IBM® i2® Integrated Law Enforcement is an IBM Smarter Cities® solution that addresses the needs of modern-day law enforcement agencies. It is a solution framework that provides the individual capabilities of the products that comprise the solution and extended capabilities developed through the synergistic integration of those product components. As a framework, IBM i2 Integrated Law Enforcement allows for the continuous expansion of capabilities by putting together building blocks within the system and integrating with new, external systems. In doing so, an organization can respond and adapt to its changing needs. Simply stated, the configuration, integration, and implementation of IBM i2 Integrated Law Enforcement and its components provide the tools for more effective law enforcement. This IBM RedpaperTM publication explains the technology and the architecture on which the solution is built. Most importantly, this paper enables technical teams to install, configure, and deploy an instance of the i2 Integrated Law Enforcement solution using the product i2 Intelligent Law Enforcement V1.0.1. This paper is targeted to solution architects, system and deployment engineers, security specialists, data management experts, system analysts, software developers and test engineers, and system administrators. Readers of this paper will benefit from the IBM RedguideTM publication "Integrated Law Enforcement: A Holistic Approach to Solving Crime", REDP-5116.
Across numerous vertical industries, enterprises are challenged to improve processing efficiency as transactions flow from their business communities to their internal systems and vice versa, simplify management and expansion of the external communities, accommodate customer and supplier preferences, govern the flow of information, enforce policy and standards, and protect sensitive information. Throughout this process, external partners must be on-boarded and off-boarded, information must flow across multiple communications infrastructures, and data must be mapped and transformed for consumption across multiple applications. Some transactions require synchronous or real-time processing while others are of a more periodic nature. For some classes of customer or supplier, the enterprise might prefer a locally-managed, on-premise solution. For some types of communities (often small businesses), an as-a-Service solution might be the best option. Many large enterprises combine the on-premise and as-a-Service approach to serve different categories of business partners (customers or suppliers). This IBM® Redbooks® publication focuses on solutions for end-to-end integration in complex value chains and presents several end-to-end common integration scenarios with IBM Sterling and IBM WebSphere® portfolios. We believe that this publication will be a reference for IT Specialists and IT Architects implementing an integration solution architecture involving IBM Sterling and IBM WebSphere portfolios.
SAP is a market leader in enterprise business application software. SAP solutions provide a rich set of composable application modules, and configurable functional capabilities that are expected from a comprehensive enterprise business application software suite. In most cases, companies that adopt SAP software remain heterogeneous enterprises running both SAP and non-SAP systems to support their business processes. Regardless of the specific scenario, in heterogeneous enterprises most SAP implementations must be integrated with a variety of non-SAP enterprise systems: Portals Messaging infrastructure Business process management (BPM) tools Enterprise Content Management (ECM) methods and tools Business analytics (BA) and business intelligence (BI) technologies Security Systems of record Systems of engagement The tooling included with SAP software addresses many needs for creating SAP-centric environments. However, the classic approach to implementing SAP functionality generally leaves the business with a rigid solution that is difficult and expensive to change and enhance. When SAP software is used in a large, heterogeneous enterprise environment, SAP clients face the dilemma of selecting the correct set of tools and platforms to implement SAP functionality, and to integrate the SAP solutions with non-SAP systems. This IBM® Redbooks® publication explains the value of integrating IBM software with SAP solutions. It describes how to enhance and extend pre-built capabilities in SAP software with best-in-class IBM enterprise software, enabling clients to maximize return on investment (ROI) in their SAP investment and achieve a balanced enterprise architecture approach. This book describes IBM Reference Architecture for SAP, a prescriptive blueprint for using IBM software in SAP solutions. The reference architecture is focused on defining the use of IBM software with SAP, and is not intended to address the internal aspects of SAP components. The chapters of this book provide a specific reference architecture for many of the architectural domains that are each important for a large enterprise to establish common strategy, efficiency, and balance. The majority of the most important architectural domain topics, such as integration, process optimization, master data management, mobile access, Enterprise Content Management, business intelligence, DevOps, security, systems monitoring, and so on, are covered in the book. However, there are several other architectural domains which are not included in the book. This is not to imply that these other architectural domains are not important or are less important, or that IBM does not offer a solution to address them. It is only reflective of time constraints, available resources, and the complexity of assembling a book on an extremely broad topic. Although more content could have been added, the authors feel confident that the scope of architectural material that has been included should provide organizations with a fantastic head start in defining their own enterprise reference architecture for many of the important architectural domains, and it is hoped that this book provides great value to those reading it. This IBM Redbooks publication is targeted to the following audiences: Client decision makers and solution architects leading enterprise transformation projects and wanting to gain further insight so that they can benefit from the integration of IBM software in large-scale SAP projects. IT architects and consultants integrating IBM technology with SAP solutions.
Today many organizations face challenges when developing a realistic plan or schedule that provides the best possible balance between customer service and revenue goals. Optimization technology has long been used to find the best solutions to complex planning and scheduling problems. A decision-support environment that enables the flexible exploration of all the trade-offs and sensitivities needs to provide the following capabilities: Flexibility to develop and compare realistic planning and scheduling scenarios Quality sensitivity analysis and explanations Collaborative planning and scenario sharing Decision recommendations This IBM® Redbooks® publication introduces you to the IBM ILOG® Optimization Decision Manager (ODM) Enterprise. This decision-support application provides the capabilities you need to take full advantage of optimization technology. Applications built with IBM ILOG ODM Enterprise can help users create, compare, and understand planning or scheduling scenarios. They can also adjust any of the model inputs or goals, and fully understanding the binding constraints, trade-offs, sensitivities, and business options. This book enables business analysts, architects, and administrators to design and use their own operational decision management solution.
To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized changes and out-of-compliance actions within the Information Technology (IT) infrastructure. Using the IBM® Tivoli Security Information and Event Manager solution organizations can improve the security of their information systems by capturing comprehensive log data, correlating this data through sophisticated log interpretation and normalization, and communicating results through a dashboard and full set of audit and compliance reporting. In this IBM Redbooks® publication, we discuss the business context of security audit and compliance software for organizations and describe the logical and physical components of IBM Tivoli Security Information and Event Manager. We also present a typical deployment within a business scenario. This book is a valuable resource for security officers, administrators, and architects who want to understand and implement a centralized security audit and compliance solution.
IBM® WatsonTM Content Analytics (Content Analytics) Version 3.0 (formerly known as IBM Content Analytics with Enterprise Search (ICAwES)) helps you to unlock the value of unstructured content to gain new actionable business insight and provides the enterprise search capability all in one product. Content Analytics comes with a set of tools and a robust user interface to empower you to better identify new revenue opportunities, improve customer satisfaction, detect problems early, and improve products, services, and offerings. To help you gain the most benefits from your unstructured content, this IBM Redbooks® publication provides in-depth information about the features and capabilities of Content Analytics, how the content analytics works, and how to perform effective and efficient content analytics on your content to discover actionable business insights. This book covers key concepts in content analytics, such as facets, frequency, deviation, correlation, trend, and sentimental analysis. It describes the content analytics miner, and guides you on performing content analytics using views, dictionary lookup, and customization. The book also covers using IBM Content Analytics Studio for domain-specific content analytics, integrating with IBM Content Classification to get categories and new metadata, and interfacing with IBM Cognos® Business Intelligence (BI) to add values in BI reporting and analysis, and customizing the content analytics miner with APIs. In addition, the book describes how to use the enterprise search capability for the discovery and retrieval of documents using various query and visual navigation techniques, and customization of crawling, parsing, indexing, and runtime search to improve search results. The target audience of this book is decision makers, business users, and IT architects and specialists who want to understand and analyze their enterprise content to improve and enhance their business operations. It is also intended as a technical how-to guide for use with the online IBM Knowledge Center for configuring and performing content analytics and enterprise search with Content Analytics.
IBM® defines a smarter city as one that makes optimal use of all available information to better understand and control its operations and optimize the use of resources. There is much information available from different sources. However, city officials often lack the holistic view of the city's operations that is required to respond to the citizens' needs in a timely manner and use the city resources wisely. IBM Intelligent Operations Center delivers a unified view of city agencies, providing three primary elements for successful management of cities: use information, anticipate problems, and coordinate actions and resources. Chapter 1 of this IBM Redbooks® publication introduces the IBM Intelligent Operations Center solution. The chapter provides a high-level overview of its features, benefits, and architecture. This information is intended for city officials and IT architects that must understand the business value of IBM Intelligent Operations Center and its architecture. The remaining chapters of this book focus on information that help IBM Intelligent Operations Center administrators perform daily administration tasks. This book describes commands and tools that IBM Intelligent Operations Center administrators must use to keep the solution running, troubleshoot and diagnose problems, and perform preventive maintenance. This book includes preferred practices, tips and techniques, and general suggestions for administrators of IBM Intelligent Operations Center on-premises deployments. For related information about this topic, refer to the following IBM Redbooks publications: IBM Intelligent Operations Center for Smarter Cities Redpaper, REDP-4939 IBM Intelligent Operations Center for Smarter Cities Solution Guide
This IBM® Redbooks® publication provides a technical overview of the features, functions, and enhancements available in IBM i 7.1, including all the Technology Refresh (TR) levels from TR1 to TR7. It provides a summary and brief explanation of the many capabilities and functions in the operating system. It also describes many of the licensed programs and application development tools that are associated with IBM i. The information provided in this book is useful for clients, IBM Business Partners, and IBM service professionals who are involved with planning, supporting, upgrading, and implementing IBM i 7.1 solutions.
This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM System Storage® DS8700 storage subsystem. This book has reference information that will help you plan for, install, and configure the DS8700 and also discusses the architecture and components. The DS8700 is the most advanced model in the IBM System Storage DS8000® series. It includes IBM POWER6®-based controllers, with a dual 2-way or dual 4-way processor complex implementation. Its extended connectivity, with up to 128 Fibre Channel/FICON® ports for host connections, make it suitable for multiple server environments in both open systems and IBM System z® environments. If desired, the DS8700 can be integrated in an LDAP infrastructure. The DS8700 supports thin provisioning. Depending on your specific needs, the DS8700 storage subsystem can be equipped with SATA drives, FC drives, and Solid® State Drives (SSDs). The DS8700 can now automatically optimize the use of SSD drives through its no charge Easy Tier feature. The DS8700 also supports Full Disk Encryption (FDE) feature. Its switched Fibre Channel architecture, dual processor complex implementation, high availability design, and the advanced Point-in-Time Copy and Remote Mirror and Copy functions that incorporates make the DS8700 storage subsystem suitable for mission-critical business functions.