This document summarizes IBM's i2 iBase software. iBase is a comprehensive repository application that enables collaborative teams of analysts to capture, analyze, and disseminate multi-source data. It provides an intuitive visual interface and powerful analytical functions to help analysts uncover hidden connections and deliver timely results. iBase can be configured for various data and workflow needs and is tightly integrated with IBM's i2 Analyst's Notebook for data entry, exploration, and disseminating findings. It incorporates search technology to help speed up decision making by prioritizing search results based on context.
The document discusses using web 2.0 tools for collaboration in the cloud. It defines collaboration 2.0 as adding distributed computing and collaboration platforms that allow for distance and asynchronicity. Benefits include social networks functioning as professional networks and blending synchronous and asynchronous work. Various categories of tools are covered, including social calendars, networking sites, bookmarking, desktops, wikis and documents. Examples like Google Docs, Dropbox and PBWorks are provided. The document advocates using these tools for projects, communication, organizing information and backups.
This document discusses various web browsers including their history, features, and statistics. It provides an introduction to web browsers and how they allow users to access information from web servers through a client program. The first browser was invented in 1990 by Tim Berners-Lee called WorldWideWeb. Key browsers discussed include Mosaic which was the first to display images inline, Chrome which is fast and simple, Firefox which provides tabbed browsing and extensions, Internet Explorer which started the first browser war, Opera which has speed dial and private browsing, and Safari which is optimized for Mac. Statistics from 2016 show Chrome as the leader at 69% followed by Firefox, Safari, Opera, and Internet Explorer.
This document describes a digital library system desktop application that allows users to search for and preview books, check availability, request new books, and view their records. The application has two modes for administrators and users. Administrators can add, delete, and edit data, as well as view and delete requested books. Users can search for books, check availability and view records, and add requests for new books. The system aims to enhance user interaction, reduce time finding books, and improve efficiency over a manual library system. It uses four database tables, Java programming, and has requirements for operating system, database, IDE, processor, memory, and input devices.
Business intelligence environments involve collecting data from various sources, transforming and organizing it using tools like ETL, and storing it in data warehouses or marts. This data is then analyzed using OLAP and reporting tools to provide useful information for business decisions. Setting up an effective BI environment requires understanding business requirements, defining processes, determining data needs, integrating data sources, and selecting appropriate tools and techniques. Careful planning and skilled people are needed to ensure the BI environment supports organizational goals.
Mail merge allows creating customized form letters, envelopes, or labels for multiple recipients. It involves creating a main document, specifying a data source with recipient information, and merging the data source into the main document. Some advantages are that it saves time and effort compared to individual documents and makes mass mailings simpler.
Wants to view the record of all students
Pre-Conditions The records of students are already added in the database.
Post-Conditions The record of all students is presented in tabular form.
Main Success Scenario 1. Admin selects the menu option to view record of all students.
2. LMS presents the record of all students in tabular form.
Alternative Flows: None
Technology Online web access is supported.
Special Requirements In case of high latency the response time may exceed up to 1 minute.
The System can support Urdu English and French language.
Open Issues If the site
This document discusses system vulnerabilities and security challenges. It explains that information systems are vulnerable due to hardware and software problems, disasters, and use outside a firm's control. The document outlines internet vulnerabilities like networks being open, email attachments, and IM messages lacking security. It also discusses wireless security challenges, malicious software, hackers/computer crimes like spoofing and denial of service attacks, and identity theft. The goal is to assess security and controls to safeguard information resources.
The document discusses networking concepts in Windows such as workgroups, computer names, user accounts, and sharing resources. It provides explanations of key terms and how to configure different sharing options in Windows like using the Public folder, mapping network drives, and sharing a local printer with the Homegroup. The document recommends using a wireless printer for a home network instead of sharing a local printer due to issues that can arise with permissions and speed when printing from another computer on the network.
The document discusses using web 2.0 tools for collaboration in the cloud. It defines collaboration 2.0 as adding distributed computing and collaboration platforms that allow for distance and asynchronicity. Benefits include social networks functioning as professional networks and blending synchronous and asynchronous work. Various categories of tools are covered, including social calendars, networking sites, bookmarking, desktops, wikis and documents. Examples like Google Docs, Dropbox and PBWorks are provided. The document advocates using these tools for projects, communication, organizing information and backups.
This document discusses various web browsers including their history, features, and statistics. It provides an introduction to web browsers and how they allow users to access information from web servers through a client program. The first browser was invented in 1990 by Tim Berners-Lee called WorldWideWeb. Key browsers discussed include Mosaic which was the first to display images inline, Chrome which is fast and simple, Firefox which provides tabbed browsing and extensions, Internet Explorer which started the first browser war, Opera which has speed dial and private browsing, and Safari which is optimized for Mac. Statistics from 2016 show Chrome as the leader at 69% followed by Firefox, Safari, Opera, and Internet Explorer.
This document describes a digital library system desktop application that allows users to search for and preview books, check availability, request new books, and view their records. The application has two modes for administrators and users. Administrators can add, delete, and edit data, as well as view and delete requested books. Users can search for books, check availability and view records, and add requests for new books. The system aims to enhance user interaction, reduce time finding books, and improve efficiency over a manual library system. It uses four database tables, Java programming, and has requirements for operating system, database, IDE, processor, memory, and input devices.
Business intelligence environments involve collecting data from various sources, transforming and organizing it using tools like ETL, and storing it in data warehouses or marts. This data is then analyzed using OLAP and reporting tools to provide useful information for business decisions. Setting up an effective BI environment requires understanding business requirements, defining processes, determining data needs, integrating data sources, and selecting appropriate tools and techniques. Careful planning and skilled people are needed to ensure the BI environment supports organizational goals.
Mail merge allows creating customized form letters, envelopes, or labels for multiple recipients. It involves creating a main document, specifying a data source with recipient information, and merging the data source into the main document. Some advantages are that it saves time and effort compared to individual documents and makes mass mailings simpler.
Wants to view the record of all students
Pre-Conditions The records of students are already added in the database.
Post-Conditions The record of all students is presented in tabular form.
Main Success Scenario 1. Admin selects the menu option to view record of all students.
2. LMS presents the record of all students in tabular form.
Alternative Flows: None
Technology Online web access is supported.
Special Requirements In case of high latency the response time may exceed up to 1 minute.
The System can support Urdu English and French language.
Open Issues If the site
This document discusses system vulnerabilities and security challenges. It explains that information systems are vulnerable due to hardware and software problems, disasters, and use outside a firm's control. The document outlines internet vulnerabilities like networks being open, email attachments, and IM messages lacking security. It also discusses wireless security challenges, malicious software, hackers/computer crimes like spoofing and denial of service attacks, and identity theft. The goal is to assess security and controls to safeguard information resources.
The document discusses networking concepts in Windows such as workgroups, computer names, user accounts, and sharing resources. It provides explanations of key terms and how to configure different sharing options in Windows like using the Public folder, mapping network drives, and sharing a local printer with the Homegroup. The document recommends using a wireless printer for a home network instead of sharing a local printer due to issues that can arise with permissions and speed when printing from another computer on the network.
iTOP is an open source IT operations portal designed with ITIL best practices in mind. It allows users to document IT infrastructure, manage incidents, changes, and services. The presentation highlights iTOP's modules for configuration management, incident management, change management, and service management. Specifically, it describes how iTOP can be used to manage contacts, locations, infrastructure like servers and applications, and track the lifecycles of incidents, changes, and services.
Migrating From Applets to Java Desktop Apps in JavaFXBruno Borges
This document discusses migrating from Java applets to Java desktop applications using JavaFX. It begins with a brief history of why applets were used and how their future is tied to browser support. It then discusses how to seamlessly migrate an applet-based application to a Java desktop application using JavaFX that embeds the original website and allows it to reuse existing Java code. Finally, it discusses distribution options for the new Java desktop application model.
Lesson 5: Information Systems PresentationKereen Tatham
This document discusses information systems and their role in organizations. It defines an information system as a set of components that collect, process, and disseminate data to meet organizational objectives. Information systems support decision making at different management levels - operational, tactical, and strategic. Transaction processing systems handle basic business transactions, management information systems provide routine reports, and decision support systems aid complex problem solving. The document also outlines security, privacy, and ethical issues with information systems, and how systems are used in key business functions like finance, marketing, and human resources.
This document provides an overview of basic computer security practices and outlines 10 good practices for securing computers and data. It discusses the importance of protecting restricted data, backing up files regularly, using strong passwords, practicing safe email and internet habits, and physically securing computers and data. It emphasizes that computer security is a shared responsibility and outlines specific steps users should take to maintain security.
The document discusses file management and organization on a computer operating system. It describes the hierarchical structure of directories and files, different views for organizing files and folders, naming conventions for files including filename extensions, and file paths to indicate a file's location. It also outlines common file management actions like opening, copying, moving, renaming and deleting files, as well as utility programs for tasks like changing desktop settings, installing/uninstalling programs, compressing files, cleaning disks, and backing up systems.
This document discusses database system security and outlines several key areas to focus on:
1. Secure the database itself by managing users, passwords, privileges and roles.
2. Secure the database management system (DBMS) by patching known vulnerabilities and controlling access to system files and directories.
3. Secure applications that interface with the database to prevent attacks like SQL injection.
It also briefly outlines the importance of securing the operating system, web server, and network environment that interact with the database system. A lab exercise is proposed to examine security in these different areas of an Oracle database deployment.
The document discusses auditing IT infrastructure including hardware, networks, and telecommunications devices. It provides details on objectives of IT audits such as assessing continuity, management/maintenance, and security of systems. It also discusses standards and guidelines for auditing such as CobiT, ISO 27001, and reviewing hardware assets, network design, security, backups, and telecommunication agreements and invoices.
Web hosting involves companies that maintain servers to allow users to put websites on the internet. When choosing a web host, it is important to consider factors like data storage needs, technical support availability, uptime guarantees, security measures offered, and platform flexibility. Potential hosts should be contacted directly to assess customer service before signing up. Hidden fees, transfer limits, and lengthy contracts are things to watch out for.
This document provides an overview of Active Directory (AD) in Windows Server 2019. It describes what AD is, when and why it is used, and how to configure and manage it. Key components of AD are discussed such as domains, organizational units, group policy, backups. AD services like certificate services, domain services, and federation services are also summarized. The document provides best practices for using group policy and designing the AD structure.
This document provides an overview of the Online University Registration System (OURS) project. It introduces the development team and their roles. It describes the problems with the current manual course registration system, including that it is complicated, time-consuming, and prone to errors. The vision is for OURS to improve effectiveness and reduce time/costs for course registration. Key users are students, academic staff, and financial staff. The document outlines project risks such as time constraints and inexperience. Features will include online course registration and viewing academic records, while ensuring only authorized staff can manage registration information.
Files and folders are used to organize data on a computer. A file is a collection of data that is stored together and can be given a name, type, and location. Files are organized into folders, also called directories, to further group them together. The location and name of a file, including the file type extension, allows the computer to identify and retrieve the correct file when needed. Maintaining an organized folder structure with descriptive file names is important for efficiently finding and working with files on a computer.
To understand the need and importance of
Office Automation Systems
To understand the benefits of paperless Office
To know about the components of Office
Automation
To study the concept of Office Information
System
This document provides an overview of database concepts. It discusses the traditional approach to data management versus the database approach. The traditional approach leads to problems like data redundancy, inconsistency, and inability to share data. A database management system addresses these issues by allowing centralized data storage and shared access. Key topics covered include data modeling, the relational database model, database administration, popular DBMSs, and emerging concepts like data warehousing, data mining and business intelligence.
Data backup involves copying files and data to external or online storage so they are preserved if the original files are lost or damaged. Reasons for data loss include hardware failures, viruses, file corruption, and disasters. The main purpose of data backup is to avoid data loss of important financial, customer, and company information that would be difficult to replace. Backup options include external drives, internal drives, department servers, online backup sites, and cloud storage services.
This document provides an introduction to web hosting and different hosting plan options. It discusses why having a website and hosting it is important for business online presence, lead generation, and reach. It then describes several hosting plan types including shared hosting, dedicated hosting, VPS hosting, cloud hosting, and reseller hosting. The document concludes by offering tips for choosing a hosting provider, such as considering disk space, technical support availability, hardware, user interface, email capabilities, flexibility to scale, and cost.
The document discusses role and user management in IT360 Enterprise and Professional Editions. It defines roles as controlling authorization to modules while users control authentication to the application. There are 11 predefined roles and 8 users in IT360 with varying levels of access. A role-user matrix shows which users are associated with which roles and a role-module matrix maps roles to the read/write privileges they provide for each module. The presentation explains how to create new custom roles and users and associate them.
This document provides an in-depth explanation of group policy, including:
- The basics of group policy, computer vs. user policies, and preferences vs. policies
- Organizational units and how they allow grouping and targeting of group policies
- Creating, linking, and editing group policies, including mapping network drives as an example
- Using the group policy modeling wizard to validate policy configuration
The document describes a library management system created by Purbanchal University students to systematically manage library records and transactions. The system allows users to add, modify, delete, search, issue, and deposit books. It also tracks member details. The system aims to make the library management process faster and less error-prone compared to a manual system. It uses functions, header files, and other programming elements to manage the database of books and members. Some areas for improvement include tracking whether students have returned all books before deleting records and calculating overdue fines.
Data virtualization allows applications to access and manipulate data without knowledge of physical data structures or locations. Teiid is a data virtualization system comprised of tools, components and services for creating and executing bidirectional data services across distributed, heterogeneous data sources in real-time without moving data. Teiid includes a query engine, embedded driver, server, connectors and tools for creating virtual databases (VDBs) containing models that define data structures and views. Models represent data sources or abstractions and must be validated and configured with translators and resource adapters to access physical data when a VDB is deployed.
Next Gen Analytics Going Beyond Data WarehouseDenodo
Watch this Fast Data Strategy session with speakers: Maria Thonn, Enterprise BI Development Manager, T-Mobile & Jonathan Wisgerhof, Smart Data Architect, Kadenza: https://goo.gl/J1qiLj
Your company, like most of your peers, is undoubtedly data-aware and data-driven. However, unless you embrace a modern architecture like data virtualization to deliver actionable insights from your enterprise data, the worth of your enterprise data will diminish to a fraction of its potential.
Attend this session to learn how data virtualization:
• Provides a common semantic layer for business intelligence (BI) and analytical applications
• Enables a more agile, flexible logical data warehouse
• Acts as a single virtual catalog for all enterprise data sources including data lakes
iTOP is an open source IT operations portal designed with ITIL best practices in mind. It allows users to document IT infrastructure, manage incidents, changes, and services. The presentation highlights iTOP's modules for configuration management, incident management, change management, and service management. Specifically, it describes how iTOP can be used to manage contacts, locations, infrastructure like servers and applications, and track the lifecycles of incidents, changes, and services.
Migrating From Applets to Java Desktop Apps in JavaFXBruno Borges
This document discusses migrating from Java applets to Java desktop applications using JavaFX. It begins with a brief history of why applets were used and how their future is tied to browser support. It then discusses how to seamlessly migrate an applet-based application to a Java desktop application using JavaFX that embeds the original website and allows it to reuse existing Java code. Finally, it discusses distribution options for the new Java desktop application model.
Lesson 5: Information Systems PresentationKereen Tatham
This document discusses information systems and their role in organizations. It defines an information system as a set of components that collect, process, and disseminate data to meet organizational objectives. Information systems support decision making at different management levels - operational, tactical, and strategic. Transaction processing systems handle basic business transactions, management information systems provide routine reports, and decision support systems aid complex problem solving. The document also outlines security, privacy, and ethical issues with information systems, and how systems are used in key business functions like finance, marketing, and human resources.
This document provides an overview of basic computer security practices and outlines 10 good practices for securing computers and data. It discusses the importance of protecting restricted data, backing up files regularly, using strong passwords, practicing safe email and internet habits, and physically securing computers and data. It emphasizes that computer security is a shared responsibility and outlines specific steps users should take to maintain security.
The document discusses file management and organization on a computer operating system. It describes the hierarchical structure of directories and files, different views for organizing files and folders, naming conventions for files including filename extensions, and file paths to indicate a file's location. It also outlines common file management actions like opening, copying, moving, renaming and deleting files, as well as utility programs for tasks like changing desktop settings, installing/uninstalling programs, compressing files, cleaning disks, and backing up systems.
This document discusses database system security and outlines several key areas to focus on:
1. Secure the database itself by managing users, passwords, privileges and roles.
2. Secure the database management system (DBMS) by patching known vulnerabilities and controlling access to system files and directories.
3. Secure applications that interface with the database to prevent attacks like SQL injection.
It also briefly outlines the importance of securing the operating system, web server, and network environment that interact with the database system. A lab exercise is proposed to examine security in these different areas of an Oracle database deployment.
The document discusses auditing IT infrastructure including hardware, networks, and telecommunications devices. It provides details on objectives of IT audits such as assessing continuity, management/maintenance, and security of systems. It also discusses standards and guidelines for auditing such as CobiT, ISO 27001, and reviewing hardware assets, network design, security, backups, and telecommunication agreements and invoices.
Web hosting involves companies that maintain servers to allow users to put websites on the internet. When choosing a web host, it is important to consider factors like data storage needs, technical support availability, uptime guarantees, security measures offered, and platform flexibility. Potential hosts should be contacted directly to assess customer service before signing up. Hidden fees, transfer limits, and lengthy contracts are things to watch out for.
This document provides an overview of Active Directory (AD) in Windows Server 2019. It describes what AD is, when and why it is used, and how to configure and manage it. Key components of AD are discussed such as domains, organizational units, group policy, backups. AD services like certificate services, domain services, and federation services are also summarized. The document provides best practices for using group policy and designing the AD structure.
This document provides an overview of the Online University Registration System (OURS) project. It introduces the development team and their roles. It describes the problems with the current manual course registration system, including that it is complicated, time-consuming, and prone to errors. The vision is for OURS to improve effectiveness and reduce time/costs for course registration. Key users are students, academic staff, and financial staff. The document outlines project risks such as time constraints and inexperience. Features will include online course registration and viewing academic records, while ensuring only authorized staff can manage registration information.
Files and folders are used to organize data on a computer. A file is a collection of data that is stored together and can be given a name, type, and location. Files are organized into folders, also called directories, to further group them together. The location and name of a file, including the file type extension, allows the computer to identify and retrieve the correct file when needed. Maintaining an organized folder structure with descriptive file names is important for efficiently finding and working with files on a computer.
To understand the need and importance of
Office Automation Systems
To understand the benefits of paperless Office
To know about the components of Office
Automation
To study the concept of Office Information
System
This document provides an overview of database concepts. It discusses the traditional approach to data management versus the database approach. The traditional approach leads to problems like data redundancy, inconsistency, and inability to share data. A database management system addresses these issues by allowing centralized data storage and shared access. Key topics covered include data modeling, the relational database model, database administration, popular DBMSs, and emerging concepts like data warehousing, data mining and business intelligence.
Data backup involves copying files and data to external or online storage so they are preserved if the original files are lost or damaged. Reasons for data loss include hardware failures, viruses, file corruption, and disasters. The main purpose of data backup is to avoid data loss of important financial, customer, and company information that would be difficult to replace. Backup options include external drives, internal drives, department servers, online backup sites, and cloud storage services.
This document provides an introduction to web hosting and different hosting plan options. It discusses why having a website and hosting it is important for business online presence, lead generation, and reach. It then describes several hosting plan types including shared hosting, dedicated hosting, VPS hosting, cloud hosting, and reseller hosting. The document concludes by offering tips for choosing a hosting provider, such as considering disk space, technical support availability, hardware, user interface, email capabilities, flexibility to scale, and cost.
The document discusses role and user management in IT360 Enterprise and Professional Editions. It defines roles as controlling authorization to modules while users control authentication to the application. There are 11 predefined roles and 8 users in IT360 with varying levels of access. A role-user matrix shows which users are associated with which roles and a role-module matrix maps roles to the read/write privileges they provide for each module. The presentation explains how to create new custom roles and users and associate them.
This document provides an in-depth explanation of group policy, including:
- The basics of group policy, computer vs. user policies, and preferences vs. policies
- Organizational units and how they allow grouping and targeting of group policies
- Creating, linking, and editing group policies, including mapping network drives as an example
- Using the group policy modeling wizard to validate policy configuration
The document describes a library management system created by Purbanchal University students to systematically manage library records and transactions. The system allows users to add, modify, delete, search, issue, and deposit books. It also tracks member details. The system aims to make the library management process faster and less error-prone compared to a manual system. It uses functions, header files, and other programming elements to manage the database of books and members. Some areas for improvement include tracking whether students have returned all books before deleting records and calculating overdue fines.
Data virtualization allows applications to access and manipulate data without knowledge of physical data structures or locations. Teiid is a data virtualization system comprised of tools, components and services for creating and executing bidirectional data services across distributed, heterogeneous data sources in real-time without moving data. Teiid includes a query engine, embedded driver, server, connectors and tools for creating virtual databases (VDBs) containing models that define data structures and views. Models represent data sources or abstractions and must be validated and configured with translators and resource adapters to access physical data when a VDB is deployed.
Next Gen Analytics Going Beyond Data WarehouseDenodo
Watch this Fast Data Strategy session with speakers: Maria Thonn, Enterprise BI Development Manager, T-Mobile & Jonathan Wisgerhof, Smart Data Architect, Kadenza: https://goo.gl/J1qiLj
Your company, like most of your peers, is undoubtedly data-aware and data-driven. However, unless you embrace a modern architecture like data virtualization to deliver actionable insights from your enterprise data, the worth of your enterprise data will diminish to a fraction of its potential.
Attend this session to learn how data virtualization:
• Provides a common semantic layer for business intelligence (BI) and analytical applications
• Enables a more agile, flexible logical data warehouse
• Acts as a single virtual catalog for all enterprise data sources including data lakes
Thomas Rock has over 20 years of experience developing and administering applications on IBM i (AS/400, iSeries) platforms. He is highly skilled in RPG, ILE, SQL, and DB2 and has extensive experience designing and implementing modular applications, database structures, security practices, and integration projects. His background includes roles in project management, system administration, database administration, and programming for order entry, distribution, POS, and other business systems.
What are the features of SQL server standard editions.pdfDirect Deals, LLC
SQL Server Standard edition delivers core data management and business intelligence database for agencies and small organizations. It can help to process their applications and assists common advanced tools for on-premises and cloud-enabling effective database management with lesser IT resources. Visit Here: - https://www.directdeals.com/
IBM InfoSphere Information Server 8.1 is a unified platform for understanding, cleansing, transforming and delivering trustworthy information. It combines the technologies of components like the Information Server Console, Metadata Workbench, Business Glossary, DataStage & QualityStage, Information Analyzer and Information Services Director. The platform provides shared services for administration and reporting. Metadata services allow accessing and integrating data. Key components include the Metadata Server, Metadata Workbench and Business Glossary for managing metadata. DataStage & QualityStage is used for designing jobs to transform and cleanse data, while Information Analyzer helps understand data quality.
Demystifying the Cloud - BI Cloud WebinarEmtec Inc.
Oracle has traditionally leveraged its Oracle Business Intelligence Analytics toolset in order to offer enterprise wide analytical capabilities against its HCM & ERP applications. With its product offering of cloud-based Oracle Fusion applications, Oracle has packaged Oracle Transactional Business Intelligence (OTBI) and Oracle Transactional Business Intelligence Enterprise OTBI-E) as reporting solutions. And now with BICS as the stand-alone BI Cloud service, there seems to be a lot of confusion around what tool fits which needs.
• Can OTBI & OTBIE be considered a replacement for the analytical capabilities afforded by OBIA?
• What solution niche does BICS provide in this framework?
• Key similarities between OTBI, OTBIE, OBIA, and BICS
• Use Cases where a combination of the solutions becomes necessary
• Live Q&A with audience
Hosted by: Saad Syed, Director of Business Intelligence at Emtec
Oracle has traditionally leveraged its Oracle Business Intelligence Analytics toolset in order to offer enterprise wide analytical capabilities against its HCM & ERP applications. With its product offering of cloud-based Oracle Fusion applications, Oracle has packaged Oracle Transactional Business Intelligence (OTBI) and Oracle Transactional Business Intelligence Enterprise OTBI-E) as reporting solutions. And now with BICS as the stand-alone BI Cloud service, there seems to be a lot of confusion around what tool fits which needs.
• Can OTBI & OTBIE be considered a replacement for the analytical capabilities afforded by OBIA?
• What solution niche does BICS provide in this framework?
• Key similarities between OTBI, OTBIE, OBIA, and BICS
• Use Cases where a combination of the solutions becomes necessary
• Live Q&A with audience
Hosted by: Saad Syed, Director of Business Intelligence at Emtec
Business Intelligence is “a set of methodologies, processes, architectures, and technologies that transform raw data into meaningful and useful information used to enable more effective strategic, tactical, and operational insights and decision-making”.
New Innovations in Information Management for Big Data - Smarter Business 2013IBM Sverige
Big data has changed the IT landscape. Learn how
your existing IIG investment, combined with our
latest innovations in integration and governance, is a
springboard to success with big data use cases that
unlock valuable new insights. Presenter: David Corrigan, Big Data Specialist, IBM
Embed SQL Reporting into Any Web ApplicationBob Report
JReport is a business intelligence and reporting platform that allows users to embed SQL reporting into any web application. It offers high performance and scalability through intelligent push-down and in-memory cubes. The platform also provides self-service reporting, dashboards, and ad hoc analysis with a low learning curve. JReport can integrate with various data sources and be customized for embedding and deployment in different applications.
NLS Quest - BI Suite is a complete business intelligence solution that facilitates data integration, reporting, analysis, and dashboard setup through easy access to an organization's electronically stored data extracted in real-time. It provides flexible, reliable reporting and extractions through a drag-and-drop interface with high-level security and no modifications to the host database. The main components include N-Bridge for data extraction, reporting and dashboard designers, a data analysis engine, and a report server.
Embedded Reporting Tools to Enhance Your ApplicationBob Report
Learn how to seamlessly embed customizable, scalable BI reporting directly into your SaaS or on-premises application. Visualize data from any database, including NoSQL and Hadoop data sources. Create rich visual reporting elements on a whim and mash them up into interactive data visualizations. JReport empowers your business users with intuitive ad hoc reporting, dashboards and data analytics capabilities.
What Are The Best Databases for Web Applications In 2023.pdfLaura Miller
A database is used to store and manage structured & unstructured data in a system. Read the blog to know 2023's top seven databases for web applications.
IBM Cognos BI is a web-based reporting and analytics tool that allows users to perform data aggregation and create detailed, user-friendly reports. It provides flexible reporting and can be used by large and medium enterprises. Cognos benefits companies by leveraging data insights, offering scenario planning tools, transforming businesses to be more proactive, enabling easy dashboard creation, and allowing dynamic report design.
IBM Cognos BI is a web-based reporting and analytics tool that allows users to perform data aggregation and create detailed, user-friendly reports. It provides flexible reporting and can be used by large and medium enterprises. Benefits of Cognos include leveraging hidden data insights, scenario planning tools, transforming to a proactive organization, easy dashboard creation, and dynamic report design.
What Does Artificial Intelligence Have to Do with IT Operations?Precisely
This document provides an overview of artificial intelligence for IT operations (AIOps). It discusses how AIOps uses machine learning and analytics to help organizations better monitor and manage their IT infrastructure. Specifically, it notes that AIOps platforms ingest diverse infrastructure data, analyze it using statistics and machine learning, and apply what they learn to detect anomalies, understand relationships, and predict future behavior. The document also highlights that AIOps can help address long-standing challenges around setting SLAs, identifying potential problems, and planning infrastructure changes. Finally, it discusses how AIOps solutions must address mainframe and IBM i systems to provide a complete view of an organization's IT environment.
The document provides an overview of IBM's BigInsights product. It discusses how BigInsights can help businesses gain insights from large, complex datasets through features like built-in text analytics, SQL support, spreadsheet-style analysis, and accelerators for domain-specific analytics like social media. The document also summarizes capabilities of BigInsights like Big SQL, Big Sheets, Big R, and its text analytics engine that allow businesses to explore, analyze, and model large datasets.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
1. White Paper
IBM Software September 2012
IBM i2 iBase
Introduction
IBM® i2® iBase is a comprehensive repository application that is
designed to enable collaborative teams of analysts to capture, control,
and analyze multi-source data in a security-rich environment. Analysis
results are disseminated as actionable intelligence in support of
intelligence-led operations.
iBase is not just another repository. It provides an analytical
environment that is designed with investigative analysis in mind. Its
intuitive visual approach provides straightforward access to powerful
analytical functions. Developed through ongoing collaboration with law
enforcement, intelligence, national security, and commercial analysts
since it was first released in 1995. iBase:
• Helps uncover hidden connections faster to help analysts deliver timely
actionable results.
• Is highly configurable to suit data and operations oriented workflows
across an organization.
• Is tightly integrated with IBM® i2® Analyst’s Notebook® for
data entry, information exploration, and disseminating the findings
as charts.
iBase incorporates IBM i2’s Search 360 technology that helps speed up
informed decision making by searching for exact matches plus variants,
within structured and unstructured information. Results are prioritized
according to the context of the search, which can be across multiple
record types. Search 360 helps to reduce the time spent searching for
data, allowing more time for analysis, reducing the chance of oversights,
and data duplication.
Contents
1 Introduction
2 Who should read this
white paper
2 iBase module and data
storage types
3 Potential benefits of iBase
4 Key features of iBase
16 Optional features available
with iBase
18 Harnessing the power of iBase
with other IBM i2 products
19 Technical description
20 For more information
and contacts
2. White Paper
IBM Software September 2012
2
iBase models the world in terms of the links between entities,
for example between people and their associates. Data is
structured in the way that analysts think, facilitating:
• Increased analyst productivity.
• Lateral thought.
• Simplified identification of hidden data relationships.
iBase makes creating new repositories and defining how
you want to structure your data easier. With iBase Designer,
you can adapt to changing situations and more easily create
or modify your own multi-user repository without technical
expertise.
iBase customers in national security, law enforcement,
military intelligence and commercial organizations typically
deal with data that is highly sensitive. Comprehensive
security gives flexible control over your data, including the
following features:
• Access to iBase functions.
• Accessing or changing data.
• Provide audit details of who worked on the data and to see
the changes that were made to the data.
Who should read this white paper
This document is intended for analysts and business managers
who plan to use iBase for storing, visualizing, and analyzing
their data.
iBase modules and data storage types
There are two modules available in iBase, IBM® i2® iBase
Designer and IBM® i2® iBase User.
Use iBase Designer to design and edit your iBase schemas.
It provides the facilities to create and administer the security
files that contain user permissions. At least one iBase Designer
module is required for each implementation.
iBase gives you a choice of underlying data storage
technology:
• Microsoft Access, which gives organizations an analytical
capability for isolated or disconnected working. It is ideal
when there are only a few users and small quantities of data.
• Microsoft SQL Server, which provides a scalable, stable
platform for multi-user, organization-wide data sharing,
which minimizes both initial deployment and ongoing costs
of ownership.
• Using iBase Designer to upsize a repository from Microsoft
Access to SQL Server is straightforward.
There are significant variations in the range of features
available with Access and early versions of SQL Server. These
variations can be found in the areas of repository searches and
queries, use of case controlled data, and data loading. Other
limitations include coordinate import and conversion,
repository administration and auditing, and implementation
of the Extended Access Control security extensions.
3. White Paper
IBM Software September 2012
3
Microsoft SQL Server Storage
If Microsoft SQL Server is used for data storage, iBase is
suitable for large workgroups. It provides them with access
to a repository potentially containing terabytes of link-
entity data.
You need a SQL Server license for your server computer and
Client Access Licenses for each client computer. IBM does
not supply SQL Server licenses.
When used with a Microsoft SQL Server repository, iBase
provides the following extra functions:
• Search 360 (available only when used with Microsoft SQL
Server 2005, 2008, or 2012).
• Full Text Search including Name Variants.
• Semantic Queries.
• Alerting.
• Bulk Import (available only when used with Microsoft SQL
Server 2005, 2008, or 2012).
• Audit History.
• All features of the Extended Access Control option (including
the SCC function).
The following optional capabilities are available for
iBase User:
• IBM® i2® iBase Geographic Information System Interfaces.
• IBM® i2® iBase Plate Analysis.
An extra optional capability is available for iBase Designer:
• IBM® i2® iBase Database Replication (Microsoft SQL
Server repositories only)
Details of all these optional capabilities capabilities can be
found later in this document.
Microsoft Access Storage
When Microsoft Access is used for storage, iBase is suitable
for mobile users or small workgroups of up to five analysts.
Microsoft Access allows a maximum of two gigabytes of
link-entity data. Search 360, Semantic Queries, Alerting, Bulk
Import, the File loader, Audit History, and parts of Extended
Access Control security are not available. To use these
functions, you must upsize your Access repository to
Microsoft SQL Server.
You need a Microsoft Access license for each computer.
These licenses are not supplied by IBM.
The following optional capabilities are available for iBase
User and iBase Designer when Microsoft Access is used
for storage:
• iBase Geographic Information System Interfaces.
Details of all these optional capabilities can be found later in
this document.
Benefits of iBase
Productivity
• iBase helps uncover hidden connections faster to facilitate
analysts’ delivering timely actionable results.
• A singular user environment provides a wealth of analytical
tools and Search 360 technology to speed up informed
decision making. Search 360 helps overcome the difficulties
of finding connections that are concealed by variations of
structured and unstructured information across multiple
records. Search 360 increases the available time for analysis
and reduces the chance of oversights.
• iBase contains many features to enhance productivity,
including intuitive, targeted, configurable keyboard shortcuts
for quicker data entry and reduced fatigue from repetitive
tasks. Session defaults provide a further aid for recurring data
entry tasks.
• Design powerful queries easily. It is simple to create
complex queries without needing to learn a complicated
query language. Analysts interrogate the data rather than
wasting time trying to understand whether they posed the
intended question.
• By modeling the world in terms of the links between entities,
data is structured in a way that analysts think which
encourages lateral thought and increases analyst creativity.
• Analysts understand the terminology that is used which helps
reduce application complexity and training costs.
• Gain a greater understanding of electronic communication
data with the Cyber IP DNS Resolution module. The
module allows cyber data to be enhanced and analyzed
together with other intelligence in a single repository.
The Cyber IP DNS Resolution module presents you with
a complete view of data that pertains to an investigation.
4. White Paper
IBM Software September 2012
4
Collaboration
• iBase is highly configurable to suit data and operations
oriented workflows across an organization, including
distributed repositories. Its alerting capabilities ensure that
colleagues are aware of record accesses and changes that are
made by others.
• iBase breaks down the barriers of document-centric working
in Analyst’s Notebook charts, making it easier to share
information across teams and organizations.
• Share/exchange actionable intelligence across the global
intelligence community. XML import and export facilities
simplify data exchange between organizations.
• Identify patterns and connections in information that might
otherwise be missed by combining structured data from iBase
with information from Analyst’s Notebook charts, the de
facto application for visual analysis and briefing worldwide.
Charts can be from your own or other agencies.
Configurable off the shelf application
• The schema can be designed by your organization to meet
your data needs. Schemas are configured without need for
SQL or programming skills.
• Provides flexible storage solutions. Use either a Microsoft
Access or Microsoft SQL server repository based on your
organization’s needs.
• Comprehensively manages all your data. Benefit from a
scalable repository to handle ever increasing volumes of data.
Enforce security and integrity through administrative control
of audited user roles.
• Streamline data collection and management. The repository
can be populated by entering new data through tailored
worksheets, file imports, and transformations or by using
other IBM i2 applications.
• Organize your analysis. Create collections of information
that are relevant to your investigation.
• Easily hold data from multiple cases or investigations in one
place and uncover significant commonalities within or
between cases.
• Enhance iBase Search 360 with customizable synonyms that
reflect your organizations data search needs.
Enhance benefits from existing IBM i2 product
investment
• iBase can be used interactively with other IBM i2 products.
• iBase is tightly integrated with Analyst’s Notebook for data
entry, interactive information exploitation, searching and
browsing, and results dissemination in the form of charts.
• Optionally incorporate new high-resolution icons into your
schema to improve the appearance of charts that are
displayed in Analyst’s Notebook.
• iBase simplifies loading of Analyst’s Notebook charts,
which are included in Search 360 searches.
• The Chart Viewer enables the user to display charts
and search their contents without need to start
Analyst’s Notebook.
• Get the maximum value from your existing Analyst’s
Notebook charts by using the Chart Item Extractor to
deconstruct your charts into native iBase entities and links.
• A task pane gives users direct access to iBase functions
from within Analyst’s Notebook including direct access to
Search 360.
• Close integration with IBM® i2® Text Chart for giving
structure to documents, and other forms of unstructured
data.
Key features of iBase
Setting up
iBase Designer provides simple to use tools to define the
repository schema (data model) in terms that analysts
understand. You do not have to explain your repository
schema requirements to a busy IT department or an external
consultant, and then wait for them to schedule some time to
create or update it. Your repository schema can be designed
and implemented by an analyst.
Repository creation and maintenance tasks are simple. iBase
Designer creates a new repository without requiring any
knowledge of Access or SQL Server. IBM provides templates
to help you to get started quickly by adapting the schemas
supplied in the templates. You can add or remove entity and
link types and assign fields to store your data values.
5. White Paper
IBM Software September 2012
5
You can add and remove fields to entities and links, even when
there is existing data. However, you must delete entities, links,
and fields with care. To define a data field, you can choose
from a list of types. Each type has its own characteristics and
options that you set when a new field is created. The set of
options includes a size for text fields, a display format for text
and dates, default value, and a description.
Data fields can be defined to be:
• Indexed – which can increase the speed of searching on
the field.
• Mandatory – making it essential that the user enters a value
for the field before saving the record.
• Discriminators – contain information that makes a record
unique, for example a social security number. Used when
new data is added to avoid record duplications.
• Characteristics – fields that are useful for finding matching
records.
There are twenty-seven user-definable, system, and calculated
field types available to help you to design a schema that is
tailored to meet your data and analytical needs. These field
types include Text, Selected from Code List, Yes/No, Date,
Time, Multi-line Text, Real Number, Hyperlink, Create User,
and Calculated Date.
Additionally, iBase provides Standard fields. These fields are
defined once, and are then automatically added to each entity
and link type in your repository. Standard fields help
consistency and reduce the time that is needed to define and
maintain your repository schema.
iBase automatically constructs standard data entry and display
forms for each entity and link type that you define. It also
supports the creation of custom datasheets that can be
designed to streamline data entry, or provide a structured view
of the data. Custom datasheets are intuitively created and
configured with the iBase Designer tools. Defining them
requires no programming, or complex form definition
languages to learn. The example shows a multi-paged
datasheet that is designed to facilitate the input of crimes and
the vehicles that are associated with these crimes.
You can also control how entities are linked in order to reduce
data entry errors and simplify analysis. For example, you could
prohibit linking a “Telephone” entity to a “Car” entity with a
“Driver” link; but allow a “Car” entity to be linked to a
“Person” entity with a “Driver” link.
Foreign language analysis support
iBase provides support for analysts who work in a multi-
cultural environment as it is designed to support the storage,
searching, and retrieval of textual information in multiple
languages. Text in its native language can be stored alongside
translated values, facilitating back reference to the original,
enhancing data integrity and inter-agency working.
6. White Paper
IBM Software September 2012
6
• Built in import facilities, which are configurable to load data
from a wide variety of sources. You can import data from
your corporate repositories and also from a wide range of
external file formats, including Microsoft Office applications,
files from devices (mobiles, camcorders, for example) and
images (.bmp, .gif, .jpg).
–– During import, data is structured as entities and links
ready for analysis. The importing process allows data to
be transformed or converted as it is loaded. You can
standardize your date formats, convert classification
codes, transform geographical coordinates, or merge
and split source data fields. iBase can also import all
files from a folder and its subfolders where the files
share a common structure. File metadata can be
captured as part of the record during import.
• Chart item extractor can be used to create iBase entities,
links, and properties directly from existing Analyst’s
Notebook charts.
• When iBase is used with Microsoft SQL Server 2005 - 2012,
a Bulk Import utility speeds up the import of large quantities
of data.
In addition, automated data imports can be carried out using
the iBase Scheduler. The scheduler can be configured to run
imports automatically at selected times. Imports can be to be
carried out during off-peak periods, keeping the repository up
to date and to limit delays for interactive users. The iBase
Scheduler is also used with the Bulk Import utility to allow
overnight loading of large volumes of data.
iBase Chart Item Extractor
The iBase Chart Item Extractor takes items that are stored
in Analyst’s Notebook charts, and loads them into the iBase
data repository as individual entities and links. Chart item
properties are taken from the chart items and stored in
data fields.
Chart Item Extractor is useful where you have a number of
separate charts with related information stored in them. Once
the data is extracted from the charts into the repository, the
relationships and commonalities between items can be readily
analyzed and explored.
Data entry and manipulation
Once the schema is defined, you can quickly populate your
repository. Successful investigation and intelligence analysis
requires the ability to effectively store, manage, and retrieve
large volumes of disparate data within an investigation. iBase
makes it simple to get this information into your repository.
Populating iBase with data
iBase offers five modes for interactive data entry:
• Manually, using automatically generated forms or
custom datasheets.
• Using Text Chart to mark up entity-link visualizations that
are captured from unstructured text documents. Incorporate
the data directly into the repository from Text Chart during
mark-up, or by loading the completed visualization into
the repository.
7. White Paper
IBM Software September 2012
7
iBase can create a chart template to be used for creating new
charts. The template ensures an exact correlation between
chart items and the iBase data schema. When charts are being
created in a location remote from the iBase repository, the
template ensures that all captured information is extracted
into the iBase repository.
Chart Item Extractor is provided as a user installable option
for iBase.
The chart extraction process is configurable by the user,
giving control of how items in the chart are stored in the
repository, maximizing the value of your chart data. Where
there are no direct matches between the chart schema and the
repository schema information can still be extracted in a
structured format to an appropriate text field, where it is
searchable with Search 360.
Items that are extracted from a chart can be grouped as iBase
Sets to help manage the new information. Full traceability can
be maintained by optionally storing the original chart, as well
as links to all extracted items from the chart.
iBase database subsets
Database subsets allow the creation of iBase repositories that
are based on a subset of a master repository. Subsets are used
in field or tactical operations, where use of the whole master
repository would be inappropriate due to its size or security
considerations. iBase database subsets are ideal for use by
remote field operatives who capture new data for subsequent
entry into a master repository.
After master repository initialization, data is selected and
copied for a new subset iBase repository by using sets, queries
or both. Users can create and save bundles of queries and sets
in a group. Groups of queries and sets can be used to
repopulate a database subset or create a new one when
creating subsets is a regular operational procedure.
There is no restriction on the number of queries or sets that
can make up the data bundle for a new iBase database subset.
However, it must be noted that database subsets are designed
to support the creation of small iBase repositories for tactical
operations. The time that is taken to create and then
synchronize the subset repository is directly dependent on the
amount of data it holds.
Once created and populated, the subset repository can be used
in the field independently and later synchronized with the
master iBase repository.
8. White Paper
IBM Software September 2012
8
Once a user has access to a repository, they are subject to the
following types of security:
• Case control.
• Whole repository permissions to read or alter data.
• Command access or denial, and usage monitoring.
• Folder objects to provide workgroup and private storage of
analysis methods.
If you want to be sure that you are analyzing the data as it
stood at a point in time, you can make the entire repository
read-only. Analysts can create queries and sets but not change
any record details.
For enhanced data access security, the Extended Access
Control (EAC) feature provides control of data access on an
entity, field, or even individual record level (with Microsoft
SQL Server).
Case Control
iBase allows the data administrator to optionally create a
repository where records are organized into distinct cases.
Each case contains records that relate to a specific
investigation. The repository can contain many cases.
Analysts can be allocated to work on single cases with ‘single
case mode’, or use ‘multi-case mode’ for cross-case analysis.
Analysts are given access to one or more cases by the
repository or security administrator.
Single case mode enables users to undertake activities such as
entering and importing data, and analyzing events. With a
single case, the user focuses only on those entities and links
that relate to a particular investigation or a series of
investigations.
Multi-case mode enables users to work with each of their
allocated cases: for example, to query or report on data across
several cases. In this mode, data access is read-only. Users can
view records in all the cases to which they have access, but
they cannot add, modify or delete any records in the
repository.
During synchronization between the master and subset
repository, record change conflicts can occur. The conflicts
occur when a record is changed in both the master repository
and the subset repository. When synchronizing, the user has
two choices:
• Keep the master record changes, and discard the subset
record changes.
Or
• Keep the subset record changes, and discard the master
record changes. Optionally, the subset repository can be set
to expire after synchronization with the master iBase
repository.
Controlling access to your data
Because you can import data from a number of different
systems, you can analyze data from multiple sources at the
same time. For example, looking at both incident data and
intelligence data. By combining data from your entire
organization, you and other analysts can gain a complete
picture of the available data for more in-depth analysis. This
approach also allows different groups within the organization,
or even other organizations to share data. The iBase approach
allows data sharing while still maintaining control of who can
see the data.
To provide secure access, identifiers and passwords are used to
control access to repositories, either individually or as related
groups of repositories. iBase security administrators can set up
user name and password polices that can be applied globally
to each user account. Changes to these settings apply to all
users and allow the administrator to set up iBase security to
match the latest corporate security rules.
An alternative to applying global user name and password
policies is to allow iBase to work with Windows Active
Directory to provide a single sign-on for users. The user is
not prompted to enter a password if they have a valid account.
Administration costs are lowered through reduced security
administration workloads. The iBase login can be an active
directory user name or group.
9. White Paper
IBM Software September 2012
9
Working in single case or multi-case mode delivers the
following potential benefits:
• Enables the analyst to determine how they want to work with
their cases. In addition, it provides the administrator with the
ability to assign read-only analysts for cross-case analysis.
• Gives a focused or a broad view of the data in the repository
as appropriate, enabling users to uncover significant shared
references.
Case Control cannot be used with the optional iBase Database
Replication feature.
iBase Extended Access Control
The Extended Access Control (EAC) option provides greater
levels of data access control. You can control access
permissions that are related to entities, links, and fields in each
repository. iBase EAC enables fine control over how
individual pieces of data are made visible or changeable by
groups of users.
Controls that can be set up cover:
• Denying access or changes to all records for a particular
entity type or link type.
• Hiding administrative fields in records or making
administrative fields read-only to certain groups of users.
• Making selected records of various entity types or link types
inaccessible according to the Security Classification Code
(SCC) given to each record. SCC values can be defined that
are appropriate to your business, for example to deny access
to data that relates to particular investigative cases.
If protected by an iBase EAC setting, iBase completely
hides denied data items and does not reveal that they exist.
Using iBase EAC helps security managers to implement
an appropriate security policy to include close control of
data access.
iBase EAC gives your organization the following benefits:
• Assurance that data is protected from deliberate or accidental
change.
• Assurance that sensitive data is protected from inappropriate
viewing or other use.
• Simple and appropriate working environments for staff in
different functional areas or operational groups.
Note SCC values cannot be used with iBase when it is using
Microsoft Access for data storage or with case controlled
repositories.
Extended Access Control is provided as a user installable
option for iBase.
Recording access to your data
You may need to monitor who does what. The comprehensive
auditing that is built into iBase can record actions, identify
who reads the data, and can require a reason to be entered
when a user runs certain commands.
Auditing includes a history option that can record the before
and after values of any changes to the data.
10. White Paper
IBM Software September 2012
10
In addition, users with the necessary permissions can view the
changes that are made to a record and who made these
changes. To allow for confidential operations, security
administrators also have the option of hiding a person’s
activities from users who could otherwise view the audit
history of a record.
Analyzing your data
Once data is loaded into iBase, it can be analyzed with a wide
range of searching and analysis tools. Queries in iBase are
created by “drawing” your question; avoiding the necessity of
learning a complex query language.
You can perform powerful searches on your data with
wildcards, or use scored matches when not all identifiers are
known confidently. iBase repository data can be sent to other
integrated IBM i2 and third-party products, including the
award-winning Analyst’s Notebook, for powerful visualization
and analysis. Because iBase provides support for analytical
workgroups, facilities are provided for you to save, organize
and share queries, results and reports with others, or mark
them as private.
Query analysis
You can use the powerful query tool to quickly create queries
that are based on the questions you want to ask. Queries are
created without the need to learn a complex query language.
In the illustrated example, the user entered a description of a
person they are trying to find, together with the information
that is known about the target’s vehicle and telephone. The
query results show the people that match the query together
with their employer and family members.
Queries are powerful and can be used as building blocks for
complex analysis. Query definitions can be saved for reuse. To
increase the flexibility of saved queries, they can be defined to
prompt the user for condition values when they are run. The
results of one query can be used as input to another query.
Analysts appreciate this feature as individual queries can be
kept simple to understand and test, but when chained together
become very powerful. Query results can be used in other
analysis, display, or reporting activities. Sets can be used to
collect query results for later use.
11. White Paper
IBM Software September 2012
11
iBase is power2 enabled and supports semantic types; a way of
tagging information in order to allow intelligent matching on
the data. The example that is shown returns any entities that
match the semantic type “Person” who have a field of
semantic type “Person Last Name” beginning with “SMI”,
and who work at a certain organization. The results would
include both the “Person” and “Offender” entities. Semantic
functionality is available with a semantically typed Microsoft
SQL Server repository.
Sets
In iBase, a set is a collection of records for entities, links or
both. Entities and links can belong to more than one set. You
can use a set as a simple list of records to help you track your
analysis. Alternatively sets can be used to support further
analysis; as a source of records for scored matching, browsing,
queries, visualization, reporting, and exporting.
If several sets are created, perhaps looking for the same
entities and links by several different paths of analysis, iBase
can compare those sets to see which records occur in just one
set and, which occur in two or more sets.
Browsing
You can browse a list of records using browse definitions.
They can display each record of a particular type, the results
of a query or the contents of a set.
A user can specify which fields are relevant and which
columns the data is to be sorted by, and then save the
definition for reuse. Browse definitions can be set to run
automatically when the user next logs into iBase, displaying
any new or changed records.
12. White Paper
IBM Software September 2012
12
For an individual entity, you can browse its link relationships
with the link browser. Every link that is connected to the
entity and the entities at the end of these links are displayed.
The link browser is interactive, so that you can view the
attributes of links, or link’ ends, and investigate distant
relationships.
Scored matching
Scored matching provides a way of finding and listing relevant
records in ranked order so that you can identify how well
those records match multiple conditions. The result of a
scored match is a list of entities of one type, which is listed in
order of score; you can set a threshold value to exclude low
scoring entities from the list.
It is a powerful tool when several fields and values contribute
to what makes the records interesting to you.
Scored Matching saves you time, revealing significant leads
for an investigation by searching your repository for likely
suspects, when only a few characteristics are known.
Reporting
iBase reporting publishes lists of records on paper or in online
formats to communicate information from your repository to
colleagues or other organizations. You can specify simple
reports, with only a few fields or records, or highly
sophisticated reports that are based on complex templates.
Templates can be saved for your regular reports so that you
can present your analysis quickly and professionally. Reports
can be printed, or created directly to Microsoft Word.
Alternatively, reports can be posted to a web page, enabling
your team to act quickly, inform others and allocate resources.
iBase can also generate reports directly to Microsoft Access.
The experienced user can further customize the output, either
with the Access report design tools, or a third-party report
design tool. With Access reporting, the results of several
reports can be combined into a single Access database,
allowing reports to be created for more complex data
relationships.
Searching
There are several ways to search for text in an iBase
repository. The search options available depend on whether
you use Microsoft Access or SQL Server for data storage.
13. White Paper
IBM Software September 2012
13
Search 360
Available when SQL Server 2005 (or later) is used for data
storage, Search 360 is IBM i2’s most comprehensive search
technology ever. It helps users find records, documents, and
charts more quickly and easily in a single search. The results
are prioritized according to the context of the search, which
could be across multiple record types. The intuitive search
interface alleviates the need to understand the underlying data
structure.
The database administrator can configure which elements
within the repository schema are included in the Search 360
index. The administrator can choose to exclude either specific
fields or record types from the index, constraining Search 360
to the most appropriate fields for the analytical environment.
In this way both the size of the index, and the number of
spurious results, can be managed by the administrator.
In the figure above, the user searched for “Hendricks” and
entered “Rockville” as a related item. Search 360 found a
connection between a “Gene Hendricks” and “Rockville”
where “Rockville” was found in an address field of a location
record that is linked to the “Gene Hendricks” person record.
With a SQL Server iBase repository (SQL Server 2005 or
later), Search 360 finds records that match your search word
by various methods. Each indexed record in the repository is
searched, including records that contain embedded documents
and Analyst’s Notebook charts. With exact match searches,
allowances are made for letter case, punctuation, and accents
and word order.
You can also use Search 360 to find records that contain
similar text to your search words (a fuzzy match). The fuzzy
matching on text inside Search 360 is based on eighteen years
of intelligence and Law Enforcement experience. In this type
of search, allowances are made for typing mistakes, missing
spaces between words, spelling mistakes, name variants, and
abbreviations.
The synonyms that are used by Search 360 for fuzzy matching
can be tailored by the user to expand upon the default lists to
meet the specific needs of the organization, department, or
project. In addition, semantic types can be assigned to
synonym items to give words extra meaning, leading to
enhanced results from the existing Search 360 algorithms.
When Analyst’s Notebook is used with an iBase repository,
Search 360 can be directly accessed from the Analyst’s
Notebook task pane. Search results can be interactively added
to the chart without needing to switch back and forth between
programs.
Word Search
When Microsoft Access is used for data storage, the iBase
Word Search feature is used to search your repository. Word
Search quickly finds exact word matches, synonyms, and
words that sound similar to your search criteria, which is
useful for searching for spelling variations in names.
14. White Paper
IBM Software September 2012
14
Alerting
Effective investigation and intelligence exploitation is often
based on teamwork. iBase provides alerting facilities to notify
users, co-workers, and managers if a record of interest is
viewed in a record list, or returned via search, find, full-text
search or a query; or any other place a record can be displayed
in iBase.
With iBase alerting, users with appropriate permissions can
set up alerts for themselves or for sharing with others. Alerts
can be configured in several ways:
• Set up a named alert on a single record, on multiple records,
or on a query and mark it as “of interest”.
• Be informed when changes are made to a record marked as
“of interest”.
• That a query that is marked as “of interest” returns different
results to the last time it was run.
• Be informed of a change while they are using iBase or
optionally to receive notification via email.
When an alert occurs:
• A message is issued stating an iBase alert was triggered. The
alert notification shows the user specified name of the alert.
• Neither an iBase alert nor an email notification contains
record details, just a message that the specified alert was
triggered.
• Users are able to review a list of the records that triggered
the alerts. This list includes the user who accessed them.
Alerts are powerful in situations where multiple users share
common intelligence data. Alerting allows collaboration
where co-workers are studying the activities of common
persons or objects as part of separate investigations or
intelligence gathering tasks.
Data maintenance and export
iBase provides powerful functions to maintain your data once
it is stored in the repository. Sometimes it is necessary to
resolve duplicate records where multiple entities are created
for the same item, perhaps as a result of issues with the source
data. The Duplicate Records Checker makes it quick and easy
to identify these records and to resolve the duplicates, by
merging the multiple instances into a single instance. Each
associated link is reassigned as part of the process.
If your repository is semantically enabled, you can also use the
Analyst’s Notebook smart matching function to help identify
and merge duplicate iBase records that are displayed on an
Analyst’s Notebook chart.
15. White Paper
IBM Software September 2012
15
Batch functions are also provided to help with the deletion or
editing of multiple records, for example to change the value of
a field for all records in a set, or to delete entities that are
contained in the results of a query. The availability of these
batch commands is controlled by the iBase administrator.
iBase can be set up to help avoid data loss by overzealous
deletions.
The soft delete option in iBase means that data is not
permanently removed from the repository when it is deleted.
Soft deleted data can be restored if necessary by an
administrative user. Deleted records are permanently purged
by an administrator when it is confirmed they are no longer
required.
To provide data to non-iBase users, the export functions of
iBase are used. Data can be exported directly to Microsoft
Excel, or can be exported in formats that can be readily loaded
into other software. Users can save their export specifications
for reuse if necessary. The data to be exported can include
each record of a certain type, the contents of a set, or the
results of a query.
iBase Coordinate Extensions
Intelligence reports can contain coordinate data as part of the
information about an incident. The coordinates could be
recorded in a number of different coordinate formats, which
often depends on their source. The formats can include
MGRS, UTM, or Latitude/Longitude, and be based on a
number of different geographic datums, including WGS84,
ED50, and OSGB. In order to store the data in a format
suitable for mapping from iBase it was previously necessary to
manually convert the coordinates to a consistent format, and
also adjust them to an appropriate datum, for consistent and
accurate mapping.
The Coordinate Extensions option for iBase allows analysts,
without specialist knowledge of coordinate systems to enter
coordinates in their reported format, rather than requiring
them to convert the coordinates manually before entry.
Coordinates are validated as they are entered to limit user
errors, and then automatically converted and stored as
decimal degrees with a datum of WGS84. Coordinate
transformations can also be applied when data is imported
from a file.
In addition, when coordinates are analyzed in repositories it is
often difficult to determine how close other entities are to a
location of interest without sending the data to a map. Some
coordinate systems further compound this difficulty as they
can be given at different resolutions.
The Coordinate Extensions allow the analyst to build a
coordinate query. These queries can be based either on a
tolerance around a single point, or the opposing corners of a
bounding box. The user is able to specify the coordinate to
search around in any of the supported coordinate systems.
The results are reported directly in iBase without the need for
an external GIS application.
Coordinate Extensions is provided as a user installable option
for iBase.
Cyber IP DNS Resolution
Cyber IP DNS resolution enables information to be added to
Internet Protocol (IP) addresses stored in an iBase repository.
This additional information includes hostnames, server
geocodes, and spam blacklisting.
Cyber IP DNS resolution is provided as a user installable
option for iBase.
16. White Paper
IBM Software September 2012
16
iBase Schema Update
Schema Update enables a database administrator to apply an
iBase repository template to an existing iBase repository.
Schema Update modifies the repository schema to match the
template. Organizations can create copies of a central
repository for use at remote sites, and then update the
schemas of these “copy” repositories to match the central
repository as necessary.
In addition, the Schema Update functionality is used to
update folder objects, which include queries, import/export
specifications, and browse definitions from the central
repository. A central administrator, for example, can send out
a file of exported data records from the central repository,
along with a new template that contains a suitable import
specification to load the data. Templates and data can be sent
out on a CD, by FTP, WAN connection, or by email.
The updated template can then be applied to the remote
repositories. The provided import specification is then run to
load the exported data from the central repository. Remote
sites can be kept up to date with the central repository
without the need for a permanent direct network connection
or an expert iBase user.
Schema Update can be used only where each of the
repositories was created from the original source repository.
Changes must be applied universally to each copy of the
central repository. You cannot apply a template from a
different iBase repository; each template is checked for
compatibility before application.
Schema Update is provided as a user installable option for
iBase.
Product Access Management
iBase, along with other IBM i2 products, now includes an
optional feature for managing user access to the software to
help maintain your organizations compliance with the IBM i2
software agreement. For more information about access
management, see the IBM i2 Intelligence Analysis Portfolio
Product Access Management Guide.pdf.
Product Access Management is provided as a user installable
option for iBase.
Optional features available with iBase
To further expand the capabilities of iBase, more options are
available at extra cost. A brief overview of these options
follows along with some examples of how they can be used.
iBase Geographic Information System Interfaces
The iBase Geographic Information System (GIS) Interfaces
extend the visualization and analytical functions of iBase to
include investigation of geographical relationships.
Using one of the supported GIS applications, data can be
analyzed not only in its relationship to other data in the iBase
repository, but also in its geographical context. Spatial factors
such as road networks, communications lines, building density,
and physical barriers can be taken into account when the
information is analyzed.
The comprehensive GIS spatial analysis functions of your
chosen GIS application can be used to analyze your data, or
add extra data from other sources, which can be used with the
iBase information.
17. White Paper
IBM Software September 2012
17
You can visualize the interrelationship without the need for
complex data imports or in-depth knowledge of the GIS
Mapping application. The iBase data that is loaded into a GIS
application remains connected to the iBase repository so that
the results can be added to sets or further analyzed using Data
Miner or Analyst’s Notebook.
Supported GIS systems currently include Esri ArcGIS 9.0
- 10.1, Pitney Bowes MapInfo Professional 7.8 - 11.5, and
Microsoft MapPoint 2004 - 2011.
iBase Geographic Information System Interfaces is available
as an extra cost option for iBase.
iBase Plate Analysis
Information from automatic license plate recognition devices
provides organizations with significant opportunities to
increase their analytical capabilities. With these benefits, come
the challenges of unlocking that potential and maximizing
investment in camera technology.
iBase Plate Analysis allows organizations to build on their
investment and gain major advantages over siloed ALPR data
systems. These benefits are gained by combining and
analyzing license plate information with data from other
sources such as crime, intelligence, and incident recording
systems.
iBase Plate Analysis delivers a set of dedicated tools for
analyzing license plate information. The following tools are
included:
• Convoy Analysis – Identify vehicles that regularly pass
through the same cameras at similar times to a vehicle of
interest.
• Geographical Profiling – Compare license plate reads around
any number of event sites to discover vehicles that are seen at
two or more of the sites during the days and times that are
specified by the analyst.
• Find Common Vehicles – Analyze any number of sets that
contain read license plates to discover common vehicles of
interest to colleagues, or vehicles that appear in one or more
current or previous investigations.
• Combine Vehicle Data Sets – An analyst can accumulate
many sets when license plate records are analyzed. Combine
Vehicle Data Sets extends the iBase set analysis function to
allow the analyst to select as many sets as required and then
combine them for further analysis, such as profiling the
movements of all the vehicles that are associated with a
subject.
• Generate license plate list – Produce a list of license plate
numbers from license plate records held in the iBase
repository and use the list for Convoy Analysis, or as a filter
on an iBase query to cross-check license plates against, for
example, a list of vehicle makes, models and colors.
iBase Plate Analysis is available as an extra cost option
for iBase.
iBase Database Replication
Database Replication enables the process of automatically
distributing copies of iBase data between iBase repository
instances in different locations and keeping the data
synchronized. Database Replication can be used with iBase
data stored in Microsoft SQL Server repositories only. The
data is copied by use of Microsoft SQL Server replication,
utilizing the standard tools that are provided in SQL Server
Enterprise Manager.
Database Replication provides tools to simplify the
management of the replicated iBase repositories and make
available, across a distributed set of repositories, shared iBase
security, and auditing capabilities.
18. White Paper
IBM Software September 2012
18
Replication is a solution if your organization has the following
requirements:
• To copy and distribute data to one or more sites.
• To distribute data changes to other servers.
• To allow multiple users and sites to modify data, and then
merge the data modifications together, identifying and
resolving conflicts if they occur.
Organizations that would benefit from replication:
• Organizations with geographically distributed groups of
users who share common data.
• Organizations that operate separate iBase repositories to
overcome practical loading restrictions when large numbers
of network users simultaneously access the same repository.
Database Replication cannot be used with Case Control.
Database Replication is available as an extra cost option
for iBase.
Harnessing the power of iBase with other
IBM i2 products
iBase provides full integration with Analyst’s Notebook,
Text Chart, and the interfaces to GIS software. It can be
used alongside other IBM i2 products.
iBase is power2-enabled and supports semantic types; a way of
tagging information in order to allow intelligent matching on
the data. Assigning semantic types to iBase repositories is
optional. However, there are great advantages to using
semantic types if you intend to use your iBase repository with
other IBM i2 products:
• Analyst’s Notebook – provides smart matching of chart items
that is based on semantic types. Analysts appreciate how data
inconsistencies can affect their analysis and how time
consuming it can be to overcome them.
• Using Analyst’s Notebook to chart data from an iBase
repository with assigned semantic types allows smart
matching to overcome different recordings of the same
information. Smart matching can resolve accidental spelling
mistakes, and different formats of the same information.
Previously overlooked key associations are drawn to the
attention of the analyst. In addition, these records can be
merged within the iBase repository to eliminate any
confusing duplicate information.
• Text Chart – Semantic types can be used to align a
Text Chart visualization with the iBase repository during
loading. As an example, semantic types are used to resolve
changes to iBase repository field names that are made after
Text Chart data capture begins.
iBase IntelliShare
While iBase supports analysts in capturing, controlling,
and analyzing multi-source data in a secure environment,
IBM® i2® iBase IntelliShare opens up the high value
intelligence held in the iBase repository to wider operational
teams. Users access the rich intelligence in the repository
through an easy-to-use web browser interface, freeing analysts
to dedicate their time to developing intelligence and analytical
products. This self-service access allows analysts and
operational users to work concurrently and collaboratively on
the same data to make better decisions faster.
Contact IBM for further details of iBase IntelliShare.
19. White Paper
IBM Software September 2012
19
Technical description
Product architecture
iBase is a client/server solution, which is designed to store its
data on a server computer. Ideally, this computer is a
dedicated server that is not used for other functions. Analysts
who use iBase connect to the server over a local area network.
Terminal Services or Citrix Presentation Server
environment
iBase can be implemented in a desktop PC, Terminal Services,
or Citrix Presentation Server environment. If you use
Terminal Services or Citrix, the data is stored on a SQL
Server computer and the iBase application is installed on one
or more application servers. Users run thin-client sessions on
the application servers and only display updates and mouse/
keyboard input are transmitted over the network.
What pre-requisites are required to install
the product?
You must be clear which environment (client/server or thin
client) you will operate in before you select hardware for your
iBase implementation. Guidance on current minimum
hardware, operating system, and third-party software
requirements is provided on the following IBM website:
• http://www-01.ibm.com/support/docview.
wss?uid=swg27037904
Contact your Citrix or Terminal Services provider for advice
on specification for your application servers in a thin-client
environment.
iBase uses Microsoft Access or Microsoft SQL Server to store
data. The Microsoft Access database engine is part of
Microsoft Windows operating systems. When using Microsoft
SQL Server the relevant software must be purchased
separately. IBM does not supply Microsoft SQL Server.
You can use any of the following versions of Microsoft
SQL Server:
SQL Server 2005, 2008, 2012
• Enterprise
• Workgroup
• Standard
• Express
The volume of data, the number of clients, and the type of
analysis work combines to determine the specification of the
SQL Server computer.
When iBase is used with a Microsoft SQL Server 2012
repository, it is not compatible with IBM® i2® Analyst’s
Workstation.
Is iBase available in languages other than English?
iBase is available in languages other than English. For more
information on the availability of specific language
translations of iBase please contact your local IBM i2
representative.
How does iBase integrate with other IBM i2
products?
iBase can be integrated with many IBM i2 products, including
Analyst’s Notebook, Text Chart, Analyst’s Workstation and
iBase IntelliShare.
Can I upgrade from other IBM i2 products?
iBase is only supported when used with compatible versions
of IBM i2 products, these include Analyst’s Notebook,
Text Chart, Analyst’s Workstation. If you are using a
combination of previous versions of these products, you
must upgrade them all at the same time in order to
maintain compatibility.