SlideShare uma empresa Scribd logo
1 de 33
Baixar para ler offline
Welcome
to presentation onto presentation on
Police IT
6th April 2010
Presentation Structure
Introduction
History
FeaturesFeatures
Precursors
Roll Out Process
Integration with CCTNS
Demo
Conclusion
Introduction
Comprehensive ERP system
providing seamless integrationproviding seamless integration
of the day to day operations of
the Police Department
Introduction…
In its conceptualization,
creation and roll out, it wouldcreation and roll out, it would
have a pioneering impact in the
way Police in India would go
digital in the days to come
Milestones
• Broadband Networking
• E-Procurement
• GPS based AVLS system
G-CARE, GIS based• G-CARE, GIS based
• Real time Videoconferencing
• CCTNS- MoU, Lead State, K-
CoPS
• Anti Virus, Asset Management
& FMS
Milestones
• Project Management of Police IT
• Hiring of professional experts
• Setting of training center
• Skeletal Data Center• Skeletal Data Center
• Integration of Bangalore Traffic
Police in WAN
• Usage of CCIS/ADT in all
Bangalore City Police Stations
• Three state level Nodal Officers
Meetings
History
• CCIS, Crime Criminal
Information System
• CIPA, Common Integrated
Police ApplicationPolice Application
• Police IT
• CCTNS, Crime Criminal
Tracking Network and Systems
History…
• Software development started in
2004
• Workflow Design was introduced in• Workflow Design was introduced in
2006
• Changed to centralized architecture
in 2008
• UAT for 11 modules - Aug09 to March
2010
History…
• Pilot for 5 modules between
Jan to March 2010
• Phased deployment across
1439 locations starts today
• The phased implementation to
be completed by year end
Features
• Centralized Architecture
• Bilingual
• Workflow design• Workflow design
• Role based access
• 592 screens and 459
reports
FIRFIRFIRFIR
GCR (CO)
FIR AssignmentFIR Assignment
Crime ClassificationCrime Classification
If Heinous
Case
IF Case Transferred
Property Seizure
Property Movement
Crime Details
Arrest/Surrender
Witness Details
Proceedings-174/176 CRPC
Exhumation Details
If Victim=Dead
If Dead body “Buried”
I.M (CO)
I.M(SDPO)
I.M (DPO)
Property Seizure
Property Movement
Crime Details
Arrest/Surrender
Witness Details
Case Transfer GCR (SDPO)
GCR (DPO)COD, DCRE,..COD, DCRE,..COD, DCRE,..COD, DCRE,..
External
Transfer
Crime- Investigation Workflow
Final Report/Charge Sheet
Final Report/Charge Sheet
Court Progress Diary
Court Disposal
Case Diary
Final Report B,C and UDR
Exhumation Details
Post Mortem Request
If Final Report B,C or UDR
Rejected
Forward
Forward
Accepted
CPR (DPO)
CPR (SDPO)
CPR (CO)
FR B,C & U (CO)
FR B,C & U (SDPO)
FR B,C & U (DPO)
Witness Details
Case Diary
Bail Bond
Result of Appeal
If Final Report A
UDR Disposal
If UDR case
If B or C case
Precursors
• Functional State Police State
Center
• Creation of Primary Network• Creation of Primary Network
• Anti Virus, Facilities and Asset
Management
• Creation of training infrastructure
• Other training resources- trainers,
methodology, training material etc
Old Network
• 2 Mbps aggregation bandwidth
at the State Police Data Center
• 64 Kbps leased line between
Units and SPDC
• 56 Kbps PSTN from
PS/Circle/SDPO to DPO/Units
KSP Wide Area Network
39 locations 2
Mbps leased line
10 Mbps
aggregation
bandwidth
1400 remote
locations, 512
Kbps, VPNoBB
4 Mbps internet
leased line
SPDC
Police IT Inauguration Presentation
Internet
Police
Station
MPLS Cloud
VPNoBB
Cloud
2811
IDS 4235
PIX515E
Police
Station
IDS 4235
218.248.45.10
192.168.20.0/24
172.31.246.0/30 1812
1812
10.7.0.0/24
.1
.1
10.7.52.0/24
.1.1 .2
.3
.3
Police HQ
LAN
10.8.0.0/30
512Kbps
2 mbps
10 mbps
4 mbps
FIREWALL
4506SW
WEB Server
192.168.2.24
Mail Server
192.168.2.25
FTP Server
192.168.2.23
192.168.2.0//24
1812 10.7.39.0/24
10.7.0.0/24
.2
.1
.2
10.7.52.0/24
Commissioner office
Bangalore city
LAN
State Police Data Center
2 mbps
POLICE IT
POLICE IT
Police IT-Modules
• Crime
• Law & Order
• Traffic
• Finance
• Administration• Administration
• Stores
• Armed Reserve
• Motor Transport
• Training
• Wireless
• Forensic Science Laboratory
• Executive Information System
Effort
• 700 days of field study
• 70 review meetings
• 30,000 pages of documentation
7000 man day of development• 7000 man day of development
• 11 UAT teams
• 75 Nodal Officers
• Conferences/training/testing
etc.
Features…
• Based on ASP.Net with MS-SQL
as Backend
• Reporting using Crystal Reports• Reporting using Crystal Reports
• Adobe PDF format for data
transmission
• Uses http/https Protocol
• XML format for Data
Interchange
Wireless
• In and out messaging process
• Control Room activities
• Automatic generation of reports
BenefitsBenefitsBenefitsBenefits
• Reliable & secure communication
• Predefined non editable format
• Message tracking capabilities
• Ease of deciding the addressees
Armed Reserve
• Online requests for the deployment of forces
• Assignment of Arms
• Allotment of specific duties
BenefitsBenefitsBenefitsBenefits
• Workflow design cuts down time considerably
• No physical effort for approvals
• Deployment easier- inputs available
• Helps in manpower audit
Motor Transport
• Online requests and allotment of vehicles
• Online approval for repairs
• Updation of the vehicles log and indents• Updation of the vehicles log and indents
BenefitsBenefitsBenefitsBenefits
• Online availability of vehicle history sheets
• Effective monitoring of fuel consumption
• Online monitoring of vehicle insurance
Crime Criminal Network
and Systems (CCTNS)
• Mission Mode Project of GoI
• To connect 14,000 PSs and• To connect 14,000 PSs and
6000 higher police offices
• Rs 2000 Crore Project
• MoU signed
Crime Criminal Network
and Systems (CCTNS)
• Registration of K-CoPS, the
State Designated Agency
• Karnataka accepted as one of• Karnataka accepted as one of
the lead states
• Core Application Software
• Police IT permitted to deployed
• CCTNS/Police IT as one entity in
the State
THE FUNCTIONAL CYCLE
• Mission
Mode Project
• Wipro, the
developer
Police
IT
CCTNS
• GoI accepts
Karnataka as
a lead state
• Both the
projects get
integrated
IT
Lead
State
CCTNS
Police
IT
Police IT Roll Out
• User Acceptance Test
• Mandatory Change Requests
over 400over 400
• Last phase of development
• Pilots for different modules
• Capacity Building is most
critical
• 11 Training Centers established
Police IT Roll Out
• Near perfect synchronization of
module development, end user
training and the completion of all
precursor activities would ensure aprecursor activities would ensure a
smooth roll out
• 12 modules in 1439 locations
• Wipro would do the handholding in 50
locations for 48 months
UAT/PILOT
S.No Module UAT Mandato
ry CR
Training Pilot
from
1. Wireless 16/09/09 to
22/09/09
12(34) 2372 25/01/10
2. Armed 15/09/09 to
19/09/09
30(37) 254 19/02/10
3. MT 15/09/09 to 39(39) 2512 19/02/10
Capacity Building Plan
Training
Infrastructure
Training for 75
System
Administrators
Training for
Nodal Officers
of all Units
Mapping of
End-Users
Deployment of
Trainers
Training
Curriculum
Basic IT &
Police IT
Basic Training
for End-Users
Training for
Technical
Teams of all
Units
Police IT
Training for
End-Users &
Handholding
System Admins Training
• Special Govt. Permission
• 75 trainees in all. Main backbone of• 75 trainees in all. Main backbone of
the system
• Selection through online test and
interview
• One month customised training
• Certification and handholding by the
vendor for six months
System Admins Training
• Next phase- MCSE
• Training over, Certification tests to• Training over, Certification tests to
commence
• CCNA planned in the next phase
• Select Candidates would be trained
for Data Center Management
Capacity Building
• 11 main training centers established
• Would be fully functional in one month
• Potential of training 400 trainees per month• Potential of training 400 trainees per month
• Funding by the CCTNS project
• All districts would have a Computer Training
Center by the end of April
• Process for hiring trainers from a reputed
vendor has been initiated
Conclusion
The successful completion of this project would
take the police to much higher level of efficiency,
near total transparency, all mechanical work would
become redundant, more human resources would
be available for core tasks, better investigation,be available for core tasks, better investigation,
qualitative change in planning, split second
communication, perfect documentation/ retrieval,
no alibi as the application is role based, need
based passage of information on the website/
press/individuals, tracking of incidents/facts
/details would be flawless etc.

Mais conteúdo relacionado

Mais procurados

Policy control and charging for lte
Policy control and charging for ltePolicy control and charging for lte
Policy control and charging for lteMorg
 
PCRF-Policy Charging System-Functional Analysis
PCRF-Policy Charging System-Functional AnalysisPCRF-Policy Charging System-Functional Analysis
PCRF-Policy Charging System-Functional AnalysisBiju M R
 
PCRF as an EPC component
PCRF as an EPC componentPCRF as an EPC component
PCRF as an EPC componentMohamed Daif
 
Introduction to RPKI
Introduction to RPKIIntroduction to RPKI
Introduction to RPKIAPNIC
 
Policy Control and Real-Time Charging Workshop Sample
Policy Control and Real-Time Charging Workshop SamplePolicy Control and Real-Time Charging Workshop Sample
Policy Control and Real-Time Charging Workshop SampleAlan Quayle
 
OCS DCCA- Credit pooling and multiplier concepts - Call flow explanation v1.0
OCS DCCA- Credit pooling and multiplier concepts - Call flow explanation v1.0OCS DCCA- Credit pooling and multiplier concepts - Call flow explanation v1.0
OCS DCCA- Credit pooling and multiplier concepts - Call flow explanation v1.0Biju M R
 
PacNOG 24: APNIC Update
PacNOG 24: APNIC UpdatePacNOG 24: APNIC Update
PacNOG 24: APNIC UpdateAPNIC
 
Securing global routing system and operators approach
Securing global routing system and operators approachSecuring global routing system and operators approach
Securing global routing system and operators approachAPNIC
 
BKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSBKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSAPNIC
 
What is PCRF? – Detailed PCRF architecture and functioning
What is PCRF? – Detailed PCRF architecture and functioningWhat is PCRF? – Detailed PCRF architecture and functioning
What is PCRF? – Detailed PCRF architecture and functioningMahindra Comviva
 
Integrated policy & charging
Integrated policy & chargingIntegrated policy & charging
Integrated policy & chargingComverse, Inc.
 
Secure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKISecure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKIAPNIC
 
Licensing
LicensingLicensing
LicensingCA
 
I nop brochure_2017
I nop brochure_2017I nop brochure_2017
I nop brochure_2017frankjoh
 

Mais procurados (15)

Policy control and charging for lte
Policy control and charging for ltePolicy control and charging for lte
Policy control and charging for lte
 
PCRF-Policy Charging System-Functional Analysis
PCRF-Policy Charging System-Functional AnalysisPCRF-Policy Charging System-Functional Analysis
PCRF-Policy Charging System-Functional Analysis
 
PCRF as an EPC component
PCRF as an EPC componentPCRF as an EPC component
PCRF as an EPC component
 
Introduction to RPKI
Introduction to RPKIIntroduction to RPKI
Introduction to RPKI
 
Policy Control and Real-Time Charging Workshop Sample
Policy Control and Real-Time Charging Workshop SamplePolicy Control and Real-Time Charging Workshop Sample
Policy Control and Real-Time Charging Workshop Sample
 
OCS DCCA- Credit pooling and multiplier concepts - Call flow explanation v1.0
OCS DCCA- Credit pooling and multiplier concepts - Call flow explanation v1.0OCS DCCA- Credit pooling and multiplier concepts - Call flow explanation v1.0
OCS DCCA- Credit pooling and multiplier concepts - Call flow explanation v1.0
 
PacNOG 24: APNIC Update
PacNOG 24: APNIC UpdatePacNOG 24: APNIC Update
PacNOG 24: APNIC Update
 
Securing global routing system and operators approach
Securing global routing system and operators approachSecuring global routing system and operators approach
Securing global routing system and operators approach
 
BKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoSBKNIX Peering Forum 2017: Community tools to fight DDoS
BKNIX Peering Forum 2017: Community tools to fight DDoS
 
What is PCRF? – Detailed PCRF architecture and functioning
What is PCRF? – Detailed PCRF architecture and functioningWhat is PCRF? – Detailed PCRF architecture and functioning
What is PCRF? – Detailed PCRF architecture and functioning
 
Integrated policy & charging
Integrated policy & chargingIntegrated policy & charging
Integrated policy & charging
 
Secure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKISecure Inter-domain Routing with RPKI
Secure Inter-domain Routing with RPKI
 
jailprojects1
jailprojects1jailprojects1
jailprojects1
 
Licensing
LicensingLicensing
Licensing
 
I nop brochure_2017
I nop brochure_2017I nop brochure_2017
I nop brochure_2017
 

Semelhante a Police IT Inauguration Presentation

2015 Rail Conf Tom Colacioppo NYCT ISIM B Project June 15
2015 Rail Conf Tom Colacioppo NYCT ISIM B Project June 152015 Rail Conf Tom Colacioppo NYCT ISIM B Project June 15
2015 Rail Conf Tom Colacioppo NYCT ISIM B Project June 15Tom Colacioppo, CCM, CSEP
 
Policy control in epc
Policy control in epcPolicy control in epc
Policy control in epcInam Khosa
 
Workplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) InitiativeWorkplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) InitiativeKBIZEAU
 
Smart Cities 2015_Gautam Nanda
Smart Cities 2015_Gautam NandaSmart Cities 2015_Gautam Nanda
Smart Cities 2015_Gautam NandaIPPAI
 
Lanka government cloud: what, why & how?
Lanka government cloud: what, why & how?Lanka government cloud: what, why & how?
Lanka government cloud: what, why & how?Wasantha Deshapriya
 
Data Driven Tranportation Analytics
Data Driven Tranportation Analytics Data Driven Tranportation Analytics
Data Driven Tranportation Analytics Dublinked .
 
Computer-Aided Dispatch and Record Management System
Computer-Aided Dispatch and Record Management SystemComputer-Aided Dispatch and Record Management System
Computer-Aided Dispatch and Record Management SystemCity of College Station
 
Location Based Services for Mobiles: Technologies and Standards
Location Based Services for Mobiles: Technologies and StandardsLocation Based Services for Mobiles: Technologies and Standards
Location Based Services for Mobiles: Technologies and StandardsShu Wang
 
Telecom compliance
Telecom complianceTelecom compliance
Telecom complianceCA
 
Ahmed Alkokah_CV_VerMay2016
Ahmed Alkokah_CV_VerMay2016Ahmed Alkokah_CV_VerMay2016
Ahmed Alkokah_CV_VerMay2016Ahmed AlKokah
 
Criminal identification system
Criminal identification systemCriminal identification system
Criminal identification systemAkash Kumar Singh
 
6414 preparation and planning of the development of a proficiency test in the...
6414 preparation and planning of the development of a proficiency test in the...6414 preparation and planning of the development of a proficiency test in the...
6414 preparation and planning of the development of a proficiency test in the...Damir Delija
 

Semelhante a Police IT Inauguration Presentation (20)

KSP Composite Computerization Model
KSP Composite Computerization ModelKSP Composite Computerization Model
KSP Composite Computerization Model
 
CCTNS In Karnataka, Experience Sharing
CCTNS In Karnataka, Experience SharingCCTNS In Karnataka, Experience Sharing
CCTNS In Karnataka, Experience Sharing
 
2015 Rail Conf Tom Colacioppo NYCT ISIM B Project June 15
2015 Rail Conf Tom Colacioppo NYCT ISIM B Project June 152015 Rail Conf Tom Colacioppo NYCT ISIM B Project June 15
2015 Rail Conf Tom Colacioppo NYCT ISIM B Project June 15
 
Policy control in epc
Policy control in epcPolicy control in epc
Policy control in epc
 
Workplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) InitiativeWorkplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) Initiative
 
Homeland Security C4I Pragati Maidan
Homeland Security C4I Pragati MaidanHomeland Security C4I Pragati Maidan
Homeland Security C4I Pragati Maidan
 
CMAA_KSORENSEN
CMAA_KSORENSENCMAA_KSORENSEN
CMAA_KSORENSEN
 
Smart Cities 2015_Gautam Nanda
Smart Cities 2015_Gautam NandaSmart Cities 2015_Gautam Nanda
Smart Cities 2015_Gautam Nanda
 
CCTNS
CCTNS CCTNS
CCTNS
 
Lanka government cloud: what, why & how?
Lanka government cloud: what, why & how?Lanka government cloud: what, why & how?
Lanka government cloud: what, why & how?
 
Data Driven Tranportation Analytics
Data Driven Tranportation Analytics Data Driven Tranportation Analytics
Data Driven Tranportation Analytics
 
Computer-Aided Dispatch and Record Management System
Computer-Aided Dispatch and Record Management SystemComputer-Aided Dispatch and Record Management System
Computer-Aided Dispatch and Record Management System
 
Paul Jackson
Paul JacksonPaul Jackson
Paul Jackson
 
Location Based Services for Mobiles: Technologies and Standards
Location Based Services for Mobiles: Technologies and StandardsLocation Based Services for Mobiles: Technologies and Standards
Location Based Services for Mobiles: Technologies and Standards
 
Telecom compliance
Telecom complianceTelecom compliance
Telecom compliance
 
Ahmed Alkokah_CV_VerMay2016
Ahmed Alkokah_CV_VerMay2016Ahmed Alkokah_CV_VerMay2016
Ahmed Alkokah_CV_VerMay2016
 
Criminal identification system
Criminal identification systemCriminal identification system
Criminal identification system
 
State vision
State visionState vision
State vision
 
6414 preparation and planning of the development of a proficiency test in the...
6414 preparation and planning of the development of a proficiency test in the...6414 preparation and planning of the development of a proficiency test in the...
6414 preparation and planning of the development of a proficiency test in the...
 
Police IT Application
Police IT ApplicationPolice IT Application
Police IT Application
 

Mais de ADGP, Public Grivences, Bangalore

Mais de ADGP, Public Grivences, Bangalore (20)

Towards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for IndiaTowards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for India
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CCTNS & Homeland Security
CCTNS & Homeland SecurityCCTNS & Homeland Security
CCTNS & Homeland Security
 
Secure it0001
Secure it0001Secure it0001
Secure it0001
 
e-gov: Secure IT 2014
e-gov: Secure IT 2014e-gov: Secure IT 2014
e-gov: Secure IT 2014
 
Asymmetric warfare for geoworld
Asymmetric warfare for geoworldAsymmetric warfare for geoworld
Asymmetric warfare for geoworld
 
Secure Cities 2013
Secure Cities 2013Secure Cities 2013
Secure Cities 2013
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop
 
Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
 
Xime erp creation & change management 18082013
Xime erp creation & change management 18082013Xime erp creation & change management 18082013
Xime erp creation & change management 18082013
 
Technological framework
Technological frameworkTechnological framework
Technological framework
 
Cii iq's national business excellence conclave 2013
Cii   iq's national business excellence conclave 2013Cii   iq's national business excellence conclave 2013
Cii iq's national business excellence conclave 2013
 
E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013
 
Homeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism MechanismHomeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism Mechanism
 
Leadership casestudy
Leadership casestudyLeadership casestudy
Leadership casestudy
 
Reaching out to the unreached
Reaching out to the unreachedReaching out to the unreached
Reaching out to the unreached
 
LTC Word
LTC WordLTC Word
LTC Word
 
Homeland security – A robust counter terrorism mechanism
Homeland security – A robust counter terrorism mechanismHomeland security – A robust counter terrorism mechanism
Homeland security – A robust counter terrorism mechanism
 

Último

Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 

Último (20)

Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 

Police IT Inauguration Presentation

  • 1. Welcome to presentation onto presentation on Police IT 6th April 2010
  • 3. Introduction Comprehensive ERP system providing seamless integrationproviding seamless integration of the day to day operations of the Police Department
  • 4. Introduction… In its conceptualization, creation and roll out, it wouldcreation and roll out, it would have a pioneering impact in the way Police in India would go digital in the days to come
  • 5. Milestones • Broadband Networking • E-Procurement • GPS based AVLS system G-CARE, GIS based• G-CARE, GIS based • Real time Videoconferencing • CCTNS- MoU, Lead State, K- CoPS • Anti Virus, Asset Management & FMS
  • 6. Milestones • Project Management of Police IT • Hiring of professional experts • Setting of training center • Skeletal Data Center• Skeletal Data Center • Integration of Bangalore Traffic Police in WAN • Usage of CCIS/ADT in all Bangalore City Police Stations • Three state level Nodal Officers Meetings
  • 7. History • CCIS, Crime Criminal Information System • CIPA, Common Integrated Police ApplicationPolice Application • Police IT • CCTNS, Crime Criminal Tracking Network and Systems
  • 8. History… • Software development started in 2004 • Workflow Design was introduced in• Workflow Design was introduced in 2006 • Changed to centralized architecture in 2008 • UAT for 11 modules - Aug09 to March 2010
  • 9. History… • Pilot for 5 modules between Jan to March 2010 • Phased deployment across 1439 locations starts today • The phased implementation to be completed by year end
  • 10. Features • Centralized Architecture • Bilingual • Workflow design• Workflow design • Role based access • 592 screens and 459 reports
  • 11. FIRFIRFIRFIR GCR (CO) FIR AssignmentFIR Assignment Crime ClassificationCrime Classification If Heinous Case IF Case Transferred Property Seizure Property Movement Crime Details Arrest/Surrender Witness Details Proceedings-174/176 CRPC Exhumation Details If Victim=Dead If Dead body “Buried” I.M (CO) I.M(SDPO) I.M (DPO) Property Seizure Property Movement Crime Details Arrest/Surrender Witness Details Case Transfer GCR (SDPO) GCR (DPO)COD, DCRE,..COD, DCRE,..COD, DCRE,..COD, DCRE,.. External Transfer Crime- Investigation Workflow Final Report/Charge Sheet Final Report/Charge Sheet Court Progress Diary Court Disposal Case Diary Final Report B,C and UDR Exhumation Details Post Mortem Request If Final Report B,C or UDR Rejected Forward Forward Accepted CPR (DPO) CPR (SDPO) CPR (CO) FR B,C & U (CO) FR B,C & U (SDPO) FR B,C & U (DPO) Witness Details Case Diary Bail Bond Result of Appeal If Final Report A UDR Disposal If UDR case If B or C case
  • 12. Precursors • Functional State Police State Center • Creation of Primary Network• Creation of Primary Network • Anti Virus, Facilities and Asset Management • Creation of training infrastructure • Other training resources- trainers, methodology, training material etc
  • 13. Old Network • 2 Mbps aggregation bandwidth at the State Police Data Center • 64 Kbps leased line between Units and SPDC • 56 Kbps PSTN from PS/Circle/SDPO to DPO/Units
  • 14. KSP Wide Area Network 39 locations 2 Mbps leased line 10 Mbps aggregation bandwidth 1400 remote locations, 512 Kbps, VPNoBB 4 Mbps internet leased line SPDC
  • 16. Internet Police Station MPLS Cloud VPNoBB Cloud 2811 IDS 4235 PIX515E Police Station IDS 4235 218.248.45.10 192.168.20.0/24 172.31.246.0/30 1812 1812 10.7.0.0/24 .1 .1 10.7.52.0/24 .1.1 .2 .3 .3 Police HQ LAN 10.8.0.0/30 512Kbps 2 mbps 10 mbps 4 mbps FIREWALL 4506SW WEB Server 192.168.2.24 Mail Server 192.168.2.25 FTP Server 192.168.2.23 192.168.2.0//24 1812 10.7.39.0/24 10.7.0.0/24 .2 .1 .2 10.7.52.0/24 Commissioner office Bangalore city LAN State Police Data Center 2 mbps POLICE IT POLICE IT
  • 17. Police IT-Modules • Crime • Law & Order • Traffic • Finance • Administration• Administration • Stores • Armed Reserve • Motor Transport • Training • Wireless • Forensic Science Laboratory • Executive Information System
  • 18. Effort • 700 days of field study • 70 review meetings • 30,000 pages of documentation 7000 man day of development• 7000 man day of development • 11 UAT teams • 75 Nodal Officers • Conferences/training/testing etc.
  • 19. Features… • Based on ASP.Net with MS-SQL as Backend • Reporting using Crystal Reports• Reporting using Crystal Reports • Adobe PDF format for data transmission • Uses http/https Protocol • XML format for Data Interchange
  • 20. Wireless • In and out messaging process • Control Room activities • Automatic generation of reports BenefitsBenefitsBenefitsBenefits • Reliable & secure communication • Predefined non editable format • Message tracking capabilities • Ease of deciding the addressees
  • 21. Armed Reserve • Online requests for the deployment of forces • Assignment of Arms • Allotment of specific duties BenefitsBenefitsBenefitsBenefits • Workflow design cuts down time considerably • No physical effort for approvals • Deployment easier- inputs available • Helps in manpower audit
  • 22. Motor Transport • Online requests and allotment of vehicles • Online approval for repairs • Updation of the vehicles log and indents• Updation of the vehicles log and indents BenefitsBenefitsBenefitsBenefits • Online availability of vehicle history sheets • Effective monitoring of fuel consumption • Online monitoring of vehicle insurance
  • 23. Crime Criminal Network and Systems (CCTNS) • Mission Mode Project of GoI • To connect 14,000 PSs and• To connect 14,000 PSs and 6000 higher police offices • Rs 2000 Crore Project • MoU signed
  • 24. Crime Criminal Network and Systems (CCTNS) • Registration of K-CoPS, the State Designated Agency • Karnataka accepted as one of• Karnataka accepted as one of the lead states • Core Application Software • Police IT permitted to deployed • CCTNS/Police IT as one entity in the State
  • 25. THE FUNCTIONAL CYCLE • Mission Mode Project • Wipro, the developer Police IT CCTNS • GoI accepts Karnataka as a lead state • Both the projects get integrated IT Lead State CCTNS Police IT
  • 26. Police IT Roll Out • User Acceptance Test • Mandatory Change Requests over 400over 400 • Last phase of development • Pilots for different modules • Capacity Building is most critical • 11 Training Centers established
  • 27. Police IT Roll Out • Near perfect synchronization of module development, end user training and the completion of all precursor activities would ensure aprecursor activities would ensure a smooth roll out • 12 modules in 1439 locations • Wipro would do the handholding in 50 locations for 48 months
  • 28. UAT/PILOT S.No Module UAT Mandato ry CR Training Pilot from 1. Wireless 16/09/09 to 22/09/09 12(34) 2372 25/01/10 2. Armed 15/09/09 to 19/09/09 30(37) 254 19/02/10 3. MT 15/09/09 to 39(39) 2512 19/02/10
  • 29. Capacity Building Plan Training Infrastructure Training for 75 System Administrators Training for Nodal Officers of all Units Mapping of End-Users Deployment of Trainers Training Curriculum Basic IT & Police IT Basic Training for End-Users Training for Technical Teams of all Units Police IT Training for End-Users & Handholding
  • 30. System Admins Training • Special Govt. Permission • 75 trainees in all. Main backbone of• 75 trainees in all. Main backbone of the system • Selection through online test and interview • One month customised training • Certification and handholding by the vendor for six months
  • 31. System Admins Training • Next phase- MCSE • Training over, Certification tests to• Training over, Certification tests to commence • CCNA planned in the next phase • Select Candidates would be trained for Data Center Management
  • 32. Capacity Building • 11 main training centers established • Would be fully functional in one month • Potential of training 400 trainees per month• Potential of training 400 trainees per month • Funding by the CCTNS project • All districts would have a Computer Training Center by the end of April • Process for hiring trainers from a reputed vendor has been initiated
  • 33. Conclusion The successful completion of this project would take the police to much higher level of efficiency, near total transparency, all mechanical work would become redundant, more human resources would be available for core tasks, better investigation,be available for core tasks, better investigation, qualitative change in planning, split second communication, perfect documentation/ retrieval, no alibi as the application is role based, need based passage of information on the website/ press/individuals, tracking of incidents/facts /details would be flawless etc.