Open Source Software Considerations for State & Local Law Enforcement Agencies
|
|
- Katherine Bell
- 8 years ago
- Views:
Transcription
1 Open Source Software Considerations for State & Local Law Enforcement Agencies Faced with little funding and aging technology components, some law enforcement practitioners have turned to using open source software as a cost-effective solution for meeting their technology needs. Small and medium-sized agencies often lack technical resources, yet their need for information technology (IT) tools continues to grow. Supported by nationwide survey 1 results and published references, this article provides a set of considerations for evaluating the implementation of open source software for state and local law enforcement agencies. While many forms and categories of open source software exist, this article focuses on the stories and reported experience from state and local law enforcement agencies. 1 Benefits, Issues, and Categories of Open Source Software for Law Enforcement In analyzing how well open source software supports law enforcement processes, agencies cited similar benefits and issues as expressed by commercial firms 2. Although cost is a major discussion area, most agencies recognize that functionality and other non-cost factors are just as important. Along with general office functions, open source software has branched out into areas such as computer forensics and utility applications that would interest the law enforcement community. 1.1 Open Source Software Benefits While not law enforcement specific, the benefits include system interoperability, source code visibility, and a low initial acquisition cost. System Interoperability. Open source software allows agencies to employ a wealth of freely available database, utility, and software development tools that are based off open standards such as structured query language (SQL) and Java. The flexibility to evolve and extend applications without a vendor lock in also drives open source software adoption. 3 Database compatibility issues can be a major source of problems when considering the shift to an open source database. While many applications have the ability to transfer data via an open database connectivity (ODBC)-compliant protocol (or similar), other applications have their data essentially locked in a proprietary code. These proprietary databases may be accessible with the assistance of a vendor, or the data may be unavailable for use outside of the application that references it. Visibility Into Software Code. Unlike proprietary software, an agency has the option to examine the open source software to ensure that no backdoor functions or security risks exist that could allow the unauthorized access of sensitive information. Although the ability to see into the 1 _2007_Report_FINAL.pdf 2 Open Source Becoming Mission-Critical In North America And Europe September 11, Forrester Reports. 3 Open Source and Shared Services for Applications: Two Sides of the Same Coin? Gartner, 25 July 2006.
2 open source code and functions is often cited as a benefit, few state and local agencies have the staff resources with the technical depth to perform such a detailed review. Low Initial Acquisition Cost. Products cited by surveyed agencies incur a low acquisition cost relative to commercial, closed source products in the same category. According to Gartner 4, the lower costing open source software would allow contractors and other agency service providers to reduce the cost of their services accordingly. From generating case reports to community awareness flyers, agencies use office productivity software extensively on a daily basis. Using an office productivity software suite as a hypothetical scenario, Table 1 depicts the initial acquisition cost for Open Office, IBM Symphony, KOffice, and Microsoft Office. While the products vary in functionality, Open Office has been cited as a default choice as an open source substitute for Microsoft Office 5. Product Name Basic Package Acquisition Cost 1. Open Office No Cost Download (Source: 2. IBM Symphony No Cost Download (Source: 3 KOffice No Cost Download (Source: 4. Microsoft Office 2007 Standard $327 (Source: VERSION/dp/B000HCVR3A) Table 1: Initial Acquisition Office Productivity Software Suite Cost 1.2 Issues against Using Open Source Software Concerns about technical support, law enforcement applications, cultural change, and a return on investment were major issues cited by survey respondents. Lack of Technical Support. Users want someone accountable for the software they use. It is important to them to be able to call the software vendor for help when needed. They do not want to have to rely on a community of developers to help resolve any issues. Although major packages like Red Hat Linux have support options, agencies have found fewer experienced staff for patching and maintaining open source software. Lack of Open Source Applications. There are few options for law enforcement specific applications. This means that for a given product type there is only one supporting application, if any at all. Sourceforge currently has only two projects that have reached the download maturity level: Tickets and CAPSIT. Tickets is a Computer Aided Dispatch (CAD) package that 4 Explaining the Public Value of Open Source. Gartner, 31 July WUY30NQE1GHPCKHWATMY32JVN?articleID= &pgno=5&queryText=&isPrev=
3 incorporates Google Maps for tracking units sent to respond to an incident. CAPSIT is a web based CAD that is shared by a consortium of agencies in a geographic area. Microsoft Accustomed Users. Computer users are less familiar with open source software than with the commercial often Microsoft-based equivalents. Often commands and pull-down menus are in different locations and use different terminology. Low Return on Investment (ROI). Early adopters of Linux desktop systems and open source platforms have cited a lower ROI compared to upgrading and maintaining a Microsoft infrastructure 6. Agencies that switched to using open source office productivity suites could no longer leverage their investment in Microsoft macro enabled spreadsheets and report templates due to functional incompatibilities. 1.3 Survey Respondent Reasons As Figure A illustrates, survey responding agencies offered supporting viewpoints on the presented benefits and issues. The 26% of users accustomed to Microsoft products provides some insight to a cultural hurdle faced by open source adopters. While the acquisition cost is low, the 7% of early adopting agencies indicated a high lifecycle cost for maintaining their open source implementations. While Figure A illustrates the perception that some legacy machines can support open source software, graphical user interfaces favored by end users typically require the processing capabilities, speed, and storage capacities of current hardware. Figure A. Surveyed Agency Responses 1.4 Other Categories of Open Source Software for Law Enforcement : Computer Forensics and Utility Applications Many agencies use proprietary software to conduct computer forensics investigations such as Encase from Guidance Software. However, innovative investigators have created open source software programs that offer similar file and folder analytical functionality such as the Autopsy 7 and the Penguin Sleuth Kit 8. Both packages allow investigators to unobtrusively monitor the functions on a suspect machine for establishing timelines, recovering deleted files, and searching through volumes of electronic records. To supplement the software imaging, searching, and write block forensic functions, utilities such as Strip 6 Return on Investment for Linux Desktop Migration Improves, but Not Enough for Most Users. Gartner, 24 June Michael A. Silver
4 Snoop allow credit card fraud investigators to view the contents on magnetic cards while Curator enables crime scene image management without the expense of purchasing proprietary software. 2 OVERVIEWS OF FOUR AGENCIES CURRENTLY USING OPEN SOURCE SOFTWARE Looking to leverage the benefits, several agencies are currently using open source software for law enforcement business functions. Each location offers different perspectives and evolution paths toward using open source software. The notes and applications in this section may offer solutions to other agencies that may be of a similar size or possess similar IT needs. 2.1 Garden Grove, California Garden Grove has used open source based solutions for more than 11 years. They have their own development staff that have produced a number of applications, have employed open source development tools, and have utilized many open source software packages Open Source Workstation Software Under the direction of Mr. Charles Kalil, Garden Grove s IT department realized early on that the needs of their users would quickly outpace the applications that the city could purchase with a limited amount of funds. Mr. Kalil began experimenting with open source software for storing and managing data while maintaining a Windows-based workstation for users. For Garden Grove, the open source software fits into niche areas such as mapping, network monitoring tools, and web browsers. Table 2 lists some of the open source workstation applications used by Garden Grove. Table 2. Open Source Applications Used by Garden Grove Software Internet Hyperlink Description MapServer An open source development environment for building spatially-enabled internet applications. MapServer is not a full-featured GIS but focuses on rendering spatial data (maps, images, and vector data) for the web. MapGuide Open Source MapGuide Open Source is a web-based platform that enables users to quickly develop and deploy web mapping applications and geospatial web services. Big Sister Open source monitoring tool used to monitor Linux systems indicates database usage and server load among other things.
5 Mozilla Firefox An award-winning Web browser. (Future Use in Garden Grove) Samba Samba is a suite that provides file and print services to SMB clients, including the numerous versions of Microsoft Windows operating systems. PostgreSQL An open source database Open Source Databases, System Links, and Police Records Management System (RMS) While the open source software on the workstations provides some benefit to users, the use of open source on the back-end systems for the city databases, system-to-system links, and the police records management system have a larger impact. PostgreSQL is the open source database of choice for Garden Grove. Garden Grove uses the standard tool set without added features provided at no cost that come with the software. Currently about 60 percent of the police applications are running against the PostgreSQL database. The police department has a separate database in City Hall, separated from other equipment for security reasons. 2.2 Largo, Florida Largo, Florida uses Linux as their default operating system and OpenOffice 2.0 as their integrated office suite, although they still use Microsoft PowerPoint for presentations. The city plans to switch from PowerPoint to an open source presentation application in the near future. Keeping with the belief that the city should use the best of breed for a particular application, Largo uses a blend of open and closed source software. In the case of the city s system, an open source application (Novell Evolution) is combined with Novell s proprietary GroupWise 7 to provide calendaring functions. For their purposes, the GroupWise database and non-web interface served needs better. Largo s database environment is mixed as well. They run Oracle 9i on Linux along with MySQL and MyProgress. Table 3. Open Source Applications Used by Largo Software Internet Hyperlink Description OpenOffice OpenOffice is a multiplatform and multilingual office suite and an open source project. Compatible with all other major office suites, the product is free to download, use, and distribute.
6 Tomboy Tomboy is a desktop note-taking application for Linux and Unix. Firefox An award-winning Web browser. MySQL An open source database. GIMP GIMP is the GNU Image Manipulation Program. GTK GTK+ is a multi-platform toolkit for creating graphical user interfaces. Gaim/Pidgin A multi-protocol instant messaging (IM) client. Renamed Pidgin in April, Pennsylvania State Police Computer Forensics Task Force The Pennsylvania State Police (PASP) Forensic Task Force has used open source software to support the capabilities of the Computer Crime Unit within the Pennsylvania State Police. The Task Force augments the commercial software they use with open source both for cost and flexibility. Open source computer forensics tools provide investigators the ability to examine seized computers without altering the data contained on the hard drive. Most seized computers use the Microsoft Windows operating system. The open source tools do not require activating Microsoft Windows for searching through the files for key terms, photographic images, and internet chat transcripts. The open source tools allow investigators to find possible evidence without contaminating or altering the state of the seized computer. Open source software in use by the Task Force, and its function, are listed in Table 4. Table 4. Open Source Applications Used by the Pennsylvania State Police Computer Forensics Task Force Software Internet Hyperlink Description ClusterKnoppix and Chaos Allows the PASP to set up numerous computers in a distributive network. Very useful for password cracking attempts. Curator Written in python. Compiles photographs, creates thumbnails of all the images located, and creates a directory. Allows multiple image layouts. Runs from a CD.
7 NIST Fingerprint Image Software A Linux-based collection of general-purpose utilities to support processing of fingerprint images. Xchat An internet relay chat application. 2.4 Open Source Software Institute, Mississippi Funded by a U.S. Department of Defense grant, the open source Jail Management System (JMS) was developed as part of the Mississippi Automated System Project (MASP) through the University of Southern Mississippi. Up to 18 agencies in Texas and Mississippi have installed or are evaluating the open source JMS against local and state requirements. According to Open Source Software Institute (OSSI) Executive Director John Weathersby, the Gulf coast region needed a new jail management system but lacked the funds for procuring vendor solutions that often cost $1 million or more. OSSI worked with the University of Southern Mississippi and local software development contractors to create a system for roughly $350,000. In Mississippi, Forrest County, Harrison County, Hancock County, and Jackson County all have agencies with operational open source JMS installations. The open source JMS operates off a central network via a web browser interface that allows installed sites to share selected corrections records that may include scars, marks, and tattoos, as well as prisoner classification and medical histories.
8 3 Is Open Source Software Appropriate for Law Enforcement Agencies? Open source has started to make inroads in many market segments and therefore, it can no longer be seen as a second class computing format not with IBM, Novell, Sun, and others participating in its creation, distribution, and support. Hardware vendors have been in the open source market for some time HP since at least 1999, IBM since 1998; recently, Dell agreed after input from the user community to consider expanding their sales, service, and support of computers with an open source operating system. 9 How can law enforcement leverage this success to benefit the communities they serve? In some areas, recommending open source solutions is easy and straightforward. In other cases, the arguments for open source solutions are less clear. The current state of open source computing as related to law enforcement is a mixed bag with many of the common needs competently provided for while others remain lacking and, in some cases, non-existent. Not all needs of the law enforcement community can be met by open source applications. As with any technology, proper use of open source software can help law enforcement expand the IT capabilities available to the officer on the street. Agencies with limited funding or size can apply specific niche open source software packages. Converting to open source offers the rare opportunity to review operational processes from the ground up. Regardless of the extent of implementation, open source software provides an opportunity to excise outdated methods and replace them with more streamlined procedures appropriate to today s needs, which in turn may provide for a more efficient and effective law enforcement agency. About the Primary Author: Mun-Wai Hon is a Principal at Noblis Inc. Comments or questions can be sent to Mun-Wai.Hon@noblis.org 9
9 This article was featured in For access to more content from the IEEE Computer Society, see computingnow.computer.org. Top articles, podcasts, and more. computingnow.computer.org
Faced with little funding and aging technology. Open Source Software Considerations for Law Enforcement. Open SOUrce
Open SOUrce Open Source Software Considerations for Law Enforcement Mun-Wai Hon, Greg Russell, and Michael Welch, Noblis Can law enforcement agencies leverage open source to benefit the communities they
More informationSUSE Linux Enterprise Desktop 11
FAQ www.novell.com SUSE Linux Enterprise Desktop 11 Frequently Asked Questions March 2009 What is Novell announcing? Novell is announcing the general availability of SUSE Linux Enterprise 11 the most interoperable
More informationAn Open Source Software Business Model For Law Enforcement And Justice Systems B. Wayne Walters, University of Southern Mississippi, USA
An Open Source Software Business Model For Law Enforcement And Justice Systems B. Wayne Walters, University of Southern Mississippi, USA ABSTRACT Software application projects that are being developed
More informationSystem requirements. Java SE Runtime Environment(JRE) 7 (32bit) Java SE Runtime Environment(JRE) 6 (64bit) Java SE Runtime Environment(JRE) 7 (64bit)
Hitachi Solutions Geographical Information System Client Below conditions are system requirements for Hitachi Solutions Geographical Information System Client. 1/5 Hitachi Solutions Geographical Information
More informationChapter 4 IT Infrastructure and Platforms
Chapter 4 IT Infrastructure and Platforms Essay Questions: 1. Identify and describe the stages of IT infrastructure evolution. 2. Identify and describe the technology drivers of IT infrastructure evolution.
More informationContents. Intended Audience for This Book How This Book Is Structured. Acknowledgements
Preface Intended Audience for This Book How This Book Is Structured xvii xviii xix Acknowledgements xxi 1 Open Source Software: Definitions and History 1 1.1 Definition of Terms 1 1.1.1 What Is Free Software?
More informationRed Hat Enterprise Linux as a
Red Hat Enterprise Linux as a file server You re familiar with Red Hat products that provide general-purpose environments for server-based software applications or desktop/workstation users. But did you
More informationCounty of Los Angeles. Chief Information Office Preferred Technologies for Geographic Information Systems (GIS) September 2014
County of Los Angeles Chief Information Office Preferred Technologies for Geographic Information Systems (GIS) September 2014 CIO Preferred Technologies for GIS This document lists the preferred Geographic
More informationUnicenter Asset Intelligence r11
Unicenter Asset Intelligence r11 Key Features at a Glance Comprehensive Out of the Box Business Relevant Answers Complete and Accurate IT Asset Information Real-Time Analysis Risk Alerting Compliance Utilization
More informationIBM Tivoli Service Request Manager
Deliver high-quality services while helping to control cost IBM Tivoli Service Request Manager Highlights Streamline incident and problem management processes for more rapid service restoration at an appropriate
More informationQuestions and Answers for Citrix Ready Software
AutoCAD Map 3D 2009 Questions and Answers for Citrix Ready Software AutoCAD Map 3D software is one of the leading engineering platforms for creating and managing spatial data. Bridging the gap between
More informationLarge Nonprofit Hospital Improves Communications with Messaging Solution
Microsoft Windows Server System Customer Solution Case Study Large Nonprofit Hospital Improves Communications with Messaging Solution Overview Country or Region: United States Industry: Healthcare Customer
More informationWhat's New in BlackBerry Enterprise Server 5.0 SP4 for Novell GroupWise
What's New in BlackBerry Enterprise Server 5.0 SP4 for Novell GroupWise Upgrade paths Enhancements to the setup application Administrators can upgrade to BlackBerry Enterprise Server 5.0 SP4 for Novell
More informationOpen Source Digital Forensics Tools
The Legal Argument 1 carrier@cerias.purdue.edu Abstract This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a
More informationFOSSBazaar A Governance Initiative to manage Free and Open Source Software life cycle
FOSSBazaar A Governance Initiative to manage Free and Open Source Software life cycle Table of contents Executive summary......2 What is FOSS Governance 3 The importance of open source governance...3 Why
More informationCompatibility Matrixes. Blackboard Academic Suite
Compatibility Matrixes Application Pack 3 (Release 6.3) Blackboard Learning System Blackboard Community System Blackboard Learning System - Basic Edition (Release 2.3) Blackboard Content System PRODUCT
More informationHP Asset Manager. Software version: 5.20. Asset Tracking Solution
HP Asset Manager Software version: 5.20 Asset Tracking Solution Document Release Date: 01 October 2009 Software Release Date: October 2009 Legal Notices Copyright Notices Copyright 1994-2009 Hewlett-Packard
More informationDevelopment tools to create Web-GIS applications DbMAP ASJ the best solution to easily publish GIS data from existing spatial databases and distributed GIS data sources Easily designs, produces, and publishes
More informationKey Considerations for Vulnerability Management: Audit and Compliance
Key Considerations for Vulnerability Management: Audit and Compliance October 5, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software
More informationRequirements Checklist for Choosing a Cloud Backup and Recovery Service Provider
Whitepaper: Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider WHITEPAPER Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist
More informationAltiris IT Management Suite 7.1 from Symantec
Altiris IT 7.1 Achieve a new level of predictability Overviewview Change is inevitable for IT and it comes from several sources: changing needs from lines of business, managing and supporting too many
More informationHP OpenView AssetCenter
HP OpenView AssetCenter Software version: 5.0 Asset Tracking solution Build number: 120 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements
More informationCatDV Pro Workgroup Serve r
Architectural Overview CatDV Pro Workgroup Server Square Box Systems Ltd May 2003 The CatDV Pro client application is a standalone desktop application, providing video logging and media cataloging capability
More informationTHE COMPLETE VIEWER FOR MS PROJECT. Deployment White Paper
THE COMPLETE VIEWER FOR MS PROJECT Seavus DOOEL 2010 2 TABLE OF CONTENTS 1 DEPLOYMENT OPTIONS... 3 1.1 SINGLE USER INSTALLATION... 3 1.2 CONCURRENT USER INSTALLATION... 4 1.3 SINGLE COMPANY KEY INSTALLATION...
More informationHow To Use Ibm Tivoli Monitoring Software
Monitor and manage critical resources and metrics across disparate platforms from a single console IBM Tivoli Monitoring Highlights Help improve uptime and shorten Help optimize IT service delivery by
More informationHow To Migrate To Redhat Enterprise Linux 4
Migrating to Red Hat Enterprise Linux 4: Upgrading to the latest Red Hat release By Donald Fischer Abstract Red Hat Enterprise Linux subscribers may choose to deploy any of the supported versions of the
More informationAltiris Server Management Suite 7.1 from Symantec
Altiris Server Suite 7.1 from Symantec Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Overview The complexity of managing today s data centers is complicated
More informationSIEMENS. Teamcenter 11.2. Windows Server Installation PLM00013 11.2
SIEMENS Teamcenter 11.2 Windows Server Installation PLM00013 11.2 Contents Part I: Getting started with Teamcenter server installation Requirements and overview.............................................
More informationHP AppPulse Active. Software Version: 2.2. Real Device Monitoring For AppPulse Active
HP AppPulse Active Software Version: 2.2 For AppPulse Active Document Release Date: February 2015 Software Release Date: November 2014 Legal Notices Warranty The only warranties for HP products and services
More informationBackup Exec System Recovery Management Solution 2010 FAQ
Backup Exec System Recovery Management Solution 2010 FAQ Contents Overview... 1 Supported Backup Exec System Recovery Versions and Configurations... 6 Backup Exec System Recovery Management Solution Installation
More informationPhire Architect Hardware and Software Requirements
Phire Architect Hardware and Software Requirements Copyright 2014, Phire. All rights reserved. The Programs (which include both the software and documentation) contain proprietary information; they are
More informationCan Cloud Technology Help You to Improve Performance, Scalability, and Cost of Geo- Spatial Applications When Your Budget is shrinking?
Creating Value Can Cloud Technology Help You to Improve Performance, Scalability, and Cost of Geo- Spatial Applications When Your Budget is shrinking? Delivering Solutions Overview of the Presentation
More informationCisco is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1996-2014 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo are the exclusive properties of BMC Software, Inc., are registered
More informationRequirements Checklist for Choosing a Cloud Backup and Recovery Service Provider
Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist for As the importance and value of corporate data grows, complex enterprise IT environments need
More informationInstallation, Configuration and Administration Guide
Installation, Configuration and Administration Guide ehd10.0.1 everything HelpDesk Installation, Configuration and Administration Guide GroupLink Corporation 2013 GroupLink Corporation. All rights reserved
More informationMetatron Technology Consulting s Strategic Guide to Open Source Software
Metatron Technology Consulting s Strategic Guide to Open Source Software Chris Travers April 30, 2004 Copyright c April 30, 2004 Metatron Technology Consulting. Permission is granted for verbatim redistribution
More informationIBM Cloud Manager with OpenStack
IBM Cloud Manager with OpenStack Download Trial Guide Cloud Solutions Team: Cloud Solutions Beta cloudbta@us.ibm.com Page 1 Table of Contents Chapter 1: Introduction...3 Development cycle release scope...3
More informationModernizing enterprise application development with integrated change, build and release management.
Change and release management in cross-platform application modernization White paper December 2007 Modernizing enterprise application development with integrated change, build and release management.
More informationCA IT Client Manager. Asset Intelligence
DATA SHEET: ASSET INTELLIGENCE CA IT Client Manager Asset Intelligence CA IT CLIENT MANAGER AUTOMATICALLY CONVERTS RAW ASSET DATA INTO ACTIONABLE INTELLIGENCE SO YOU CAN QUICKLY IDENTIFY OPPORTUNITIES
More informationOpen Source: A Practical Foundation. Presented By : Amgad Madkour
Open Source: A Practical Foundation Presented By : Amgad Madkour What is open source? Open source refers to any program whose source code is made available for use or modification as users or other developers
More informationBasics on Geodatabases
Basics on Geodatabases 1 GIS Data Management 2 File and Folder System A storage system which uses the default file and folder structure found in operating systems. Uses the non-db formats we mentioned
More informationMicrosoft Technologies
NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use
More informationWhisler 1 A Graphical User Interface and Database Management System for Documenting Glacial Landmarks
Whisler 1 A Graphical User Interface and Database Management System for Documenting Glacial Landmarks Whisler, Abbey, Paden, John, CReSIS, University of Kansas awhisler08@gmail.com Abstract The Landmarks
More informationTABLE OF CONTENTS: Transforming Desktops into Workspaces
e s u F r e w o P S RE anagement User Workspace M 2. TABLE OF CONTENTS: Overview... 3. What is a User Workspace?... 4. Why User Workspace Management?... 5. What are the benefits for me?... 6. Facts about
More informationBMC Remedy vs. IBM Control Desk. How to choose between BMC Remedy and IBM Control Desk December 2014
BMC Remedy vs. IBM Control Desk How to choose between BMC Remedy and IBM Control Desk December 2014 Version: 1.0 Date: 21/12/2014 Document Description Title BMC Remedy vs. IBM Control Desk Version 1.0
More informationMaximizing ROI on Test and Durability
Maximizing ROI on Test and Durability Product Details Product Overview: ncode Automation is a complete environment for automated data storage, analysis and reporting. It also provides a web-based collaborative
More informationLinux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
More information".,!520%'$!#)!"#$%&!>#($!#)! <*+,-(./0!/+!567!5+:,($2,+$! @,'/(/#+(!
".,!520%'$!#)!"#$%&!>#($!#)!
More informationComputer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
More informationowncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
More informationNetwork operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation.
NETWORK OPERATING SYSTEM Introduction Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. Network operating
More informationOracle Business Intelligence Publisher. 1 Oracle Business Intelligence Publisher Certification. Certification Information 10g Release 3 (10.1.3.4.
Oracle Business Intelligence Publisher Certification Information 10g Release 3 (10.1.3.4.2) E12692-08 September 2011 This document outlines the certified hardware and software configurations for Oracle
More informationCOMMON CORPORATE COSTS CAPITAL - INFORMATION TECHNOLOGY
Updated: 0-0-0 EB-0-0 Tab Page of COMMON CORPORATE COSTS CAPITAL - INFORMATION TECHNOLOGY.0 OVERVIEW 0 Information Technology ( IT ) refers to computer systems (hardware, software and applications) that
More informationInvest in your business with Ubuntu Advantage.
Invest in your business with Ubuntu Advantage. Expert advice. Specialist tools. Dedicated support. Introducing Ubuntu Advantage Contents 02 Introducing Ubuntu Advantage 03 Ubuntu Advantage 04 - Landscape
More informationSymantec NetBackup 7.1 What s New and Version Comparison Matrix
Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk
More informationEliminating XP from the environment by the end of 2012. 2014 organizations to cost-effectively plan, manage and support PC change initiatives.
Client Automation Complete automation capabilities for managing daily operational processes across large, A locked and well-managed desktop PC can cost 43% less to keep than an 43% heterogeneous environments
More informationInformation Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
More informationFall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu.
Fall 2009 Lecture 1 Operating Systems: Configuration & Use CIS345 Introduction to Operating Systems Mostafa Z. Ali mzali@just.edu.jo 1-1 Chapter 1 Introduction to Operating Systems An Overview of Microcomputers
More informationHP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Application Setup help topics for printing
HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Application Setup help topics for printing Document Release Date: December 2014 Software Release Date: December
More informationFeature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
More informationVirtualization s Evolution
Virtualization s Evolution Expect more from your IT solutions. Virtualization s Evolution In 2009, most Quebec businesses no longer question the relevancy of virtualizing their infrastructure. Rather,
More informationWhite Paper: PostgreSQL and SunGuide Software Cloud Analysis. PostgreSQL
White Paper: PostgreSQL and SunGuide Software Cloud Analysis PostgreSQL As the Florida Department of Transportation (FDOT) SunGuide software deployments and licensors continue to grow, the need for the
More informationWindows 7 Upgrade Risk Mitigation Planning: Ensuring Windows 7 Upgrade Success
November 2010 Windows 7 Upgrade Risk Mitigation Planning: Ensuring Windows 7 Upgrade Success By: Robert Schaper, Laplink Software Enterprise Solutions Contents Introduction 2 Risk and Cost 2 Upgrade Strategies
More informationVirtual Desktop Infrastructure
Virtual Desktop Infrastructure Improved manageability and availability spur move to virtualize desktops Many companies have turned to virtualization technologies for their servers and in their data centers
More informationRunning Linux in a Windows World. John H Terpstra, CTO Primastasys Inc. jht@primastasys.com
Running Linux in a Windows World John H Terpstra, CTO Primastasys Inc. jht@primastasys.com Outline Where does Linux fit in an MS Windows world? How does Linux compare with MS Windows functionality? As
More informationEnergySync and AquaSys. Technology and Architecture
EnergySync and AquaSys Technology and Architecture EnergySync and AquaSys modules Enterprise Inventory Enterprise Assets Enterprise Financials Enterprise Billing Service oriented architecture platform
More informationW H I T E P A P E R. Hub and Spoke Approach to Computer-Aided Dispatch
W H I T E P A P E R Hub and Spoke Approach to Computer-Aided Dispatch 1 Introduction Intergraph s hub and spoke approach to computer-aided dispatch (CAD) provides an alternative to a standalone independent
More informationIBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
More informationControlPoint. Advanced Installation Guide. Publication Date: January 12, 2016. Metalogix International GmbH., 2008-2016 All Rights Reserved.
ControlPoint Publication Date: January 12, 2016 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software,
More informationBIGFIX. Free Software Is Not Free: A Quantitative TCO Analysis. Executive Summary
Free Software Is Not Free: A Quantitative TCO Analysis Executive Summary A famous catch phrase coined during the Great Depression of the 1920s and 1930s was There Ain t No Such Thing as a Free Lunch. The
More informationUniversity Managed Desktop Program. Desktop Computing Support Framework 343-3362 or 875-6422
University Managed Desktop Program Desktop Computing Support Framework 343-3362 or 875-6422 Overview Commencing [enter department-specific date], desktop computing support will be provided for [enter department
More informationRSA Authentication Manager 8.1 Virtual Appliance Getting Started
RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides
More informationIT Cost Optimization through Open Source Software:
: Reducing Information Technology Overhead for the Modern Enterprise : Reducing Information Technology Overhead for the Modern Enterprise The cost of Information Technology (IT) as a percentage of overall
More informationIBM Rational Asset Manager
Providing business intelligence for your software assets IBM Rational Asset Manager Highlights A collaborative software development asset management solution, IBM Enabling effective asset management Rational
More informationowncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
More informationLenovo System x servers achieve top customer satisfaction scores in 1Q15. May 2015 TBR T EC H N O LO G Y B U S I N ES S R ES EAR C H, I N C.
Lenovo System x servers achieve top customer satisfaction scores in 1Q15 May 2015 TBR T EC H N O LO G Y B U S I N ES S R ES EAR C H, I N C. System x customer satisfaction scores surpass those of Dell and
More informationPennsylvania Geospatial Data Sharing Standards (PGDSS) V 2.5
Submitted to: Pennsylvania Geospatial Data Sharing Standards (PGDSS) V 2.5 Spatial Data Migration Tools Report May 2, 2007 Table of Contents 1.0 Document Purpose...B-1 2.0 Overview of Spatial Data Migration
More information24x7 Scheduler Multi-platform Edition 5.2
24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table
More informationRESOLUTION SYSTEMS SOFTWARE
Lubbock Children's Health Clinic Customer Case Study RESOLUTION SYSTEMS SOFTWARE UTILIZING OPEN SOURCE IN A MEDICAL CLINIC Anthony Presley Lubbock Children's Health Clinic, a non-profit organization with
More informationSUSE Linux Enterprise Server for VMware
SUSE Linux Enterprise Server for VMware Leverage the Power of Linux on vsphere 2010 VMware Inc. All rights reserved Agenda VMware industry leader Customer challenges What is SUSE Linux Enterprise Server
More informationDirectory-enabled Lights-Out Management
Directory-enabled Lights-Out Management white paper Abstract... 2 Remote management products... 2 Business needs... 3 Customer environment... 3 Benefits... 3 Directory architecture... 4 Overview... 4 Objects...
More informationA Complete Desktop-to-Server Solution for Your Small Business
Product Brochure COLLABORATION A Complete Desktop-to-Server Solution for Your Small Business A Closer Look at Novell Open Workgroup Suite Small Business Edition Better Tools, Bigger Savings Novell Open
More informationA White Paper. Best Practices in Automated Agentless IT Monitoring
A White Paper Best Practices in Automated Agentless IT Monitoring Best Practices in Automated Agentless IT Monitoring Introduction Agentless IT monitoring is growing in popularity because of its potential
More informationDesigning and Deploying Connected Device Solutions for Small and Medium Business
Designing and Deploying Connected Device Solutions for Small and Medium Business HPATA Connected Devices Study Guide Rev 1.1 Table of Contents 1.1 Describe and recognize common desktop virtualization technologies
More informationMeasurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks
More informationLeveraging the Cloud for Your Business
Leveraging the Cloud for Your Business by CornerStone Telephone Company 2 Third Street Troy, NY 12180 As consumers, we enjoy the benefits of cloud services from companies like Amazon, Google, Apple and
More informationCouncil Technology Application Committee
Council Technology Application Committee November 14, 2012 Table of Contents Agenda 2 Approval of Minutes of June 20, 2012 Minutes 4 Update on Public Safety Computer Aided Dispatch/Records Management System
More informationCan Cloud Database PaaS Solutions Replace In-House Systems?
Can Cloud Database PaaS Solutions Replace In-House Systems? Abstract: With the advent of Platform-as-a-Service as a viable alternative to traditional database solutions, there is a great deal of interest
More informationINSTALLING MALTED 3.0 IN LINUX MALTED: INSTALLING THE SYSTEM IN LINUX. Installing Malted 3.0 in LINUX
MALTED: INSTALLING THE SYSTEM IN 1 Installing Malted 3.0 in INDEX: 1) How to install JAVA 1.1 Downloading Java Virtual Machine 1.2 Installing Java Virtual Machine 2) How to install Malted 2.1 Launching
More informationServices Professional Services for DNA
Services Professional Services for DNA Maximize the Value of Your Technology and Resource Investments with the Help of Professional Services Delivered by Industry Specialists Services Optimize the return
More informationCentrify Server Suite Management Tools
SERVER SUITE TECHNICAL BRIEF Centrify Server Suite Management Tools Centrify Server Suite includes - at no extra charge - a powerful set of management tools in all editions: Centrify Identity Risk Assessor
More informationTARRANT COUNTY PURCHASING DEPARTMENT
JACK BEACHAM, C.P.M., A.P.P. PURCHASING AGENT TARRANT COUNTY PURCHASING DEPARTMENT AUGUST 4, 2010 RFP NO. 2010-103 ROB COX, C.P.M., A.P.P. ASSISTANT PURCHASING AGENT RFP FOR DIGITAL ASSET MANAGEMENT SYSTEM
More informationMercury Users Guide Version 1.3 February 14, 2006
Mercury Users Guide Version 1.3 February 14, 2006 1 Introduction Introducing Mercury Your corporate shipping has just become easier! The satisfaction of your customers depends on the accuracy of your shipments,
More informationDigital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
More informationRed Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac 01.10.2008
Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments Dragos Manac 01.10.2008 Agenda The Need for Identity & Access Management Enterprise IPA Overview Pricing Questions to
More informationSystem Requirements and Platform Support Guide
Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationDynamic Output Solutions For Oracle
White Paper Dynamic Output Solutions For Oracle DocOrigin vs. BI Publisher: Different Approaches, Different Abilities This paper will discuss and compare several of the most critical features that make
More informationIBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
More informationSystem Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
More information