SlideShare a Scribd company logo
Zco’s Public Safety Products Renamed PublicEye

Zco Corporation’s public safety products, including PolicePad, FireTab, PolicePhone and FirePhone, now
come under a single, unified product name,
PublicEye™.

“The new name better describes the vision behind
our product line and eliminates brand
fragmentation,” according to Gary Mueller, Vice
President of Business Development for the public
safety products.

PublicEye is a real-time mobile intelligence platform
for police, fire and emergency medical services.
Using PublicEye, first responders can access critical
data for optimizing emergency response
operations. Some of that data has been bottled up
in back-end systems but until PublicEye could never
be accessed in time to help save property and lives.
Other data is now available for first responders from sources never accessible before. This includes
information from websites, live video and surveillance systems, and even social media.

Every first responder, using a secure link, uses their iPhone, iPad or Android device to monitor 911 calls
as they occur on a real-time map and in a list, and with one touch gets complete details. Other incidents
and objects, such as sex offenders’ residences, HazMat sites, condemned buildings, or other points of
interest, can be superimposed on the map. It even helps police, fire and EMS to interoperate with each
other within their own communities or with their counterparts in adjacent communities.

Along with the name change, PublicEye brings the general public into policing, firefighting and
emergency medical services like never before. At a house fire, for example, a neighbor calls 911 and
takes a photo (or video) and uploads it to her Twitter (or YouTube or Flickr) account. The Twitter icon
appears next to the 911 icon on the responders’ PublicEye device. First responders and chiefs see the
photo with one touch.

Public safety departments can initiate tweets and other social media postings to warn, inform and
educate the community. Road closings or travel restrictions can be communicated quickly to a wide
audience. Officers can take pictures of suspects right from surveillance video and send a group MMS to
other officers to be on the lookout. They can even watch live surveillance video from schools and other
public buildings.

When it comes to public safety, PublicEye gives police, fire and EMS departments the power to do more
with less.
Article Source: http://www.zco.com/articles/zcos-public-safety-products-renamed-publiceye.html

More Related Content

Viewers also liked

Anxiety and Depression in Adolescents with IBD: A Mentoring Model
Anxiety and Depression in Adolescents with IBD: A Mentoring ModelAnxiety and Depression in Adolescents with IBD: A Mentoring Model
Anxiety and Depression in Adolescents with IBD: A Mentoring Model
Jill Plevinsky
 
Hacker as a maker 如何利用 mtk 7688 設計出超炫的 ctf 決賽戰場燈控效果
Hacker as a maker 如何利用 mtk 7688 設計出超炫的 ctf 決賽戰場燈控效果Hacker as a maker 如何利用 mtk 7688 設計出超炫的 ctf 決賽戰場燈控效果
Hacker as a maker 如何利用 mtk 7688 設計出超炫的 ctf 決賽戰場燈控效果
Hacks in Taiwan (HITCON)
 
Vacante bolsa de empleo ventas
Vacante bolsa de empleo   ventasVacante bolsa de empleo   ventas
Vacante bolsa de empleo ventas
TATIANA VILLALOBOS
 
Freud 2
Freud 2Freud 2
A cognição social
A cognição socialA cognição social
A cognição social
Luis De Sousa Rodrigues
 
Josh Bollman Resume--
Josh Bollman Resume--Josh Bollman Resume--
Josh Bollman Resume--
Josh Bollman
 
Un fin de semana perfecto
Un fin de semana perfectoUn fin de semana perfecto
Un fin de semana perfecto
vivasexto
 
Ejercicios bd1
Ejercicios bd1Ejercicios bd1
Ejercicios bd1
Obed Manuel
 
Nell et al GSA 2010 Poster
Nell et al GSA 2010 PosterNell et al GSA 2010 Poster
Nell et al GSA 2010 PosterRyan Nell
 

Viewers also liked (10)

Anxiety and Depression in Adolescents with IBD: A Mentoring Model
Anxiety and Depression in Adolescents with IBD: A Mentoring ModelAnxiety and Depression in Adolescents with IBD: A Mentoring Model
Anxiety and Depression in Adolescents with IBD: A Mentoring Model
 
Hacker as a maker 如何利用 mtk 7688 設計出超炫的 ctf 決賽戰場燈控效果
Hacker as a maker 如何利用 mtk 7688 設計出超炫的 ctf 決賽戰場燈控效果Hacker as a maker 如何利用 mtk 7688 設計出超炫的 ctf 決賽戰場燈控效果
Hacker as a maker 如何利用 mtk 7688 設計出超炫的 ctf 決賽戰場燈控效果
 
Vacante bolsa de empleo ventas
Vacante bolsa de empleo   ventasVacante bolsa de empleo   ventas
Vacante bolsa de empleo ventas
 
Freud 2
Freud 2Freud 2
Freud 2
 
A cognição social
A cognição socialA cognição social
A cognição social
 
Hèctor
HèctorHèctor
Hèctor
 
Josh Bollman Resume--
Josh Bollman Resume--Josh Bollman Resume--
Josh Bollman Resume--
 
Un fin de semana perfecto
Un fin de semana perfectoUn fin de semana perfecto
Un fin de semana perfecto
 
Ejercicios bd1
Ejercicios bd1Ejercicios bd1
Ejercicios bd1
 
Nell et al GSA 2010 Poster
Nell et al GSA 2010 PosterNell et al GSA 2010 Poster
Nell et al GSA 2010 Poster
 

Similar to Zco’s public safety products renamed public eye

Different Uses of Mobile Command Units for Public Safety
Different Uses of Mobile Command Units for Public SafetyDifferent Uses of Mobile Command Units for Public Safety
Different Uses of Mobile Command Units for Public Safety
JHB Group inc.
 
A Pattern Language of Social Media in Public Security
A Pattern Language of Social Media in Public SecurityA Pattern Language of Social Media in Public Security
A Pattern Language of Social Media in Public Security
Sebastian Denef
 
Global Flyte Executive Summary
Global Flyte Executive SummaryGlobal Flyte Executive Summary
Global Flyte Executive Summary
pbrowntransact
 
GlobalFlyte - Helping Emergency Response Teams Save More Lives
GlobalFlyte - Helping Emergency Response Teams Save More LivesGlobalFlyte - Helping Emergency Response Teams Save More Lives
GlobalFlyte - Helping Emergency Response Teams Save More Lives
Scott Frayser
 
ALBAY EMERGENCY RESPONSE AND REPORT TOOL (ALERRT)
ALBAY EMERGENCY RESPONSE AND REPORT TOOL (ALERRT)ALBAY EMERGENCY RESPONSE AND REPORT TOOL (ALERRT)
ALBAY EMERGENCY RESPONSE AND REPORT TOOL (ALERRT)
csandit
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
SocialKwan
 
Disaster can be devastating to any jurisdiction. Vital information n.docx
Disaster can be devastating to any jurisdiction. Vital information n.docxDisaster can be devastating to any jurisdiction. Vital information n.docx
Disaster can be devastating to any jurisdiction. Vital information n.docx
eve2xjazwa
 
Noonlight
NoonlightNoonlight
Noonlight
TraceyJohnston10
 
1. In a previous weeks discussion, we touched on the whole communit.docx
1. In a previous weeks discussion, we touched on the whole communit.docx1. In a previous weeks discussion, we touched on the whole communit.docx
1. In a previous weeks discussion, we touched on the whole communit.docx
blondellchancy
 
Social Media to Situational Awareness; Value in not so many words
Social Media to Situational Awareness; Value in not so many wordsSocial Media to Situational Awareness; Value in not so many words
Social Media to Situational Awareness; Value in not so many words
mwhite1ca
 
OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014
openi_ict
 
More connected, more extended, more content, more risks Mobile device explosi...
More connected, more extended, more content, more risks Mobile device explosi...More connected, more extended, more content, more risks Mobile device explosi...
More connected, more extended, more content, more risks Mobile device explosi...
victor Nduna
 
Ivp soc driven-vulnerability_02_2014_eng
Ivp soc driven-vulnerability_02_2014_engIvp soc driven-vulnerability_02_2014_eng
Ivp soc driven-vulnerability_02_2014_eng
paganibr
 
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Corey Olszewski
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
IRJET Journal
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
IRJET Journal
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
sabrangsabrang
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
mayank272369
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management response
Jack Brown
 
iReport_BluemixApp
iReport_BluemixAppiReport_BluemixApp
iReport_BluemixApp
Glenn Sanz
 

Similar to Zco’s public safety products renamed public eye (20)

Different Uses of Mobile Command Units for Public Safety
Different Uses of Mobile Command Units for Public SafetyDifferent Uses of Mobile Command Units for Public Safety
Different Uses of Mobile Command Units for Public Safety
 
A Pattern Language of Social Media in Public Security
A Pattern Language of Social Media in Public SecurityA Pattern Language of Social Media in Public Security
A Pattern Language of Social Media in Public Security
 
Global Flyte Executive Summary
Global Flyte Executive SummaryGlobal Flyte Executive Summary
Global Flyte Executive Summary
 
GlobalFlyte - Helping Emergency Response Teams Save More Lives
GlobalFlyte - Helping Emergency Response Teams Save More LivesGlobalFlyte - Helping Emergency Response Teams Save More Lives
GlobalFlyte - Helping Emergency Response Teams Save More Lives
 
ALBAY EMERGENCY RESPONSE AND REPORT TOOL (ALERRT)
ALBAY EMERGENCY RESPONSE AND REPORT TOOL (ALERRT)ALBAY EMERGENCY RESPONSE AND REPORT TOOL (ALERRT)
ALBAY EMERGENCY RESPONSE AND REPORT TOOL (ALERRT)
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 
Disaster can be devastating to any jurisdiction. Vital information n.docx
Disaster can be devastating to any jurisdiction. Vital information n.docxDisaster can be devastating to any jurisdiction. Vital information n.docx
Disaster can be devastating to any jurisdiction. Vital information n.docx
 
Noonlight
NoonlightNoonlight
Noonlight
 
1. In a previous weeks discussion, we touched on the whole communit.docx
1. In a previous weeks discussion, we touched on the whole communit.docx1. In a previous weeks discussion, we touched on the whole communit.docx
1. In a previous weeks discussion, we touched on the whole communit.docx
 
Social Media to Situational Awareness; Value in not so many words
Social Media to Situational Awareness; Value in not so many wordsSocial Media to Situational Awareness; Value in not so many words
Social Media to Situational Awareness; Value in not so many words
 
OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014
 
More connected, more extended, more content, more risks Mobile device explosi...
More connected, more extended, more content, more risks Mobile device explosi...More connected, more extended, more content, more risks Mobile device explosi...
More connected, more extended, more content, more risks Mobile device explosi...
 
Ivp soc driven-vulnerability_02_2014_eng
Ivp soc driven-vulnerability_02_2014_engIvp soc driven-vulnerability_02_2014_eng
Ivp soc driven-vulnerability_02_2014_eng
 
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management response
 
iReport_BluemixApp
iReport_BluemixAppiReport_BluemixApp
iReport_BluemixApp
 

More from Zco Corporation | Nashua, NH - Profile and Reviews

Zco Corporation Reviews and Customer Testimonials
Zco Corporation Reviews and Customer TestimonialsZco Corporation Reviews and Customer Testimonials
Zco Corporation Reviews and Customer Testimonials
Zco Corporation | Nashua, NH - Profile and Reviews
 
The eck app zco review
The eck app  zco reviewThe eck app  zco review
Fdic 2013 wrap up
Fdic 2013 wrap upFdic 2013 wrap up
Tweet leads to arrest in boston bus beating
Tweet leads to arrest in boston bus beatingTweet leads to arrest in boston bus beating
Tweet leads to arrest in boston bus beating
Zco Corporation | Nashua, NH - Profile and Reviews
 
Once upon an app 2012 mobile app success stories
Once upon an app 2012 mobile app success storiesOnce upon an app 2012 mobile app success stories
Once upon an app 2012 mobile app success stories
Zco Corporation | Nashua, NH - Profile and Reviews
 
Police pad® & firetab® featured at applecdw g public safety events
Police pad® & firetab® featured at applecdw g public safety eventsPolice pad® & firetab® featured at applecdw g public safety events
Police pad® & firetab® featured at applecdw g public safety events
Zco Corporation | Nashua, NH - Profile and Reviews
 
Zco integrates columbitech mobile vpn in police pad and firetab
Zco integrates columbitech mobile vpn in police pad and firetabZco integrates columbitech mobile vpn in police pad and firetab
Zco integrates columbitech mobile vpn in police pad and firetab
Zco Corporation | Nashua, NH - Profile and Reviews
 
Windows phone adds 75,000 apps in 2012
Windows phone adds 75,000 apps in 2012Windows phone adds 75,000 apps in 2012
Windows phone adds 75,000 apps in 2012
Zco Corporation | Nashua, NH - Profile and Reviews
 

More from Zco Corporation | Nashua, NH - Profile and Reviews (9)

Mobile app infographic
Mobile app infographicMobile app infographic
Mobile app infographic
 
Zco Corporation Reviews and Customer Testimonials
Zco Corporation Reviews and Customer TestimonialsZco Corporation Reviews and Customer Testimonials
Zco Corporation Reviews and Customer Testimonials
 
The eck app zco review
The eck app  zco reviewThe eck app  zco review
The eck app zco review
 
Fdic 2013 wrap up
Fdic 2013 wrap upFdic 2013 wrap up
Fdic 2013 wrap up
 
Tweet leads to arrest in boston bus beating
Tweet leads to arrest in boston bus beatingTweet leads to arrest in boston bus beating
Tweet leads to arrest in boston bus beating
 
Once upon an app 2012 mobile app success stories
Once upon an app 2012 mobile app success storiesOnce upon an app 2012 mobile app success stories
Once upon an app 2012 mobile app success stories
 
Police pad® & firetab® featured at applecdw g public safety events
Police pad® & firetab® featured at applecdw g public safety eventsPolice pad® & firetab® featured at applecdw g public safety events
Police pad® & firetab® featured at applecdw g public safety events
 
Zco integrates columbitech mobile vpn in police pad and firetab
Zco integrates columbitech mobile vpn in police pad and firetabZco integrates columbitech mobile vpn in police pad and firetab
Zco integrates columbitech mobile vpn in police pad and firetab
 
Windows phone adds 75,000 apps in 2012
Windows phone adds 75,000 apps in 2012Windows phone adds 75,000 apps in 2012
Windows phone adds 75,000 apps in 2012
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Zco’s public safety products renamed public eye

  • 1. Zco’s Public Safety Products Renamed PublicEye Zco Corporation’s public safety products, including PolicePad, FireTab, PolicePhone and FirePhone, now come under a single, unified product name, PublicEye™. “The new name better describes the vision behind our product line and eliminates brand fragmentation,” according to Gary Mueller, Vice President of Business Development for the public safety products. PublicEye is a real-time mobile intelligence platform for police, fire and emergency medical services. Using PublicEye, first responders can access critical data for optimizing emergency response operations. Some of that data has been bottled up in back-end systems but until PublicEye could never be accessed in time to help save property and lives. Other data is now available for first responders from sources never accessible before. This includes information from websites, live video and surveillance systems, and even social media. Every first responder, using a secure link, uses their iPhone, iPad or Android device to monitor 911 calls as they occur on a real-time map and in a list, and with one touch gets complete details. Other incidents and objects, such as sex offenders’ residences, HazMat sites, condemned buildings, or other points of interest, can be superimposed on the map. It even helps police, fire and EMS to interoperate with each other within their own communities or with their counterparts in adjacent communities. Along with the name change, PublicEye brings the general public into policing, firefighting and emergency medical services like never before. At a house fire, for example, a neighbor calls 911 and takes a photo (or video) and uploads it to her Twitter (or YouTube or Flickr) account. The Twitter icon appears next to the 911 icon on the responders’ PublicEye device. First responders and chiefs see the photo with one touch. Public safety departments can initiate tweets and other social media postings to warn, inform and educate the community. Road closings or travel restrictions can be communicated quickly to a wide audience. Officers can take pictures of suspects right from surveillance video and send a group MMS to other officers to be on the lookout. They can even watch live surveillance video from schools and other public buildings. When it comes to public safety, PublicEye gives police, fire and EMS departments the power to do more with less.