Category: Improving State Operations
|
|
- Tiffany Garrett
- 8 years ago
- Views:
Transcription
1 UTAH WARRANTS CHECK Category: Improving State Operations Contact: David Fletcher, Chief Technology Officer State of Utah Project Initiation and Completion Dates: June October 2011 NASCIO
2 EXECUTIVE SUMMARY Warrant information is contingent upon accuracy, timeliness, and real-time information. The Utah Statewide Warrants Check is designed to provide information on individuals wanted in the state of Utah. The warrant information comes from courts that send in data to the Utah Criminal Justice Information System via electronic transfer, which means that the data viewed is the direct result of court activity. Accuracy and timeliness are critical factors when acting on warrants information, as this system is dependent upon timely entry and removal of records by the courts. Instead of calling the Bureau of Criminal Intent to get warrant information, all warrant information is updated real-time and available via the Warrants Check Website to the public. 2
3 DESCRIPTION OF THE BUSINESS PROBLEM AND SOLUTION Prior to the implementation of Warrant Check, citizens had to call the Bureau of Criminal Investigation to inquire about the status of a warrant. Each phone call took on average 3 minutes. The Bureau of Criminal Intent fielded on average 973 calls/month. Callers would have to provide several combinations of name spelling options. This not only took up valuable employee resources, it was also confined to operating business hours. Now, the Warrant Check system is updated real-time and available 24 hours a day, 7 days a week. The project commenced in June 2011 and the Warrants Check system launched in October Projected development time and launch date was 4 months, and October respectively. Given the private-public partnership with the State of Utah and Utah Interactive, the online Warrants Check system is self-funded and requires no additional tax dollar appropriations. The project is collaborative and utilizes a central database where the courts add and update real-time warrant information. The new Warrants Check online system processes over 50,000 warrant searches each month- that s over 300,000 since implementation. Call volume decreased by 900% and is reallocating the equivalent of 3 full time employees. The Utah Warrants Check service is built on a Java platform with a MySql database. The front-end interface utilizes our proprietary Universal Framework, Java Script and CSS and HTML. Warrants Check also utilizes a web service with the Utah Criminal Justice Information System for real time warrant search capability. Operational efficiencies are derived from several components, primarily the utilization of our proprietary universal framework that allows for rapid introduction of services with minimal overhead and maximum impact. The universal framework gives each new application we deploy the following advantages: Automatic mobile and tablet ready version No need for several different versions of an application or website Universal look and feel Seamless navigation Social plugins (Twitter and Facebook) are standard additions Rapid introduction of mobile applications without draining additional resources to develop and opportunity to focus on more innovative services Increased accessibility Utilizing innovative and standardized technology available at the Utah state government level allows for simple integration of warrant information. Utilizing a statewide database that the courts are feeding warrant information to supplies the data and makes it centrally available to citizens. 3
4 The phone system has been updated to direct users to the online system. There are also links on the main public safety website indicating that there has been an update to the system and directing users to the Warrants Check website. SIGNIFICANCE TO THE IMPROVEMENTS OF THE OPERATION OF GOVERNMENT Both citizens and the Bureau of Criminal Investigation benefit from the Warrant Check website given the ease of use and decrease in manual processing respectively. Realtime data is available via the Internet 24 hours a day, 7 days a week, which is more accurate and also diminishes the need to call a government office. The process has been significantly improved for both the Bureau of Criminal Investigation and citizens that need to find current warrant information. Previously a citizen had to call to determine the status or existence of a warrant. Now, a citizen has one Internet location to search and obtain real-time warrant information. In addition, it eliminates the need to call or visit a physical location and is available online (via computer, tablet or smart phone), 24 hours a day, 7 days a week. The Bureau of Criminal Investigation has seen a tremendous cost saving since implementation of the Warrant Check service. This saving is realized through reduced phone calls and personnel processing. Overall, it eliminates the need to call or visit a physical government location. This way, the agency can focus on servicing citizens more efficiently. BENEFITS OF THE PROJECT Providing more government services online will steadily increase agency efficiency. Continually expanding government service offerings available online transforms the way citizens interact and conduct business with government agencies. The Utah Warrants Check system illustrates how a simple offline process can be moved online to create government efficiencies while simultaneously improving the user experience. Information is more accurate due to the current nature of providing information real time. The Warrants Check system processes over 50,000 warrant searches each monththat s over 300,000 since implementation. Call volume decreased by 900% and is reallocating the equivalent of 3 full time employees. Prior to the implementation of Warrant Check, citizens had to call the Bureau of Criminal Investigation to inquire about the status of a warrant. Each phone call took on average 3 minutes. The Bureau of Criminal Intent fielded on average 973 calls/month. Callers would have to provide several combinations of name spelling options. This not only took up valuable employee resources, it was also confined to operating business hours. Now, the 4
5 Warrant Check system is updated real-time and available 24 hours a day, 7 days a week. The process has been significantly improved for both the Bureau of Criminal Investigation and citizens that need to find current warrant information. Previously a citizen had to call to determine the status or existence of a warrant. Now, a citizen has one Internet location to search and obtain real-time warrant information. In addition, it eliminates the need to call or visit a physical location and is available online (via computer, tablet or smart phone), 24 hours a day, 7 days a week. The Bureau of Criminal Investigation has seen a tremendous cost saving since implementation of the Warrant Check service. This saving is realized through reduced phone calls and personnel processing. Overall, it eliminates the need to call or visit a physical government location. This way, the agency can focus on servicing citizens more efficiently. Other benefits include: Information Consolidation- Central location for all state warrants information. The new online Warrants Check service provides real-time warrant information over the Internet 24 hours a day. Increased Accessibility- The Warrants Check system utilizes responsive design and can be accessed on any device without a decrease in service capacity or user experience, including mobile and tablet devices. Cost savings- Agencies realize cost savings due to the decrease in phone inquiries and personnel processing. Convenient citizen access- Citizens save time given the 24-hour access and ease of use. They are no longer required to visit or call a physical government location. Security The state of Utah and Utah.gov take Internet security very seriously. All searches are logged by IP address and require user authentication: First Name, Last Name, and Middle Initial. Information is transferred via secure protocol and the database is encrypted. The security policy is located in the footer of every screen. Privacy Utah developed a strict privacy policy in order to protect citizens. Innovation in 2011 has necessitated the inclusion of a no geo-location storage policy. The privacy policy is located in the footer of every screen. Since implementation, there has been a drastic increase in warrants searches. Given the anonymity of the site, users are able to quickly search for warrants information without having to physically call into the Bureau of Criminal Intent. 5
UTAH RESPONSIVE WEB DESIGN
UTAH RESPONSIVE WEB DESIGN Category: Information Communications Technology (ICT) Innovations Contact: David Fletcher, Chief Technology Officer State of Utah Project Initiation and Completion Dates: January
More information2013 NASCIO Recognition Award Application Government to Citizen
2013 NASCIO Recognition Award Application Government to Citizen West Virginia Office of Technology Suspicious Activity Reporting Mobile Application February 2012 Jimmy Gianato, Director West Virginia Division
More informationACCESS TO UTAH GOVERNMENT SERVICES: CUSTOMIZED SEARCH ENGINE
ACCESS TO UTAH GOVERNMENT SERVICES: CUSTOMIZED SEARCH ENGINE AND ONLINE SERVICES DATABASE EXECUTIVE SUMMARY Utah.gov, the official Web site for the State of Utah, provides access to over 800 State, local,
More informationPrivacy Policy. Effective Date: November 20, 2014
Privacy Policy Effective Date: November 20, 2014 Welcome to the American Born Moonshine website (this Site ). This policy describes the Privacy Policy (this Policy ) for this Site and describes how Windy
More informationMichigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive
More informationMichigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2005 Recognition Awards Enterprise Architecture Category Executive
More informationNASCIO 2013 Enterprise IT Management
NASCIO 2013 Enterprise IT Management 1. Title: Utah egovernment Effectiveness Study 2. Category: Enterprise IT Management 3. Contact: David G. Fletcher, Chief Technology Officer, Utah Department of Technology
More informationWhite Paper Secure Reverse Proxy Server and Web Application Firewall
White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security
More informationCitrix Application Streaming. Universal Application Packaging and Delivery Breaking Away from Traditional IT
Citrix Application Streaming Universal Application Packaging and Delivery Breaking Away from Traditional IT Application Packaging Application Delivery to Endpoint Devices Application Isolation Mode Automatic
More information2012 NASCIO Recognition Award Application Improving State Operations
2012 NASCIO Recognition Award Application Improving State Operations West Virginia Office of Technology West Virginia Public Defender Services Online Voucher System January 11, 2010 March 19, 2010 Russell
More information2013 NASCIO Recognition Awards. Delaware State Police Mobile Crime Tip Line App (ios and Android)
2013 NASCIO Recognition Awards Title: Delaware State Police Mobile Crime Tip Line App (ios and Android) Category: Digital Government: Government to Citizen (G to C) Contact: Greg Hughes Director, Government
More informationOntheGo (OtG) Mobile Payments
NASCIO 2014 State IT Recognition Awards Nomination OntheGo (OtG) Mobile Payments Category: Improving State Operations Contact: Bill Farnsworth Office of the CIO 650 W. State St., Room 100 / P.O. Box 83720
More informationHow To Use An Apa Sip (Sip) To Improve Your Business
The Business Value of Enterprise SIP - A CIO View Table of Contents Background... 1 What is SIP?... 1 Why SIP?... 1 1. Presence... 2 2. User Centricity vs. Device Bound... 3 3. SIP Trunking and Delivering
More informationThe Bureau of the Fiscal Service. Privacy Impact Assessment
The Bureau of the Fiscal Service Privacy Impact Assessment The mission of the Bureau of the Fiscal Service (Fiscal Service) is to promote the financial integrity and operational efficiency of the federal
More informationOpen Source Content Management System for content development: a comparative study
Open Source Content Management System for content development: a comparative study D. P. Tripathi Assistant Librarian Biju Patnaik Central Library NIT Rourkela dptnitrkl@gmail.com Designing dynamic and
More informationJune 1, 20111. Category: Agency
June 1, 20111 Commonwealth of Virginia Virginia Vital Events and Screening Tracking System Category: Crosss Boundary Collaboration Nominationn submitted by: Samuel A. Nixon Jr. Chief Information Officer
More informationDepartment of Technology Services
Department of Technology Services 2016-2019 Strategic Plan DTS Dept. of Technology Services Utah Code 63F- 1-203 explicitly requires the Chief Information Officer (CIO) to prepare an executive branch strategic
More informationNASCIO 2014 State IT Recognition Awards. Mississippi Governor s Job Fair Online Registration. State of Mississippi. Category: Government to Business
NASCIO 2014 State IT Recognition Awards Mississippi Governor s Job Fair Online Registration State of Mississippi Category: Government to Business Craig P. Orgeron, Ph.D., CPM Executive Director Department
More information3 QUESTIONS TO HELP DEFINE A SEAMLESS CUSTOMER EXPERIENCE
3 QUESTIONS TO HELP DEFINE A SEAMLESS CUSTOMER EXPERIENCE Business2Community The boom in tablet and smartphone usage has fueled the explosion of social customer service. Most conversations are coming from
More informationINFORMATION TECHNOLOGY GOVERNANCE IN PENNSYLVANIA. Executive Summary
INFORMATION TECHNOLOGY GOVERNANCE IN PENNSYLVANIA Executive Summary The Commonwealth of Pennsylvania has launched a comprehensive IT management transformation. This transformation is evolving the IT governance
More informationThe Role of Password Management in Achieving Compliance
White Paper The Role of Password Management in Achieving Compliance PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 617.674.2727 E-mail: sales@portalguard.com Website: www.portalguard.com
More informationExecutive Summary Overview
Executive Summary Overview Formalized during a Special Session on Crime in 1995, the Commonwealth of Pennsylvania s Justice Network (JNET) is a secure virtual system for the sharing of public safety and
More informationCookies Compliance Advisory
Cookies Compliance Advisory Note: this is an advisory notice that summarises the current position of the Article 29 Working Group and makes suggestions as to how organisations might practically achieve
More informationProject initiation and completion dates: March 5, 2013 July 9, 2014
Title: Next Generation 9-1-1: State of Ohio and Morgan County Category: Emerging and Innovative Technology Contact: Rob Jackson, Ohio 9-1-1 Administrator Ohio Department of Administrative Services Office
More informationQuest InTrust. Version 8.0. What's New. Active Directory Exchange Windows
Quest InTrust Version 8.0 What's New Active Directory Exchange Windows Abstract This document describes the new features and capabilities of Quest InTrust 8.0. Copyright 2004 Quest Software, Inc. and Quest
More informationNASCIO 2015 State IT Recognition Awards MISSISSIPPI. Mississippi State Department of Health MS Ready Mobile Application
NASCIO 2015 State IT Recognition Awards MISSISSIPPI Mississippi State Department of Health MS Ready Mobile Application Category: Information Communications Technology (ICT) Innovations Project Initiated:
More informationApplies To: HSC Component(s): All Responsible Department: HSLIC TECHS
Applies To: HSC Component(s): All Responsible Department: HSLIC TECHS Policy Patient Age Group: (X) N/A ( ) All Ages ( ) Newborns ( ) Pediatric ( ) Adult POLICY STATEMENT To promote the development of
More informationWebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com
WebRTC: Why and How? FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This docume nt is copyright of FRAFOS GmbH. Duplication or propagation or e xtracts
More informationInformation Security and Continuity Management Information Sharing Portal. Category: Risk Management Initiatives
Information Security and Continuity Management Information Sharing Portal Category: Risk Management Initiatives Contact: Chip Moore, CISO State of North Carolina Office of Information Technology Services
More informationZep Inc.: Global Online Privacy Notice
Zep Inc.: Global Online Privacy Notice Effective Date: March 26, 2015 We at Zep Inc., along with our affiliates (collectively, Zep ), respect your concerns about privacy. This Global Online Privacy Notice
More informationHow To Write A Request For Information (Rfi)
Request for Information No. 15-200-ACCO Litigation Hold & ediscovery Tool Posting Date: November 14, 2014 Event Timeline: This Request for Information (RFI) is issued by Washington State Department of
More informationDeveloping a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology
Developing a Policy for Bring Your Own Device Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer Office of Information Technology
More informationGoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop
Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Contents: Executive Summary... 1
More informationLoan Site Management - The Bank of Africa
Challenge ID: Published: Customised, flexible workflow and status reporting solution for managing a loan application process, and online interface between clients and the bank s lending department HELPDESK:
More informationIBM Payment Services. Service Definition. IBM Payment Services 1
IBM Payment Services Service Definition IBM Payment Services 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Process Services to allow Government bodies to deliver commerce
More information1. Important Information
We at ViewPoint (ViewPoint Government Solutions, Inc. and our affiliates) are committed to protecting your privacy. This Privacy Policy applies to both our websites (Websites), including www.viewpointcloud.com,
More informationInformation We Collect and Store as You Access and Use the Site
Effective Date: This Privacy Policy was last revised on January, 2015. 1. What Information Does the Site Collect? (a) Information You Provide to Us Personal Information and Demographic Information. On
More informationPEOPLESOFT HELPDESK FOR HUMAN RESOURCES
PEOPLESOFT HELPDESK FOR HUMAN RESOURCES Today s Human Resource organizations are faced with the challenge of providing rapid and high quality customer service to their workforce while containing or reducing
More informationMaximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization...
More informationFive Reasons It s Time For Secure Single Sign-On
Five Reasons It s Time For Secure Single Sign-On From improved security to increased customer engagement, secure single sign-on is a smart choice. Executive Overview While cloud-based applications provide
More informationCalifornia Mobile Gallery
California Mobile Gallery NASCIO Category: Government to Citizen Carlos Ramos, State Chief Information Officer California Department of Technology Project Initiation: January 2014 Project Completion: August
More informationTYPO3 6.x Enterprise Web CMS
An Acira Group Whitepaper April 2013 TYPO3 6.x Enterprise Web CMS A cloud ready open source web platform with enterprise systems integration Executive Summary TYPO3 separates content from design and function,
More informationNASCIO 2013 State IT Recognition Award Nomination. California Election Results Website. Open Government Initiatives
1 ONLINE VOTER REG. CARD ~ Office 2007 NASCIO 2013 State IT Recognition Award Nomination Title: California Election Results Website Category: Open Government Initiatives Contact: Chris Maio Information
More informationHow To Improve The Corpsmember Recruitment System
NASCIO 2014 State IT Recognition Awards California Conservation Corps Corpsmember Recruiting System (CoRe) Category: Fast Track Cloud Computing Project Initiation Date: September 23, 2013 Project Completion
More informationAccelerate your sales with SuiteBox
Accelerate your sales with SuiteBox SuiteBox transforms customer interaction with intuitive video and telephony, document collaboration, selective recording and real-time signing, helping you accelerate
More informationWebsite Development. Decision / Planning Phase. Website Design. > Kind words from our clients. Home Services Portfolio Free Quote Templates Contact
1 de 7 01-01-2010 21:01 Website Design > Kind words from our clients Home Services Portfolio Free Quote Templates Contact Website Development Many clients ask: What's included in custom "Website Development"?,
More informationStatewide Electronic Collision and Ticket Online Records (SECTOR)
NASCIO Statewide Electronic Collision and Ticket Online Records (SECTOR) NASCIO Staff Contact: Eric Sweden, MSIH MBA Program Director, Enterprise Architecture & Governance NASCIO NASCIO represents state
More informationCommonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012
Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives Initiation date: January 2012 Completion date: June 2012 Nomination submitted by: Samuel A. Nixon
More informationPrivacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction
Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Welcome! TripleFirrre, LLC, dba Just Seconds Apart knows that safeguarding your privacy is serious business. Your privacy
More informationPRIVACY POLICY. Last updated February 2, 2009 INTRODUCTION
PRIVACY POLICY Last updated February 2, 2009 INTRODUCTION This Privacy Policy explains how personal information about you may be collected, used, or disclosed by the Canadian Education and Research Institute
More informationTransitioning Computer Courseware to Mobile Web Apps
Transitioning Computer Courseware to Mobile Web Apps RE: http://vanat.cvm.umn.edu/mneuroconcepts/ Thomas F. Fletcher, DVM, PhD Synopsis: To exploit the learning potential of mobile devices, we are converting
More informationWHITE PAPER. Credit Issuers. Stop Application Fraud at the Source With Device Reputation
WHITE PAPER Credit Issuers Stop Application Fraud at the Source With Device Reputation Table of Contents Overview 1 Why you need more than conventional methods of fraud detection 2 It is not just credit
More informationMaximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
More information2008 Innovations Awards Program APPLICATION
2008 Innovations Awards Program APPLICATION CSG reserves the right to use or publish in other CSG products and services the information provided in this Innovations Awards Program Application. If your
More informationChemical Security Assessment Tool (CSAT)
for the Chemical Security Assessment Tool (CSAT) May 25, 2007 Contact Point Matt Bettridge Infrastructure Partnership Division 703-235-5495 Reviewing Official Hugo Teufel, III Chief Privacy Officer Department
More informationSecure Wireless LAN. Michigan Department of Information Technology
Secure Wireless LAN Michigan Department of Information Technology Contact Info: Jack Harris Director of Telecommunications Michigan Department of Information Technology 608 West Allegan 1st floor - MDIT
More information1. INTERFACE ENHANCEMENTS 2. REPORTING ENHANCEMENTS
W E L C O M E T O M O N I T O R I N G H E A V E N NEW THINGS ABOUT PANDORA FMS 5.0 A new version of Pandora FMS full of enhancements is about to hit the market. Pandora FMS 5.0 will be released by the
More informationPRIVACY POLICY. Your Personal Information will be processed by Whistle Sports in the United States.
PRIVACY POLICY This Policy was last changed on March 31, 2015. Kids Sports Entertainment, Inc. d/b/a The Whistle ( Whistle Sports ) and its affiliates operate this website, and any and all Whistle Sports
More informationAccess Health CT: Connecticut s Health Insurance Marketplace
Access Health CT: Connecticut s Health Insurance Marketplace NASCIO 2014 State IT Recognition Awards Category: Digital Government: Government to Citizen Contact: Mark Raymond State of Connecticut Chief
More informationPayroll Operations and Information Management and Payroll Services Alliance Management Office Annual Report. November 2007
Payroll Operations and Information Management and Payroll Services Alliance Management Office Annual Report November 2007 1. Initiative Overview 2. Status Update 3. Appendix A: Contract Objectives 4. Appendix
More informationPrivacy Policy (as of 02.2015)
Privacy Policy (as of 02.2015) We want you to feel secure when visiting our websites, viewing our Online Shop and during all bidding and purchasing processes and their handling, when you engage Auctionata
More informationCloud Video Surveillance Platform for Safe City Projects
Cloud Video Surveillance Platform for Safe City Projects Citywide, Large-Scale, Complex Video Surveillance Deployments Made Simple and Cost Effective SafeCiti reduces crime and promotes social and economic
More informationSage CRM 7.2 Enhancing productivity. Enabling success.
Sage CRM 7.2 Enhancing productivity. Enabling success. May 2013 What s new for Sage CRM 7.2? Sage CRM 7.2 has been designed to support busy, growing businesses who want to foster internal collaboration,
More informationOpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the
More informationWEBSITE PRIVACY POLICY. Last modified 10/20/11
WEBSITE PRIVACY POLICY Last modified 10/20/11 1. Introduction 1.1 Questions. This website is owned and operated by. If you have any questions or concerns about our Privacy Policy, feel free to email us
More informationQUICK FEATURE GUIDE OF SNAPPII'S ULTRAFAST CODELESS PLATFORM
QUICK FEATURE GUIDE OF SNAPPII'S ULTRAFAST CODELESS PLATFORM (* Click on the screenshots to enlarge) TABLE OF CONTENTS 1. Visually Develop Mobile Applications 2. Build Apps for Any Android or ios Device
More informationSecuring Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
More informationPrivacy Policy - LuxTNT.com
Privacy Policy - LuxTNT.com Overview TNT Luxury Group Limited (the owner of LuxTNT.com). knows that you care how information about you is used and shared, and we appreciate your trust that we will do so
More informationMiddleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
More informationElgg 1.8 Social Networking
Elgg 1.8 Social Networking Create, customize, and deploy your very networking site with Elgg own social Cash Costello PACKT PUBLISHING open source* community experience distilled - BIRMINGHAM MUMBAI Preface
More informationAn Oracle White Paper August 2010. Higher Security, Greater Access with Oracle Desktop Virtualization
An Oracle White Paper August 2010 Higher Security, Greater Access with Oracle Desktop Virtualization Introduction... 1 Desktop Infrastructure Challenges... 2 Oracle s Desktop Virtualization Solutions Beyond
More informationPARTNER INTEGRATION GUIDE. Edition 1.0
PARTNER INTEGRATION GUIDE Edition 1.0 Last Revised December 11, 2014 Overview This document provides standards and guidance for USAA partners when considering integration with USAA. It is an overview of
More informationCitrix: NetScaler and CloudBridge Solutions on AWS
ESG Solution Showcase Citrix: NetScaler and CloudBridge Solutions on AWS Date: September 2015 Author: Mark Bowker, Senior Analyst; and Leah Matuson, Research Analyst Abstract: With exploding data growth,
More informationWeb Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite
More informationThe Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
More informationSECURE YOUR DATA EXCHANGE WITH SAFE-T BOX
SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data
More informationOregon Retirement Information Online Network (ORION) Online Member Services (OMS)
Oregon Retirement Information Online Network (ORION) Online Member Services (OMS) Category 7: Improving State Operations Submitted by: State of Oregon/ Public Employees Retirement System/ISD Project Completion
More informationCamp Washington and Northside Hardware Store Website. By: Kara Bomkamp, Jamie Frebis, & Mohamed Shaker Badr. Submitted to:
Camp Washington and Northside Hardware Store Website By: Kara Bomkamp, Jamie Frebis, & Mohamed Shaker Badr Submitted to: The Faculty of the School of Information Technology in Partial Fulfillment of the
More informationUsing Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
More informationQuick Start Guide. Installation and Setup
Quick Start Guide Installation and Setup Introduction Velaro s live help and survey management system provides an exciting new way to engage your customers and website visitors. While adding any new technology
More informationCustomer Timeline - New in Summer 2012. Web Lead Capture - New in Summer 2012. Built-In Dashboards - New in Summer 2012
What s New Maximizer CRM 12 Features New Mobile Access User Interface Enhanced Mobile Access Appointment Management Enhanced Web Access User Interface Improved Web Access Speed & Navigation LinkedIn Integration
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationARYZTA PRIVACY POLICY
ARYZTA PRIVACY POLICY TABLE OF CONTENTS 1. Privacy Statement 2. Consent 3. Consent to Share and Disclose Information, Including International Data Transfers 4. Consent to Electronic Notice If There is
More informationPrivacy Impact Assessment of the Nationwide Mortgage Licensing System and Registry
Privacy Impact Assessment of the Nationwide Mortgage Licensing System and Registry Program or application name: Nationwide Mortgage Licensing System and Registry (NMLSR) System Owner: Board of Governors
More informationDDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack
DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack Sugih Jamin EECS Department University of Michigan jamin@eecs.umich.edu Internet Design Goals Key design goals of Internet protocols:
More informationNDoc Software Solutions Overview
NDoc Software Solutions Overview Today, home healthcare and hospice agencies are encountering increasingly more complex business challenges. To meet these challenges, you need to automate your business
More informationORACLE MOBILE APPLICATION FRAMEWORK DATA SHEET
ORACLE MOBILE APPLICATION FRAMEWORK DATA SHEET PRODUCTIVE ENTERPRISE MOBILE APPLICATIONS DEVELOPMENT KEY FEATURES Visual and declarative development Mobile optimized user experience Simplified access to
More informationSoftware evaluation criteria and terminology REPORT # : R07/0203 AUTHOR(S) : Diane Belyk & David Feist DATE : March 2002
Athabasca University CENTRE FOR DISTANCE EDUCATION Online Software Evaluation Report TITLE : Software evaluation criteria and terminology REPORT # : R07/0203 AUTHOR(S) : Diane Belyk & David Feist DATE
More informationCervino Marketing Delivers Smart Marketing Dashboards. Netherlands-based Klipfolio Partner Combines Big Data Engine with Klipfolio Dashboards
Cervino Marketing Delivers Smart Marketing Dashboards Netherlands-based Klipfolio Partner Combines Big Data Engine with Klipfolio Dashboards Company Background: Cervino Marketing, based in Amsterdam, the
More informationDEPARTMENT OF HUMAN RESOURCE MANAGEMENT
DEPARTMENT OF HUMAN RESOURCE MANAGEMENT REPORT ON AUDIT FOR THE YEAR ENDED JUNE 30, 2014 Auditor of Public Accounts Martha S. Mavredes, CPA www.apa.virginia.gov (804) 225-3350 AUDIT SUMMARY Our audit of
More informationOnline and Mobile Privacy Notice ( Privacy Notice )
Online and Mobile Privacy Notice ( Privacy Notice ) Introduction This Privacy Notice applies to the operations of Cigna Global Health Benefits and its affiliated companies listed at the end of this Privacy
More informationFogbeam Vision Series - The Modern Intranet
Fogbeam Labs Cut Through The Information Fog http://www.fogbeam.com Fogbeam Vision Series - The Modern Intranet Where It All Started Intranets began to appear as a venue for collaboration and knowledge
More informationHarnessing the Data Flood: Oracle s Visionary Platform from Device to Data Center. Chris Baker Senior Vice President Worldwide ISV/OEM Java Sales
Harnessing the Data Flood: Oracle s Visionary Platform from Device to Data Center Chris Baker Senior Vice President Worldwide ISV/OEM Java Sales Canvas Lumber Compass Sextant 1851 America s Cup The oldest
More informationAdaptive Architecture For Criminal Justice Systems
2003 NASCIO Recognition Awards Enterprise Information Architecture Category Adaptive Architecture For Criminal Justice Systems NORTH CAROLINA DEPARTMENT OF JUSTICE INFORMATION TECHNOLOGY DIVISION 2003
More informationORACLE MOBILE SUITE. Complete Mobile Development Solution. Cross Device Solution. Shared Services Infrastructure for Mobility
ORACLE MOBILE SUITE COMPLETE MOBILE DEVELOPMENT AND DEPLOYMENT PLATFORM KEY FEATURES Productivity boosting mobile development framework Cross device/os deployment Lightweight and robust enterprise service
More information2005 NASCIO AWARD NOMINATION Recognition Awards: Innovative Use of Technology OK.gov s Agency Content Management System
2005 NASCIO AWARD NOMINATION Recognition Awards: Innovative Use of Technology OK.gov s Agency Content Management System Submitted by: OK.gov, Oklahoma s Official Web Portal (www.ok.gov) June 9, 2005 Contact
More informationM&T BANK CANADIAN PRIVACY POLICY
M&T BANK CANADIAN PRIVACY POLICY At M&T Bank, we are committed to safeguarding your personal information and maintaining your privacy. This has always been a priority for us and this is why M&T Bank (
More informationCustomer Data Integration Essentials
Customer Data Integration Essentials By George Kaminski Director of Solutions Consulting Knotice, an IgnitionOne company Customer Data Integration Essentials 1 WHY CDI MATTERS Marketers today require the
More information