SlideShare a Scribd company logo
1 of 2
Download to read offline
Let’s build a smarter planet Government
The Opportunity
To bring criminals to justice efficiently, law enforcement officers (LEOs)
must collaborate. Yet police forces across the country were working
in isolation, which inhibited them from sharing records and evidence
in a timely manner. Without a comprehensive view of crime and
investigation records from across the nation, police forces struggled to
link suspects with unsolved crimes. After a public inquiry confirmed
that the lack of timely intelligence and collaboration between police
forces had caused the primary suspect of a high-profile murder case to go
unidentified for two weeks, this public safety organization recognized the
need for a secure, centralized police intelligence system that could help
improve the efficiency of investigations.
What Makes It Smarter
By implementing a robust police intelligence system that establishes
clear visibility into records gathered from across the nation, this public
safety organization eliminated information-sharing barriers between
forces while improving the ability of LEOs to identify the most likely
suspects of crimes. The new solution integrates more than 1.5 billion
crime, custody, domestic violence and child-abuse records from
230 databases maintained by 49 police forces across the nation,
establishing a secure and centralized repository for important records.
Further, the new solution scans each record for data associated with
persons, objects, locations and events, running probabilistic algorithms
to group together records that most likely refer to the same individual.
By analyzing these groups, LEOs can connect potential suspects with
crimes, identify new patterns of criminal behavior and quickly take
action in an appropriate manner.
A public safety
organization
By implementing a solution that integrates criminal
records and helps link potential suspects with crimes,
this public safety organization has transformed the way
police bring criminals to justice.
What if unsolved crimes could be reduced
through timely and collaborative police
intelligence?
Real Business Results
•	 Accelerates information sharing between forces from up to two
weeks to less than 30 minutes, an improvement of 99 percent
•	 Empowers LEOs to link suspects with crimes and identify patterns
of criminal behavior more quickly, thereby enabling them to take
action earlier in investigations
•	 Fosters improved collaboration and greater force efficiency across
the country
For more information
Please contact your IBM sales representative or IBM Business Partner.
Visit us at: ibm.com/government
© Copyright IBM Corporation 2012
IBM Corporation
Software Group
Route 100
Somers, NY 10589
Produced in the United States
December 2012
IBM, the IBM logo, ibm.com and InfoSphere are trademarks of International
Business Machines Corp., registered in many jurisdictions worldwide. Other product
and service names might be trademarks of IBM or other companies. A current list of
IBM trademarks is available on the web at “Copyright and trademark information” at
ibm.com/legal/copytrade.shtml
This document is current as of the initial date of publication and may be changed by
IBM at any time. Not all offerings are available in every country in which IBM operates.
The performance data and client examples cited are presented for illustrative purposes
only. Actual performance results may vary depending on specific configurations and
operating conditions. THE INFORMATION IN THIS DOCUMENT IS
PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED,
INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR
CONDITION OF NON-INFRINGEMENT. IBM products are warranted according
to the terms and conditions of the agreements under which they are provided.
Please Recycle
IMC14798-USEN-00
Solution Components
•	 IBM® InfoSphere® Master Data
Management Standard Edition
•	 IBM Business Partner Logica

More Related Content

What's hot

Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinInternet Law Center
 
05S-30-cell phone summary
05S-30-cell phone summary05S-30-cell phone summary
05S-30-cell phone summaryBridget Butler
 
Online Advertising Legal Update 2014
Online Advertising Legal Update 2014Online Advertising Legal Update 2014
Online Advertising Legal Update 2014Internet Law Center
 
We're not appy, not appy at all!
We're not appy, not appy at all!We're not appy, not appy at all!
We're not appy, not appy at all!Tracy Green
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviewsaleenia23
 
Public policy legal issues to privacy
Public policy legal issues to privacyPublic policy legal issues to privacy
Public policy legal issues to privacyMuneeb Ahmed
 
Revamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActRevamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActDavid Sweigert
 
Crime in the Internet Age
Crime in the Internet AgeCrime in the Internet Age
Crime in the Internet Agesheilaschultz43
 
Trademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and MoreTrademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and MoreInternet Law Center
 
ICT (amendment) ordinance 2013
ICT (amendment) ordinance 2013ICT (amendment) ordinance 2013
ICT (amendment) ordinance 2013FM Associates
 
Presentation by Egya Kwamena Jallow to African Security Dialogue and Research
Presentation by Egya Kwamena Jallow to African Security Dialogue and ResearchPresentation by Egya Kwamena Jallow to African Security Dialogue and Research
Presentation by Egya Kwamena Jallow to African Security Dialogue and ResearchAmos Anyimadu
 

What's hot (19)

Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
05S-30-cell phone summary
05S-30-cell phone summary05S-30-cell phone summary
05S-30-cell phone summary
 
Online Advertising Legal Update 2014
Online Advertising Legal Update 2014Online Advertising Legal Update 2014
Online Advertising Legal Update 2014
 
CAN-SPAM at 5
CAN-SPAM at 5CAN-SPAM at 5
CAN-SPAM at 5
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
We're not appy, not appy at all!
We're not appy, not appy at all!We're not appy, not appy at all!
We're not appy, not appy at all!
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviews
 
Public policy legal issues to privacy
Public policy legal issues to privacyPublic policy legal issues to privacy
Public policy legal issues to privacy
 
Revamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActRevamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse Act
 
Crime in the Internet Age
Crime in the Internet AgeCrime in the Internet Age
Crime in the Internet Age
 
Sopa and pipa
Sopa and pipaSopa and pipa
Sopa and pipa
 
elec reporting
elec reportingelec reporting
elec reporting
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
Trademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and MoreTrademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and More
 
ICT (amendment) ordinance 2013
ICT (amendment) ordinance 2013ICT (amendment) ordinance 2013
ICT (amendment) ordinance 2013
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Communications
CommunicationsCommunications
Communications
 
Presentation by Egya Kwamena Jallow to African Security Dialogue and Research
Presentation by Egya Kwamena Jallow to African Security Dialogue and ResearchPresentation by Egya Kwamena Jallow to African Security Dialogue and Research
Presentation by Egya Kwamena Jallow to African Security Dialogue and Research
 

Similar to A Public Safety Organisation

NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementDavid Sweigert
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange ModelDavid Fletcher
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Aspiration Software LLC
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01lbadeniji
 
Edward Claughton Records Management
Edward Claughton Records ManagementEdward Claughton Records Management
Edward Claughton Records ManagementEdward Claughton
 
CXFIRE Brochure
CXFIRE Brochure CXFIRE Brochure
CXFIRE Brochure Connexica
 
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security EventIsrael Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security EventBarry Schuman
 
About Data Quality And Regulatory Compliance at FI - Shield
About Data Quality And Regulatory Compliance at FI - ShieldAbout Data Quality And Regulatory Compliance at FI - Shield
About Data Quality And Regulatory Compliance at FI - ShieldShield
 
Today's Records Management is Everyone's Business by Edward Claughton
Today's Records Management is Everyone's Business by Edward ClaughtonToday's Records Management is Everyone's Business by Edward Claughton
Today's Records Management is Everyone's Business by Edward ClaughtonEdward Claughton
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentationashishjoshi
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsDoubleHorn
 
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET Journal
 
Tools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft VictimsTools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft VictimsIDLegalAid
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docx
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docxRunning Head W6 Case StudiesW6 Case Studies- Business Intellige.docx
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docxjeffsrosalyn
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 

Similar to A Public Safety Organisation (20)

NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange Model
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01
 
Edward Claughton Records Management
Edward Claughton Records ManagementEdward Claughton Records Management
Edward Claughton Records Management
 
benfords Law
benfords Lawbenfords Law
benfords Law
 
CXFIRE Brochure
CXFIRE Brochure CXFIRE Brochure
CXFIRE Brochure
 
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security EventIsrael Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
 
Cis second draft
Cis second draftCis second draft
Cis second draft
 
About Data Quality And Regulatory Compliance at FI - Shield
About Data Quality And Regulatory Compliance at FI - ShieldAbout Data Quality And Regulatory Compliance at FI - Shield
About Data Quality And Regulatory Compliance at FI - Shield
 
Today's Records Management is Everyone's Business by Edward Claughton
Today's Records Management is Everyone's Business by Edward ClaughtonToday's Records Management is Everyone's Business by Edward Claughton
Today's Records Management is Everyone's Business by Edward Claughton
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
 
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDM
 
Tools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft VictimsTools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft Victims
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docx
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docxRunning Head W6 Case StudiesW6 Case Studies- Business Intellige.docx
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docx
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 

More from IBM Big Data and Analytics UK (15)

DFS and their analytics in the cloud
DFS and their analytics in the cloudDFS and their analytics in the cloud
DFS and their analytics in the cloud
 
L'Oreal MDM Story
L'Oreal MDM StoryL'Oreal MDM Story
L'Oreal MDM Story
 
Data, the World's new Natural Resource
Data, the World's new Natural ResourceData, the World's new Natural Resource
Data, the World's new Natural Resource
 
Big Data & Analytics – beyond Hadoop
Big Data & Analytics – beyond HadoopBig Data & Analytics – beyond Hadoop
Big Data & Analytics – beyond Hadoop
 
Soitec Solar Industries, LLC
Soitec Solar Industries, LLCSoitec Solar Industries, LLC
Soitec Solar Industries, LLC
 
Oxford Fertility Unit
Oxford Fertility UnitOxford Fertility Unit
Oxford Fertility Unit
 
National Grid
National GridNational Grid
National Grid
 
Irish Marine Institute
Irish Marine InstituteIrish Marine Institute
Irish Marine Institute
 
Huntsworth
HuntsworthHuntsworth
Huntsworth
 
GKN Land System
GKN Land SystemGKN Land System
GKN Land System
 
Electricity Supply Board
Electricity Supply BoardElectricity Supply Board
Electricity Supply Board
 
Dublin City Council - Congestion
Dublin City Council - CongestionDublin City Council - Congestion
Dublin City Council - Congestion
 
ASG World Wide
ASG World WideASG World Wide
ASG World Wide
 
Virgin atlantic
Virgin atlanticVirgin atlantic
Virgin atlantic
 
Rugby Football Union
Rugby Football UnionRugby Football Union
Rugby Football Union
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

A Public Safety Organisation

  • 1. Let’s build a smarter planet Government The Opportunity To bring criminals to justice efficiently, law enforcement officers (LEOs) must collaborate. Yet police forces across the country were working in isolation, which inhibited them from sharing records and evidence in a timely manner. Without a comprehensive view of crime and investigation records from across the nation, police forces struggled to link suspects with unsolved crimes. After a public inquiry confirmed that the lack of timely intelligence and collaboration between police forces had caused the primary suspect of a high-profile murder case to go unidentified for two weeks, this public safety organization recognized the need for a secure, centralized police intelligence system that could help improve the efficiency of investigations. What Makes It Smarter By implementing a robust police intelligence system that establishes clear visibility into records gathered from across the nation, this public safety organization eliminated information-sharing barriers between forces while improving the ability of LEOs to identify the most likely suspects of crimes. The new solution integrates more than 1.5 billion crime, custody, domestic violence and child-abuse records from 230 databases maintained by 49 police forces across the nation, establishing a secure and centralized repository for important records. Further, the new solution scans each record for data associated with persons, objects, locations and events, running probabilistic algorithms to group together records that most likely refer to the same individual. By analyzing these groups, LEOs can connect potential suspects with crimes, identify new patterns of criminal behavior and quickly take action in an appropriate manner. A public safety organization By implementing a solution that integrates criminal records and helps link potential suspects with crimes, this public safety organization has transformed the way police bring criminals to justice. What if unsolved crimes could be reduced through timely and collaborative police intelligence?
  • 2. Real Business Results • Accelerates information sharing between forces from up to two weeks to less than 30 minutes, an improvement of 99 percent • Empowers LEOs to link suspects with crimes and identify patterns of criminal behavior more quickly, thereby enabling them to take action earlier in investigations • Fosters improved collaboration and greater force efficiency across the country For more information Please contact your IBM sales representative or IBM Business Partner. Visit us at: ibm.com/government © Copyright IBM Corporation 2012 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States December 2012 IBM, the IBM logo, ibm.com and InfoSphere are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. The performance data and client examples cited are presented for illustrative purposes only. Actual performance results may vary depending on specific configurations and operating conditions. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. Please Recycle IMC14798-USEN-00 Solution Components • IBM® InfoSphere® Master Data Management Standard Edition • IBM Business Partner Logica