with new, external systems. In doing so, an organization can respond and adapt to its changing needs. Simply stated, the configuration, integration, and implementation of IBM i2 Integrated Law Enforcement and its components provide the tools for more effective law enforcement.
This IBM Redpaper™ publication explains the technology and the architecture on which the solution is built. Most importantly, this paper enables technical teams to install, configure, and deploy an instance of the i2 Integrated Law Enforcement solution using the product i2 Intelligent Law Enforcement V1.0.1.
This paper is targeted to solution architects, system and deployment engineers, security specialists, data management experts, system analysts, software developers and test engineers, and system administrators.
Readers of this paper will benefit from the IBM Redguide™ publication "Integrated Law Enforcement: A Holistic Approach to Solving Crime", REDP-5116.
Related Blog Posts
Table of contents
Chapter 1. Integrated Law Enforcement system overview
Chapter 2. Integrated Law Enforcement deployment
Chapter 3. Integrated Law Enforcement cross-component stitching
Chapter 4. Integrated Law Enforcement security
Chapter 5. Integrated Law Enforcement single sign-on
Chapter 6. Conclusion
Appendix A. Snippet of a sample statement of work proposal
Others who read this publication also read
Follow IBM Redbooks
Follow IBM Redbooks