IBM i2 Integrated Law Enforcement: Technical Architecture and Deployment Guide

An IBM Redpaper publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 17 November 2014

  1. .EPUB (2.8 MB)
  2. .PDF (2.7 MB)

Google Play Books
Share this page:   

ISBN-10: 0738453978
ISBN-13: 9780738453972
IBM Form #: REDP-5130-00


Authors: Wil Jamison and John Dowling

    menu icon

    Abstract

    IBM® i2® Integrated Law Enforcement is an IBM Smarter Cities® solution that addresses the needs of modern-day law enforcement agencies. It is a solution framework that provides the individual capabilities of the products that comprise the solution and extended capabilities developed through the synergistic integration of those product components.

    As a framework, IBM i2 Integrated Law Enforcement allows for the continuous expansion of capabilities by putting together building blocks within the system and integrating with new, external systems. In doing so, an organization can respond and adapt to its changing needs. Simply stated, the configuration, integration, and implementation of IBM i2 Integrated Law Enforcement and its components provide the tools for more effective law enforcement.

    This IBM Redpaper™ publication explains the technology and the architecture on which the solution is built. Most importantly, this paper enables technical teams to install, configure, and deploy an instance of the i2 Integrated Law Enforcement solution using the product i2 Intelligent Law Enforcement V1.0.1.

    This paper is targeted to solution architects, system and deployment engineers, security specialists, data management experts, system analysts, software developers and test engineers, and system administrators.

    Readers of this paper will benefit from the IBM Redguide™ publication "Integrated Law Enforcement: A Holistic Approach to Solving Crime", REDP-5116.

    Table of Contents

    Chapter 1. Integrated Law Enforcement system overview

    Chapter 2. Integrated Law Enforcement deployment

    Chapter 3. Integrated Law Enforcement cross-component stitching

    Chapter 4. Integrated Law Enforcement security

    Chapter 5. Integrated Law Enforcement single sign-on

    Chapter 6. Conclusion

    Appendix A. Snippet of a sample statement of work proposal

     

    Others who read this also read