ILP’s core philosophy: humanizing police, as well as the citizens they protect, is the most effective form of crime prevention.
Read More →
The time officers spend on incident reporting is removing them from other high value-tasks
Read More →Panasonic System Solutions Company of North America has announced the launch of "Unified Digital Evidence," its newest software technology to collect, manage, and protect digital evidence.
Read More →The CASE Initiative began in 2015 at the U.S. Department of Defense Cyber Crime Center (DC3). The standard was released as open source in 2017 and its adoption grew following a meeting at Europol’s European Cybercrime Centre. The primary motivation for CASE is interoperability—to advance the exchange of cyber-investigation information between tools and organizations.
Read More →This partnership is designed to meet public safety's needs by combining Nuance's powerful Dragon Law Enforcement speech recognition technology with Nexgen's robust set of software system offerings – with both partners bringing decades of experience in their sectors to bear.
Read More →
Dragon speech recognition solutions transform productivity and documentation accuracy for industries, including public safety.
Read More →
Dragon speech recognition solutions are designed to transform productivity and documentation accuracy for industries including public safety.
Read More →In Oregon, the Washington County Sheriff’s Office is using the program to look for matches within its own database of booking mug shots, said Deputy Jeff Talbot. The department also confirms each match made through the Rekognition software by another method, he said.
Read More →Exposure Tracker is a cloud-based software service that allows first responders to document and access data related to exposure to toxic materials, carcinogens, and other harmful substances on any internet-connected device.
Read More →“DigitalPersona offers Toughbook customers the option of an integrated approach to strengthening their overall security posture without burdening the user or the IT department,” said Lance Roncalli, SVP for Crossmatch. “Administrators can establish the optimal authentication approach for a given use case and user.”
Read More →