The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.
|Wisconsin State Patrol Tests New Path to Radio Interoperability||
By the National Institute of Justice - April 2010
|WideBridge: Bridging the Gap to Provide Mission-Critical Broadband Services for Public Safety||
WideBridge: Bridging the Gap to Provide Mission-Critical Broadband Services for Public Safety
WideBridgeTM is designed to provide public safety first responders with the next evolution in secure, standards-based mission-critical communications leveraging Land Mobile Radio with LTE cellular networks and Smartphones for situational awareness and information sharing to keep communities safe and save lives. WideBridge is a part of the SmartResponderTM solution family.
|Communications Interoperability||Communications||February 2016|
|Why Law Enforcement Should Consider a Multi-Tier Storage Approach||
Too often law enforcement professionals are required to make important decisions under time and fiscal restraints. This has led to many project-based technology decisions. In fact, with the influx of agencies adopting body-worn technology coupled with the future of adoptions under Obama’s $75 million Federal Match program, agencies will have the ability to deploy these community-supported, liability-reducing technologies. Unfortunately, what is not being taken into account is the big picture view where body cams are just one important element of an officer’s workflow and evidence management. Video data becomes part of the unified chain of evidence. When needed for a case,everyone involved—from the officer to forensic analysts to prosecutors—needs to be able to find and access the information quickly and easily. Storage also needs to adhere to specific regulations applicable to all criminal justice information (CJI). Recently, the International Association of Chiefs of Police (IACP) recommended agencies adopt storage solutions meeting the FBI’s Criminal Justice Information Services (CJIS) guidelines. At the same time, officers need to be free to focus on their mission of protecting people and property. This is where purpose-built architecture is important.
|Data Storage||Data Management||March 2016|
|White House Report: Securing the Homeland Strengthening the Nation||
A new wave of terrorism, involving new weapons, looms in America’s future. It is a challenge unlike any ever faced by our Nation. But we are not daunted. We possess the resources and the determination to defeat our enemies and work to secure our homeland against the threats they pose.
|Homeland Security Report||Data Management||February 2002|
|What is Application Security?||
Every enterprise’s application landscape is now both business critical and rapidly expanding.
Mobile and cloud computing are dramatically changing the way we do business. Today, the world runs on applications, and, as a result, every company is becoming a software company – regardless of its primary business. Even GE now considers itself a software company.
And enterprises are producing these applications faster than ever before, often using Agile development processes and then augmenting their internal development programs with third-party software and open source libraries and components.
How can organizations ensure the security of their critical and fluid application landscapes? That’s where application security comes in.
|Data Security||Data Management, Security||April 2016|
|What Are the Feds Doing Anyhow?||
What's the funding picture for FY 2010 going to look like? What impact will our country's economic woes have on grant funding programs next year? Have these politically charged times changed the approach the Federal Government will take to provide state and local justice and public safety grant assistance? In the September/October 2009 edition of Public Safety IT Magazine, CJIS GROUP partner, Gary Cooper, looks at potential FY 2010 DOJ and DHS state and local grant appropriations.
|Voice, Video and Broadband: The Changing Competitive Landscape and Its Impact on Consumers||
Industry executives, economists, analysts, and local government officials offer a variety of perspectives on competition among providers of video programming delivery, local telephony, and broadband services.
|Telecommunications Industry Developments||Communications||October 2008|
|VMware K-12 Education Secure Online Testing Solution||
Is your school district prepared to securely deliver state assessments that comply with the Common Core State Standards Initiative? Leveraging VMware Horizon to deliver online tests in a virtual desktop environment ensures compliance with PARCC and Smarter Balanced technical and security requirements while giving IT the flexibility to optimize use of computing resources. Security and privacy of student information is maintained while test integrity is preserved.
Sponsored by CarahSoft
|Education, Data Security||Data Management||September 2015|
|Video Surveillance Storage: Enabling Infrastructure for Next Generation Security Systems||
Demand remains high for video surveillance solutions. In addition to the increasing volume of surveillance cameras shipped annually, technological advances mean each new generation of surveillance cameras benefit from improvements in image quality. Image quality is a complex matrix influenced by many different elements. Generally, improved image quality means greater data storage requirements. Whilst there are continuing advances in compression technologies providing a trade-off between image quality, bandwidth and storage requirements, these cannot completely mitigate the increase in data associated with higher quality video. Simply put, more storage and more compute is required to manage data from an increasing number of surveillance cameras capturing higher quality video.
|Security, Data Storage||Data Management, Security||February 2016|