Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

IBM Software September 2012

White Paper

IBM i2 Intelligence
Analysis Platform
Product Overview

Introduction
Contents IBM® i2® Intelligence Analysis Platform is an extensible, scalable,
service oriented analytical environment that is designed to provide
1 Introduction organizations with access to intelligence when and where they need it,
so they can make faster, more informed decisions.
3 Who should read this
white paper
Built upon a product lineage with a proven track record of delivering
3 IBM i2 Intelligence Analysis intelligence analysis for over 20 years, the i2 Intelligence Analysis
Platform – A n-tiered product Platform is not just another database. Offering an enterprise scale
collaborative environment, the i2 Intelligence Analysis Platform helps
3 Potential benefits of the i2 organizations efficiently and effectively translate data to actionable
Intelligence Analysis Platform
intelligence. In fact, the i2 Intelligence Analysis Platform is at the heart
4 Key features of the i2 of many IBM i2 industry targeted solutions today, assisting commercial,
Intelligence Analysis Platform defense and national security, and law enforcement organizations in
their efforts to disrupt criminal, terrorist and fraudulent activities.
14 Interaction with other
IBM offerings
The i2 Intelligence Analysis Platform helps organizations do this by:
14 Technical Description
• Providing advanced data management tools to collect, collate, and
15 For more information consolidate data from various disparate sources for a richer, centralized
and contacts aggregated view of ‘analysis-ready’ information.
• Delivering intuitive visual analysis tools that allow all key
stakeholders to leverage greater insight from information and existing
intelligence products.
• Bridging operational knowledge gaps through a single, security rich
collaborative environment addressing both ‘need to know’ and ‘need
to share’ directives.
IBM Software September 2012
White Paper

Data Acquisition This standard data-modeling approach allows users to exploit


Acquiring data and transforming it into ‘analysis-ready’ and analyze information through a single thin client, reducing
information is a corner stone to the success of your the need and associated cost of multiple user interfaces.
operations. The i2 Intelligence Analysis Platform offers
options that are built on over years of experience of solving Security rich collaborative environment
customer data acquisition problems. These methods include: The i2 Intelligence Analysis Platform is a multi-disciplined,
enterprise offering designed to reduce the challenges
• Data On Demand associated with collaborative working. Therefore, accessing
–– Acquiring results from targeted questioning against information and intelligence is controlled through a highly
the source system. configurable, fine-grained, and pervasive security model.
–– Acquiring larger sets of working data that requires
further processing away from the source system. Using either the built-in tools or the security levels linked to
your organizations existing directory services, the configurable
• Data Load authentication and user management model provides logical
–– Bulk ingestion of data stored in third party systems. segmentation of information based on:
–– Ad-hoc import of data as it becomes available.
• The clearance level of the user
The availability of these different data acquisition methods • The user’s roles or groups
is intended to ensure that the correct model, or combination • The user’s need to know
of models, can be implemented to complement your • Any combination of the three-dimensions above
operational needs.
Because information sharing is so critical, the platform’s
Exploitation and analysis security allows ‘sign posting’. ‘Sign posting’ essentially allows
Regardless of whether you access information from within specific groups or users to see that an item or record exists
the analysis repository or from third party sources, the i2 while protecting any sensitive information contained within
Intelligence Analysis Platform provides a flexible data-centric the record.
model optimized for multi dimensional data analysis.
Modeling the world as entities and links, e.g. people and This flexible security model enables analysts, and the
their associates, the i2 Intelligence Analysis Platform has been greater operational team, to work collaboratively across
developed to honor the way operational team members are organizational, geographical or political boundaries, sharing
trained to think, in order to: information and decisions at the point of operation,
in real time.
• Simplify complex networks
• Detect non-obvious relationships or patterns
• Promote lateral thought
• Increase productivity

2
IBM Software September 2012
White Paper

Configurable out of the box Who should read this white paper?
The i2 Intelligence Analysis Platform is designed to help This white paper is intended for:
organizations collect, analyze and share intelligence right ‘out
of the box’, but it can also be customized for unique needs. • Potential users of the i2 Intelligence Analysis Platform such
as analysts and investigators. The document provides details
The integrated, no-cost designer application allows elected about the product and the potential benefits it provides.
members of the organization to create or modify the • Managers or Team Leads who wish to learn more about how
underlying analysis repository. This designer application was their teams can use the application most efficiently.
developed with the end user in mind, so it requires no • System administrators who wish to gain a high-level
technical expertise and should facilitate smooth transitions if understanding of the product and system prerequisites that
changes are required at a later date. are needed to install and run the application.

If your organization requires a more tailored approach, i2 Intelligence Analysis Platform –


however, the extensible service-oriented architecture,
A n-tiered product
messaging, and web services technology delivered by the i2
The i2 Intelligence Analysis Platform is a multi-tiered
Intelligence Analysis Platform can provide various integration
offering split into four distinct components:
points. This ensures that you can leverage greater value from
your existing enterprise infrastructure, thereby facilitating and Intelligence Portal
supporting existing work flow and practices. The Intelligence Portal in the
i2 Intelligence Analysis Platform is a
Users may also integrate the i2 Intelligence Analysis Platform
web based application. it provides your
with IBM® i2® Analyst’s Notebook® Premium should
operational team with on-demand access to
they require more advanced multidimensional visual
the information and intelligence products
analysis capabilities.
stored within the group analysis repository or connected
third party sources. This intuitive thin client presents a single
interface to explore and analyze information across disparate
sources, reducing the time and cost associated questioning
disconnected systems. Users can create, augment, and
disseminate information stored within the group analysis
repository to minimize potential data flow bottlenecks.
Additionally, alerts can ensure interested parties are notified
of any alterations to critical information and that the most
up-to-date information is in the hands of key decision makers.

3
IBM Software September 2012
White Paper

Application server Potential benefits of the i2 Intelligence


The application server is the main Analysis Platform
interaction layer between the Intelligence
Portal and the underlying analysis Smarter, more informed decision making across a
repository. This security rich layer ensures centralized aggregated view of information from
that Intelligence Portal users have the disparate sources
correct level of access based on authentication and • Obtain greater insight and produce richer intelligence
authorization privileges. products by fusing data from multiple disparate sources
through the use of data connectors.
Message-oriented middleware • Increase both speed and accuracy of manual data collection
This communication layer supports through self-tailored forms.
the delivery of messages from the client • Improve understanding of information management through
to the underlying infrastructure. the fine grained grading system that can be tailored to your
This in turn reduces the complexity organization’s needs.
of managing and extending i2 Intelligence • Retain and track the provenance of information gathered
Analysis Platform deployments that span more complex from various sources for a more in-depth understanding of
operating environments. an items aggregated view.
• Leverage valuable insight into operational development
Group Analysis Repository through intelligence governance.
A group analysis repository sits at the heart
of the i2 Intelligence Analysis Platform, Improved situational awareness across the
storing quality information and intelligence. operational community through on-demand intuitive
Wrapped in a security-rich environment, analysis and visualization tools
this repository also promotes collaboration • Gain access to the latest information with a live connection
across the operational team and reduces the need for data to the supplying source.
silos. Advanced data management features within the • Ensure information is immediately at hand across the
repository facilitate the collection, collation, and consolidation operational team with this dedicated client.
of information from various and disparate sources for a richer, • Reduce time spent on discovering pertinent results across
aggregated view of ‘analysis-ready’ information. In addition, structured and unstructured information with exact and
on-the-fly indexing allows all key stakeholders across the fuzzy matching.
operational teams to access information as and when required. • Minimize the need for post processing activities by using
The analysis repository’s schema is designed to be easily visual queries to help quickly performing pattern analysis
created or modified by non-technical personnel in order to • Efficiently pin-point, save, and share relevant findings to
accommodate changing needs and situations and remain support operational needs by applying user-configured lenses
relevant to ongoing operations. across results.
• Quickly identify and understand the network of related
information and see the ‘big picture’ by visually exploring
interconnected items.

4
IBM Software September 2012
White Paper

Increase efficiency and effectiveness by bridging Key features of the i2 Intelligence


operational knowledge gaps through a single,
security-rich collaborative environment
Analysis Platform
• Alleviate bottlenecks as all members across the operational
Analysis Repository Schema Designer
team can access information at the time of need.
The i2 Intelligence Analysis Platform is supplied with a
• Reduce educational ramp up time, costs, and skill fade with a
schema designer application to create the underlying data
single user interface across the operation team.
model used within the analysis repository. The schema
• Support collaborative working by storing user’s work in
designer is intended to be used by those within your
progress comments alongside information and intelligence
organization who understand how the operation data
products as they develop over time.
should be modelled so it is ‘analysis-ready’. This application
• Reduce duplication of effort as information can be shared
is designed to be easy to use and work as a standalone, so
and reused across the operational team.
users can design their schema without calling upon the
• Stay informed of key operational changes for improved
IT department or third-party consultants.
situational awareness and more informed decision making.
• Logically compartmentalize, hide, or signpost sensitive The initial design phase does not require a fully deployed
information according to user permissions; honoring both i2 Intelligence Analysis Platform, allowing the schema to be
‘need to know’ and ‘need to share’ directives. created in parallel or in advance of the rest of the deployment.
Schema templates are provided as a starting point to help you
Help minimize cost of ownership by integrating and
scales with existing business infrastructure get up and running quickly. Entity and link types together
• Ensure that the underlying data schema remain relevant with their properties can be adapted or removed within these
to evolving intelligence picture through the built-in templates so they can be honed to your needs. The schema’s
schema designer. health is constantly monitored and advises where problems
• Create custom extensions and data acquisition connectors have been identified before it becomes operational.
through the Developer Essentials Toolkit to suit
deployment requirements.
• Use the client and server configurations to meet both user
and business needs.
• Leverage the value of information in the analysis repository
to new or extended teams through the creation of custom
clients and/or services.
• Reduced cost of ownership with a scalable architecture
that can holistically grow alongside your intelligence
analysis needs.

5
IBM Software September 2012
White Paper

To facilitate the creation of a tailored schema to meet your In addition, a stop word list is provided to exclude the
needs there are fourteen user-defined property types. These indexing and searching of common punctuation words such
types include: text, pick lists, Boolean, binary, data and time, as ‘and’. This list also includes punctuation. Depending on
and number. Properties can be grouped together to enhance the needs of the users or business this stop list can be
their meaning when presented to the user, for example, a augmented accordingly, helping to ensure that nothing is
group of full names can be created and include property fields missed, the system is not overloaded, or results are not
for title, given name, middle name(s), and family name. returned where punctuation marks may have different
cultural meaning.
Once the schema is being used within a live deployment of
the i2 Intelligence Analysis Platform, the schema designer can Configurations & Settings
be used to augment the data model as needs alter over time. During initial deployment, or as part of on-going
Some operations will not be available, such as delete, to maintenance, server-side and client-side performance can be
protect the integrity of the data. fine-tuned to balance the needs of the business and the user.

Language specific fuzzy matching support More than thirty server-side settings can be configured to
The i2 Intelligence Analysis Platform is designed to support tailor the command service, document store, messaging
the storage of multiple languages to support multi-cultural service, event processing, and search service. This level
working environments. Transcribed and native data can be of configuration helps to ensure a scalable and robust
stored alongside each other to help enhance data integrity. infrastructure based on your operating environment.
In addition, to maintain client-side performance, ten
In order to support searching across the preferred business client-side parameters can be tuned across requests sent to
language, the i2 Intelligence Analysis Platform is supplied the server and timeouts. This helps ensure that the right
with a number of language specific term libraries.These information is available at the right time.
libraries are used in conjunction with the real-time indexing
service to provide rich fuzzy and name-variant matches in the Data collection and collation
results. Libraries can be added or updated to further enhance Once set up is complete, you can quickly populate the
matches and discovery of similar or related words. i2 Intelligence Analysis Platform with data, information, and
intelligence products. Successful investigation and analysis
requires the ability to effectively store, manage, and translate
large volumes of disparate data to information, and ultimately
actionable intelligence products. Regardless of the quality of
the data you are working with the i2 Intelligence Analysis
Platform is designed to be easy to populate.

6
IBM Software September 2012
White Paper

Working data and bulk ingestion High quality relatively low volume data that could be classed
The principle reason for ingesting data sets into the as intelligence could be ingested into the analysis repository
i2 Intelligence Analysis Platform is to make it available in a using data Load Direct. More raw “working Data” can be
common IBM i2 format (i.e. Entity Link Property). ingested to an ELP stage. There can be multiple ELP stage
This helps enable data analysis and exploitation across data structures in an i2 Intelligence Analysis Platform
IBM i2 Analysis products and reduces any duplication of deployment; whereas there is only one analysis repository.
effort spent on questioning the supplying data source.
Creation of developed information
When ingesting data through the supplied data acquisition, Within the i2 Intelligence Analysis Platform the primary
you have the choice to ingest directly to the analysis location for good quality information and intelligence is the
repository or to another persisted data structure, referred to group analysis repository. There are three modes for creating
as ELP Stage. The choice of which target is selected is based and augmenting information:
on the quality of the data that is being ingested and whether
it needs to be aggregated with other sources. • Manually, through user-defined forms. There can be many
tailored data entry forms per entity/link. The creation of
the forms is driven by the user and helps support faster data
entry as only the required fields are visible for that task.
• On demand through the Intelligence Portal for data stored
in connected third-party systems. All of the search and
visualization tools available in the Intelligence Portal can
be leveraged to identify pertinent information. Once
identified the information can be ingested into the analysis
repository in a single click. Being able to access other
systems on demand reduces the associated cost having to
manage and duplicate information unnecessarily.
• Ad-hoc importing through i2 Analyst’s Notebook Premium
provides the collection of information stored and transferred
in structured flat files such as .xls, .csv, and .txt. If required,
this intuitive importer allows information to be cleansed
and transformed to help ensure the best quality prior to
loading. Import specifications can be saved and shared
amongst i2 Analyst’s Notebook Premium users to reduce
repetitive tasks.

7
IBM Software September 2012
White Paper

Regardless of the method of data entry into the analysis This can be governed by compartment, role, or clearance
repository, the infrastructure proves: level. Once these templates are defined the data can be tagged
accordingly. To support ‘need to know’ and ‘need to share’
• a lossless environment directives, information can be signposted, or cloaked, allowing
• maintains reference back to the originating source, and; items to be discoverable without leaking any further
• retains history of how items developed over time information. Notes can be placed on these items stating why
this information is unavailable and providing guidance on who
Information contained on items is stored on cards. Each card to contact for more detail.
is a reflection of the available data from any given source at
any given time. Multiple cards can be stored on any single Exploitation and analysis
item. Cards can be used to contain corroborative or even There are a variety of tools that help users search, explore,
contradictory values. In addition, multiple property values, and analyze the information that is stored within the i2
such as alias, can be stored on a single card to help ensure Intelligence Analysis Platform. Many of these tools can be
that all of the relevant information is captured. Not having applied to connected third-party data sources. This provides
to decide at the time of entry what should be kept or a single point of entry for information discovery and helps
removed leads to a richer item and ultimately enhanced minimize the complexity of having to find non-obvious
analysis and reporting. connections and patterns across an otherwise disconnected
operational environment.
Controlling data access
As the i2 Intelligence Analysis Platform is intended for the There are four main features used to comprehensively
operational team, access to the data stored in the group question information and intelligence products, each being
analysis repository may need to be controlled. Regardless tailored to a specific starting point for the user.
of the method to collect the information, security templates
can be defined to prevent access to sensitive material. • Text Search - styled as a simple search bar, provides a single
search across all records, documents, and charts stored
within the analysis repository or connected third-party
sources. This mode of searching helps the user save time
during the initial discovery, when a key word or phrase is
known. Employing both exact and fuzzy matching criteria
makes allowances in the text search for typing mistakes,
erroneous punctuation, spelling mistakes, and name variants.
This is ideal for searching across any data store where human
error may be a factor when creating data. Results employ
highlighting and additional context for a greater
understanding of why it matched the original search term to
help the user assess the results. To reduce any potential noise
coming back from the search, the user can run a pre-filter to
target preferred items of interest.

8
IBM Software September 2012
White Paper

• Property search – designed to quickly analyze entity or


link types in greater detail. Through targeting values
contained in identified properties, users have a more
granular approach to questioning information. When
analyzing a single entity type, any given property, or
combination of properties, can be built to represent a
relatively complex set of conditions. As the properties can
be of various data types, the operators used in conjunction
with the value varies. For instance, a text data type will allow
operators such as ‘equal to’, ‘starts with’, or a smart (fuzzy)
match; whereas a date time field will present the user with
same as, before, after, and between, and so on. This allows
greater flexibility when building the profile of a question.
Properties can be used in the same way when questioning
links. In addition, the user can also use entities at either end
to constrain the question further. By way of an example, a
• Browse – used when more is known about the property search could be constructed to find what property
characteristics of an item rather than a key word or phrase. certain individuals have owned or been in possession of
All records of any given entity or link type are listed. A user within a specified time. This may be anything ranging from
can interactively select pertinent properties, which are added a dwelling, a communication device, or a vehicle. These
as columns, to further enrich the context of the browse being searches are quickly created and often present the user
conducted. Once all properties of interest are added, patterns with a tailored set of results for further analysis.
within the data are easily identifiable. Sorting and filtering • Visual query – this is the most powerful analysis feature in
operations can then be undertaken to pin-point records of the i2 Intelligence Analysis Platform tool kit. This query
interest. When browsing links, relevant information from the method allows users to simply draw a visual shape of their
entity types at either end can also be added to the list. This question. Single entities to complex networks containing
adds a further dimension to facilitate greater understanding indirect relationships can be defined without the need to
of the information. learn complex query languages. As with property search, any
number of properties can be assigned to entity and link
types, helping to hone the results.

9
IBM Software September 2012
White Paper

For instance, when doing high level assessments the results


are populated with highlighted matches together with
additional context. This is especially useful for quickly
assessing fuzzy matches. When an entity or link type is being
Query definitions can be saved for reuse and shared across the assessed in more detail the results area takes on a grid view
operation community to reduce duplicating effort. Like other with properties of interest becoming columns.This mode
items stored in the analysis repository, permissions can be benefits from common sorting and filtering features found in
placed on the definitions or similar queries can be grouped many spread sheet applications, accelerating post-processing
to assist with their management. tasks. Finally, when an item of interest is selected in the
results area a summary is presented to the user. This provides
Understanding and collating results an overview of other additional information about the record.
Regardless of where the information is stored and the
analysis method used, results are returned to the user Once key records have been identified additional context
through a common results grid. The results grid has three can be garnered from assessing connected information
main competencies: the facet view, the results area, and the through the in-built web visualization. From within the
summary pane. The facet view groups results by their Intelligence Portal records can be visually expanded to find
underlying entity and link types in order to quickly identity direct and non-direct connections to other information.
a high level view of where and how many hits the search has This visual exploration helps to undercover otherwise hidden
found. The results area dynamically updated depending on or non-obvious connections. When more than a single item is
the desired level of detail. explored, commonality across networks is readily identifiable.

10
IBM Software September 2012
White Paper

This method of enriching ones understanding of an item is


extremely powerful across connected third party data sources
where structure may not be well understood. Visualized
records can be copied from the third-party source directly to
the analysis repository in a single click. This provides the
user with a very controlled approach to data acquisition and
reduces unnecessary noise entering a vetted store.

Information stored in the analysis repository related to a


specific operation or piece of analysis can be collated in a set.
Entities and links can belong to more than one set. You can
use a set as a simple list of records to help you track your
analysis. Alternatively sets can be used to support further
analysis; as a source of records to control the results returned
from most exploitation and analysis tools.

All or any combination of changes to an item’s properties,


permissions, additional connections, or a deletion will notify
subscribed users. Alert feeds can also be collectively applied
to records contained in a set. This provides the added benefit
of notifying users when items have been added or removed
from a group. Users are able to view the list of alerts which
contain a summary. It also provides a quick link to open the
history of a record for a more detailed review with regards
to specific alterations.

Reporting functions, such as export and print, provide quick


ways of getting important information from the Intelligence
Portal. The results grid provides a fast way to output
Staying informed and disseminating findings information to a comma separated variable file format,
In a collaborative environment, the development and allowing it be ingested into most applications for easy
availability of information and intelligence relies on dissemination or further questioning. Properties pertaining
communication and team work. That’s why the i2 Intelligence to a group of records can be turned on or off at the user’s
Analysis Platform includes alerting features. These features discretion to help ensure that no unnecessary information
enable all stakeholders in the intelligence analysis cycle, is exported. Cards can be printed for any given item.
whether front-line, back office or management, to stay on Properties together with source information fields are
top of alterations made to identified records and collaborate printed to give a complete picture. In addition, pre-set
on new information. headers and footer that capture who, where, and what time
printing occurred for accountability.

11
IBM Software September 2012
White Paper

Interaction with other IBM offerings • IBM i2 Intelligent Law Enforcement


Law enforcement software enables agencies to generate
Optional Rich Desktop Client actionable insights that can help reduce crime and improve
i2 Analyst’s Notebook Premium can be used as a rich public safety. IBM® i2® Intelligent Law Enforcement
desktop client for the i2 Intelligence Analysis Platform. integrates analysis, lead generation and communication
Built on the award winning i2 Analyst’s Notebook, technologies to provide a holistic view of data for policing
this optional rich desktop client can be employed to cater and partner agencies. i2 Intelligent Law Enforcement
to advanced data management, multi-dimensional visual delivers cost-effective crime investigation and reduction
analysis, and dissemination needs for the more experience capabilities throughout the organization.
analyst or investigator. This familiar interface allows users to
easily uncover and visualize relationships, pathways, and For more information, visit:
networks across all data types in greater depth; producing a http://www-03.ibm.com/software/products/us/en/
complete operational picture that is understood and used intelligent-law-enforcement/
worldwide by leading intelligence analysis organizations.
• IBM i2 National Security and Defense Intelligence
At the heart of IBM i2 solutions targeted at IBM® i2® National Security and Defense Intelligence
specific industry needs:
helps customers carry out interoperable intelligence
• IBM i2 Fraud Intelligence Analysis exploitation, providing, within a scalable and secure
IBM® i2® Fraud Intelligence Analysis helps reduce the time, architecture, comprehensive data acquisition capability,
costs and complexity associated with fraud detection and multi-faceted intelligence analysis tools, mission decision
investigation. It creates patterns, links and relationships from making and situational awareness capabilities, and multi-
vast, disparate data sets, enabling organizations to rapidly agency and partner collaboration capabilities.
identify and disrupt fraud and misuse. i2 Fraud Intelligence
Analysis works across multiple systems and processes to help For more information, visit:
protect an organization’s reputation and revenue. http://www-03.ibm.com/software/products/us/en/
national-security-defense-intelligence/
For more information, visit:
Extending across the wider IBM software portfolio
http://www-03.ibm.com/software/products/us/en/
• IBM Content Analytics can be used to connect the
fraud-intelligence-analysis/
i2 Intelligence Analysis Platform to unstructured data inputs
that users have gathered to uncover deeper, relevant insights
from e-mail, unstructured reports, and social networks.
• IBM SPSS can be used to inform forward-thinking
operational planning with advanced analysis for optimizing
daily tasks and resource allocation.
• IBM InfoSphere Identify Insight can be used to help resolve
identities of individuals from layers of complex information.
• IBM Case Manager may be used to provide case and content
management as well as case-ready reporting.

12
IBM Software September 2012
White Paper

Figure 1: Simplified view of architecture

Technical Description
Product Architecture – Command Query Web Application
Responsibility Segregation (CQRS) The primary client for the i2 Intelligence Analysis Platform
The i2 Intelligence Analysis Platform is a multi-tier client / is the Intelligence Portal. This this client utilizes leading
server system split into four main components: the web Web technology such as the latest Microsoft Silverlight
application on which the Intelligence Portal executes, the and HTML5 providing a visually rich and easy to use
Application Servers spread across the read-side (query) and environment for the end user. It is designed to be adopted
write-side (command), Message-oriented middleware, and a widely across the organization by providing both simple
number of services and data stores that retained in a database and more advanced functions across data entry, visual
and collectively known as the analysis repository. exploration and analysis, and dissemination, together
with alerting features.

13
IBM Software September 2012
White Paper

Information, searching techniques, and intelligence products Message-Oriented Middleware


can all be shared with other users across the operational WebSphere MQ manages the asynchronous transmission
community and access is governed by the authentication and of messages from the Command to the Query side of the
authorization profiles of your business. The Intelligence architecture no matter how distributed the infrastructure.
Portal is a shared component in the optional rich desktop To prevent the loss of any messages and the system becoming
application, i2 Analyst’s Notebook Premium. This provides a unresponsive, appropriate messages are batched and seeded
common working environment regardless of point of entry to onto WebSphere MQ. At any time, should the destination of
the data and presenting the right tools to those individuals the message become unavailable, the message will be retained
with the right skill set. and delivered once service is resumed. This helps reduce
associated down-time costs and facilitates continuous
Application Server working after disruption.
WebSphere Application Server is provided to host and
manage the requests from the Intelligence Portal and enables Database
the necessary security interaction. Utilized in both the Query IBM DB2 Workgroup Edition is the database supplied to
and Command sides of the CQRS architecture, WebSphere retain the information and intelligence products found in
Application Server is facilitates the capture of all data changes the group analysis repository. The data stores together with
(events) in a lossless manner, whilst being able to reduce the associated indexes from the Query and Command sides of
load placed on the information stored when being analysed by the i2 Intelligence Analysis Platform are stored within DB2.
the operational team. The Query and Command sides of the The information and intelligence products is captured in a
architecture can be optimized for performance and scalability, relatively agnostic state which helps enable a variety of
depending on the changing business needs. database technologies to be used beyond DB2 Workgroup
Edition to match your business requirements.
To help ensure correct access to the application and
information, authentication and authorization profiles can be Data Acquisition framework
managed in one of two ways, either: The data acquisition framework provides an API that
allows those developing a data acquisition extension to the
• through the inherent flexible security model available within i2 Intelligence Analysis Platform a flexible and extensible
WebSphere Application Server, or route for acquiring data for analysis. The non–prescriptive
• through WebSphere Application Server’s directory services and wide set of options means that each i2 Intelligence
connectors to link to your organization’s enterprise model Analysis Platform deployment can be tailored to match the
which will help reduce management costs. user’s requirements, data source use, and any technical
constraints. The architecture has been designed in a way
that allows many data acquisition services to be implemented
with minimal impact to performance. The nature of the
design also means there are few constraints on the supplying
data sources.

14
IBM Software September 2012
White Paper

Information supplied from the third party data source needs Oracle 11g:
to be transformed to a XML format in order to map to the • Standard Edition Release 2 and future fix packs

i2 Intelligence Analysis Platforms schema.


Microsoft SQL Server 2008 and 2012:
Other items worth noting are: • Enterprise Edition

• Standard Edition
• Provenance Support – Items can be assigned provenance • Workgroup Edition
as they are acquired – Allowing users to see where the
items they are working with originated from and giving Licensing
the i2 Intelligence Analysis Platform the information for The i2 Intelligence Analysis Platform uses a concurrent
retrieving further information such as showing connected user model. This means that any number of users can use
items (expand). a single license provided that only a single user is logged in
• Security model support – items can be assigned security at any given time.
on the way in to the i2 Intelligence Analysis Platform.
• Support for further extensions should the deployment This licensing model includes use of the bundled
require - such as applying Grades to items as they components, namely: WebSphere Application Server,
are acquired. WebSphere MQ, DB2 Workstation Edition. These
components must only be used in conjunction with the
What pre-requisites are required? i2 Intelligence Analysis Platform deployment.
You must be clear which environment you will operate in
before you select hardware for your i2 Intelligence Analysis Is the Intelligence Analysis Platform available in
Platform implementation. Guidance on current minimum
any other language?
The i2 Intelligence Analysis Platform is available in languages
hardware, operating system, and third-party software
other than English. For more information on the availability
requirements is provided on the following IBM website:
of specific language translations of the i2 Intelligence Analysis
http://www-01.ibm.com/support/docview. Platform please contact your local IBM i2 representative.
wss?uid=swg27036201
How does the i2 Intelligence Analysis Platform
integrate with other IBM i2 products?
The i2 Intelligence Analysis Platform includes IBM DB2
The i2 Intelligence Analysis Platform can be integrated
Workgroup Edition for storing the analysis repository.
with many IBM i2 products. Its primary companion product
Should you want to use alternative database technologies
is i2 Analyst’s Notebook Premium which serves as a rich
or supported DB2 versions the relevant software must be
desktop client for advanced multi-dimensional analysis.
purchased separately. IBM does not supply licenses for
In addition, it is used within IBM i2 Fraud Intelligence
Oracle 11g Release 2 or Microsoft SQL Server.
Analysis, IBM i2 Intelligent Law Enforcement, and
IBM i2 National Security and Defense Intelligence.
You can use any of the following database technologies
and associated versions: Can I upgrade from other IBM i2 products
The i2 Intelligence Analysis Platform is only supported
IBM DB2 9.7 and 10.1: when used with compatible versions of IBM i2 products.
• Enterprise Edition
If being used in a combined IBM i2 product environment,
• Workgroup Edition (included)
you must upgrade them all at the same time in order to
maintain compatibility.

15
IBM Software September 2012
White Paper

For more information


To learn more about IBM i2 Intelligence Analysis Platform,
please contact your IBM representative, or visit:
ibm.com/i2software

To learn more about all of the IBM Smarter Cities solutions, © Copyright IBM Corporation 2013
visit: ibm.com/smartercities IBM Corporation
Software Group
Route 100
Somers, NY 10589
U.S.A.

Produced in the United States of America

November 2013

i2, Analyst’s Notebook, COPLINK, IBM, the IBM logo and ibm.com are
trademarks of International Business Machines Corporation in the United
States, other countries or both. If these and other IBM trademarked terms
are marked on their first occurrence in this information with a trademark
symbol (® or TM), these symbols indicate U.S. registered or common law
trademarks owned by IBM at the time this information was published.
Such trademarks may also be registered or common law trademarks in
other countries. Other product, company or service names may be
trademarks or service marks of others. A current list of IBM trademarks
is available at “Copyright and trademark information” at:
ibm.com/legal/copytrade.shtml

The content in this document (including currency OR pricing references


which exclude applicable taxes) is current as of the initial date of
publication and may be changed by IBM at any time. Not all offerings are
available in every country in which IBM operates.

The performance data discussed herein is presented as derived under


specific operating conditions. Actual results may vary. THE
INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS”
WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED,
INCLUDING WITHOUT ANY WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE
AND ANY WARRANTY OR CONDITION OF
NONINFRINGEMENT. IBM products are warranted according to the
terms and conditions of the agreements under which they are provided.

Please Recycle

16 ZZW03277-USEN-00

You might also like