- The rapid evolution of CAD mapping
- The increasing momentum of CAD interoperability
Computer-aided dispatch (CAD) systems are the lifeblood of every emergency communications center (ECC) — without them, providing law enforcement, fire/rescue, and emergency medical response, while possible, would be much more challenging. Given the importance of CAD systems, every ECC manager should be aware of the following short-term trends.
The Cybersecurity and Infrastructure Security Agency (CISA), a unit of the Department of Homeland Security (DHS), has issued an alert regarding an advisory released by Microsoft concerning a critical remote code execution vulnerability.
As part of our effort to help clients find applicable grants to achieve their goals, MCP provides alerts about grants that can fund their initiatives.A new grant was recently announced to help clients with improving the quality, timeliness, and accessibility of criminal history records.
On July 23, 2007, a home invasion occurred in Cheshire, Connecticut. During the invasion, the family that owned the home suffered numerous horrors — the husband was severely injured when beaten with a baseball bat, while his wife and two daughters were murdered; the wife and one daughter were sexually assaulted. The perpetrators then burned down the house to destroy the evidence.
Over the last several years, Mission Critical Partners aggressively has pursued acquisitions that expand the services and solutions that we can offer to clients in support of their missions. That work continues with the addition of Secure Halo, which is headquartered in Silver Spring, Maryland. This acquisition is the fifth executed by MCP in the last four years.
Circumstances exist whereby it is prudent that certain participants in a court hearing are not required to appear at the courthouse. One example concerns those who are in custody awaiting a hearing or trial. A lot can go wrong when transporting a defendant to a courthouse. Further, the logistics are complicated, and the process is time-consuming. Consequently, ma
Security researchers discovered and released information to the public regarding new vulnerabilities and kernel-level exploits. The vulnerabilities — CVE-2022-049 and CVE-2022-0847 — are two of the highest-severity exploits and affect out-of-date Linux distributions, aka “distros.”
A previous blog explored the advantages that can be gained by justice organizations via “big data” approaches that leverage artificial intelligence (AI) and machine learning (ML). This blog examines the importance of data governance.
“Big data” is an approach used to analyze extremely large, extremely complex, unstructured datasets. While the majority of data that courts create, manage, and are responsible for wouldn’t be considered “big data,” courts can benefit tremendously from recent advances in big data tools.
MCP Insights asked the firm’s subject-matter experts to predict what will occur this year concerning communications technologies, operations, and governance in the public safety sector (law enforcement, fire/rescue, emergency medical, and 911) and the public sector (government and justice). Here’s what they said: