E-ISuite Overview 05 October 2010. What is I-Suite?  Portable, Client-Server Application  Used Primarily at ICPs  Captures Incident Data Resource Check-In.

Slides:



Advertisements
Similar presentations
Module 13: Implementing ISA Server 2004 Enterprise Edition: Site-to-Site VPN Scenario.
Advertisements

Module 1: Introduction to SQL Server Reporting Services.
SECTOR SYSTEM OVERVIEW For Local Agency System Administrators (LASA) and Information Technology Specialists.
Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
SHAREPOINTEXCHANGELYNCOFFICE WEB APPS Server to Server Authentication Site Mailboxes High Resolution Photos Task Synchronization Unified Contact.
I-Suite Update Version 13 I-Suite General Focus Development – Minimal changes to current I-Suite – Primary Focus is e-Isuite Supporting Multiple.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
…the basics….  Windows 7 Professional or Windows 2003/2008 Server  No competing http Services (Tomcat6 will provide web services on server machine)
Lesson 2: Configuring Servers
Web-based Control Interface For a model train control system By: Kevin Sendra.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Designed By: Technical Training Department
E-ISuite An Automated Incident Business Information and Support Tool e-ISUITE-EP.
Duncan Fraiser, Adam Gambrell, Lisa Schalk, Emily Williams
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
FreightSupplyChain Trinity Business Solutions Limited International Freight Consolidators March 2001 Trinity Business Solutions Limited International Freight.
GV-Control Center Overview
Technology Overview. Confidential & Proprietary Information System Unit Server Two-way Satellite network System includes units and server Units have built.
5 Copyright © 2007, Oracle. All rights reserved. Configuring the Oracle Network Environment.
DOCSERVER [Windows 2003] I-SUITE Server [Windows XP] I-Suite Server Application I-Suite Database I-Suite Database Backups Current Incident DOCSERVER Backups.
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
11 Copyright © 2005, Oracle. All rights reserved. Configuring the Oracle Network Environment.
11 Copyright © 2005, Oracle. All rights reserved. Configuring the Oracle Network Environment.
UNIT 1 INFRASTRUCTURE AND APPLICATION SUPPORT. UNIT OBJECTIVES Name the different ROSS application platforms. Describe the difference between client hardware,
Module 13: Maintaining Software by Using Windows Server Update Services.
Simple Database.
CAMP 101 THINGS TO … TRANSITION EI-SUITE/I-SUITE ADMIN MISC
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
I-Suite An Automated Incident Business Information and Support Tool WILDLAND FIRE HURRICANES ALL RISK ASSIGNMENTS Full Versions of these Training Materials.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
Site Training Installation. Navigate to location of the install package Important – Launch the e-ISuite Installer using your agency’s install protocol.
2014 e-ISuite CTSP Presentation 2014 e-ISuite CTSP Presentation.
Dynamic Host Configuration Protocol Engr. Mehran Mamonai.
6 Copyright © 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
How to use Remote Desktop and Remote Support. What is remote desktop? Remotely control your computer from another office, from home, or while traveling.
1 Weblite Product Introduction. 2 Control Equipment via the Internet 8 Universal Inputs 8 Universal Outputs software selectable as analog or digital signals.
A Study of Wireless Virtual Network Computing Kiran Erra.
 Next Generation of I-Suite  Browser Based Application  Accessed From:  Incident Command Post – Internet Optional  Agency Offices  Wherever Internet.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Site Training Installation. Navigate to location of the install package Important – Launch the e-ISuite Installer using your agency’s install protocol.
Incident Based Automation CTSP Workshop Agenda IBA Background Phase 2 Strategic Analysis Phase 3 Projects I-Suite e-ISuite.
System Overview 18 March I-Suite is An Automated Incident Business Information and Support Tool Written as a Portable Client/Server Application.
National Logistics Workshop Boise, ID – 3/1/2011.
Incident Security & Confidentiality Integrity Availability.
Metadata By N.Gopinath AP/CSE Metadata and it’s role in the lifecycle. The collection, maintenance, and deployment of metadata Metadata and tool integration.
Dispatching Java agents to user for data extraction from third party web sites Alex Roque F.I.U. HPDRC.
SHAREPOINTEXCHANGELYNCOFFICE WEB APPS Server to Server Authentication Site Mailboxes High Resolution Photos Task Synchronization Unified Contact.
Make Your Mark.. Paul Cannon Technical Specialist, Office Enterprise Groove and OneNote: Extending Collaboration with Office Enterprise OFC227.
IT Services Model Business Requirements IT Strategies Goals
…the basics…. Wildland Fire Information and Technology Server Requirements ● Windows 7 Professional or Windows 2003/2008 Server ● Windows 8/10 (discussion)
 Auditing  Add User Accounts from NAP – Privileged and Non-Privileged  Remove a User Account from Enterprise – this does not affect the NAP account.
Overview.  Browser Based Application  Accessed From:  Incident Command Post – Internet Optional  Agency Offices  Wherever Internet is Available 
Introduction to Networking. What is a Network? Discuss in groups.
Overview.  Next Generation of I-Suite  Browser Based Application  Accessed From:  Incident Command Post – Internet Optional  Agency Offices  Wherever.
A Study of Wireless Virtual Network Computing
IBM WEBSPHERE MESSAGE QUEUE online Training | IBM WEBSPHERE MQ Training
Printers.
Peter Erning, PSP-T11, Power Gen 2010
IS 4506 Server Configuration (HTTP Server)
Tiers vs. Layers.
Radoslaw Jedynak, PhD Poland, Technical University of Radom
PRESENTER GUIDANCE: These charts provide data points on how IBM BaaS mid-market benefits a client with the ability to utilize a variety of backup software.
Station Management System
Online software and backups
- Each site (if that site has:). - computers. - electricity
Snippet Engine as a Database Server
New Technologies for Storage and Display of Meteorological Data
Your computer is the client
Presentation transcript:

e-ISuite Overview 05 October 2010

What is I-Suite?  Portable, Client-Server Application  Used Primarily at ICPs  Captures Incident Data Resource Check-In Resource Check-In Resource Plans Resource Plans Time Time Cost Cost Injury/Illness Injury/Illness Supply Supply

What is e-ISuite?  Next Generation of I-Suite  Browser Based Application  Accessed From Incident Command Post – Internet Optional Incident Command Post – Internet Optional Agency Offices Agency Offices Wherever Internet is Available Wherever Internet is Available  Increased Usage All Incident Types All Incident Types

Why e-ISuite?  Centralize Incident Data  Support Complete Incident Life Cycle  Improve Electronic Payment Process  Support All Incident Configurations and Transitions  Provide Automatic Data Backup and Recovery  Record Historical Incident Data  Support Data Warehouse

Types of e-ISuite e-ISuite Enterprise e-ISuite Remote Site

e-ISuite Enterprise  Typically Used For Initial Attack Initial Attack Type 3, 4 and 5 Incidents Type 3, 4 and 5 Incidents ABCD Miscellaneous Incidents ABCD Miscellaneous Incidents Training Support Training Support Dispatch and Cache Support Dispatch and Cache Support  Installed at Central Location  Accessible Through Browser  Interface to Other Systems ROSS ROSS ICBS ICBS

e-ISuite Remote Site  Typically Used For Type 1 and Type 2 Incidents Type 1 and Type 2 Incidents Any Incidents With Incident Management Team at the Site Any Incidents With Incident Management Team at the Site  Installed on Incident Server Internet Connection Not Required Internet Connection Not Required Accessible Through a Browser Accessible Through a Browser Not Installed on Client Computers Not Installed on Client Computers  Synchronizes With Enterprise Receives Data from Enterprise Receives Data from Enterprise Sends Data to Enterprise Sends Data to Enterprise

Enterprise & Site Interaction e-ISuite Enterprise e-ISuite Remote Site External Systems

? Questions?