Welcome to Modeling Agencies | Ny Modeling Agency | Fashion Modeling Agencies


Monday, July 23, 2007

www.it-umbrella.navy.mil

The Enterprise Software Initiative (ESI) is a Department of Defense (DoD) initiative to streamline the acquisition process and provide best-priced, standards-compliant information technology (IT). The ESI is a business discipline used to coordinate multiple IT investments and leverage the buying power of the government for commercial IT products and services. By consolidating IT requirements and negotiating Enterprise Agreements with software vendors, the DoD realizes significant Total Cost of Ownership (TCO) savings in IT acquisition and maintenance. The goal is to develop and implement a process to identify, acquire, distribute and manage IT from the enterprise level.

In September 2001, the ESI was approved as a "quick hit" initiative under the DoD Business Initiative Council (BIC). Under the BIC, the ESI will become the benchmark acquisition strategy for the licensing of commercial software and will extend a Software Asset Management Framework across the DoD. Additionally, the ESI was incorporated into the Defense Federal Acquisition Regulation Supplement (DFARS) Section 208.74 on Oct. 25, 2002, and DoD Instruction 500.2 in May 2003.

Unless otherwise stated authorized ESI users include all DoD components, and their employees including Reserve component (Guard and Reserve) and the U.S. Coast Guard mobilized or attached to DoD; other government employees assigned to and working with DoD; nonappropriated funds instrumentalities such as NAFI employees; Intelligence Community (IC) covered organizations to include all DoD Intel System member organizations and employees, but not the CIA nor other IC employees unless they are assigned to and working with DoD organizations; DoD contractors authorized in accordance with the FAR; and authorized Foreign Military Sales.

Crime Mapping: New Tools for Law Enforcement

Crime Mapping: New Tools for Law Enforcement, Irvin B. Vann and G. David Garson, Peter Lang Publishing Company, New York, New York, 2003.

Geographic information systems (GIS), commonly referred to as crime mapping, are becoming indispensable crime-control tools for law enforcement executives. With the advent of inexpensive desktop computers and user-friendly mapping software, employing crime maps as a way to evaluate intelligence data, develop strategies, deploy personnel, and monitor crime trends is crucial for effective law enforcement.

Authors Irvin B. Vann and G. David Garson have written a comprehensive, easy-to-read guide on crime-mapping essentials. They make several salient points about the effectiveness of crime mapping and the ease with which agencies can prepare crime maps. The first two chapters introduce crime-mapping basics, common terminology, and the varieties of crime maps. The authors succinctly explain how to build spatial databases and interpret data output. Chapter 3 details how to manage crime with GIS through specific types of maps. Some of the examples include displaying drug-free school zones by creating 1,000-foot buffer zones, integrating problem-oriented and community policing, and allocating resources.

Chapter 4 explains spatial models that concentrate on specific situations, such as the relationship between convenience store robberies and actual store locations. Another example involves displaying burglary locations to known burglars' residences. This type of modeling is imperative to situational crime prevention. The authors also describe multivariate analysis, which constitutes the most compelling part of the book. Because crime often is linked to environmental and demographic conditions, building a multivariate model allows crime analysts to examine the relationship between specific crimes (e.g., auto theft, homicide, robbery, and burglary) and social, demographic, or environmental conditions (e.g., poverty, unemployment, the elderly, young adults 16 to 24, abandoned houses, and vacant lots). Multivariate analysis represents the key to designing successful situational crime prevention programs because a solution depends on a thorough analysis of the precursors to the problem.

Chapters 5 and 6 discuss how crime mapping influences decision making. This includes a review of the SARA (Scanning, Analysis, Response, and Assessment) model of problem solving and New York City's Compstat and Philadelphia's Crimestat processes, which serve as two outstanding examples of how crime mapping represents one part of a larger crime-control process. The book concludes with a discussion about social policy and how crime maps may have unintended consequences, such as the right to privacy because many police departments upload their maps to the Internet for community use.

The book is replete with actual experiences from various law enforcement organizations throughout the country, including large and small departments, municipal and county police agencies, and sheriff's offices. It offers an excellent reference section for additional reading and an appendix of law enforcement Web sites with crime maps. The book is an excellent supplement to any academy text or management course on crime-control strategies, community policing, situational crime prevention, and problem solving.