Blue Fusion Partner Products
Cutting Edge Technology
Designed for i2 Analyst’s Notebook
Blue Light understands that technology shifts year to year with more effective ways to access, subscribe, view, ingest, extract data available every year. It has been our mission to ensure that you have the access to these new technologies as they become available and demonstrate their benefits to analytics.
New technologies and data sources that we have harnessed to improve your analytics:
Scaleable Partner Solutions
for your Blue Fusion Integration
To ensure that your IBM i2 solution meets your needs, Blue Light works with the most respected tools and technologies that exist to enhance your IBM i2 experience. No matter what your requirements for i2 are, our experienced technical and sales staff will work with you to establish the proper configuration and combination of i2 focused technologies to get the most out of your i2 purchase.
IBMers believe in progress – that the application of intelligence, reason and science can improve business, society and the human condition.
Developed in response to the specific needs of law enforcement investigators and criminal intelligence analysts, it builds on cutting-edge Accurint® investigative technology to give investigators and analysts a new way to access crucial information, visualize complex relationships, map data to show geographic connections and rapidly identify potential investigative leads to quickly solve their cases.
Sintelix offers industry leading information extraction capabilities including entity and relationship extraction at high accuracy in many languages. Vast quantities of unstructured data can be combined to create accurate entity networks linked to topic analyses and community structure decompositions.
Esri builds ArcGIS, the world’s most powerful mapping and spatial analytics software. ArcGIS software and apps combine mapping and data analytics to deliver location intelligence and meet digital transformation needs for organizations of all sizes.
DarkOwl Vision automatically, anonymously and continuously collects, indexes and ranks actionable data from the darknet – unlike the conventional approach which relies heavily on manpower.
Rosoka offers built-in load balancing, an integration friendly SDK, and a desktop client build from Subject Matter Experts. Rosoka was designed to work where you need it to and is fully portable and scalable. Rosoka is 100% pure Java, and can run on Windows, Linux, tablet, server, or in the cloud.
Your partner who provides transparency in cybersecurity. MainNerve helps secure networks, applications, people, and facilities… enabling businesses to reduce risk and increase their cybersecurity posture. This is accomplished through penetration testing, social engineering campaigns, and risk assessments. With a highly knowledgeable and experienced team, you can trust MainNerve to provide you with the information you need to help secure your environment.
The current range of software from Point Duty features specialised applications, solving the problems and meeting the needs of data driven industries – our solutions extract, enrich, connect and visualise structured and unstructured data, providing information and insights for any organisational need.
Threat Detection and Defense. Defendry layers on top of existing Security cameras and provides 24/7 Threat Detection. Defendry automatically detects visible guns, masks, & intruders 24/7 by analyzing your security camera streams. Instant threat detection, Detects visible guns, masks, and intruders, Cutting-edge, proprietary AI detection system developed by research scientist, Dr. Sean Huver. Auto-Lock Doors. If a gun is detected, doors are automatically locked to prevent further entry by the armed culprit while remaining unlocked from the inside so people can escape. Bulletproof laminate can also be installed to prevent forced entry through glass. Prohibits entry by people visibly holding guns False alerts quickly reversed by human reviewers Easy to integrate with access controlled doors via API.
Flock Safety’s ALPR system securely captures images of license plates at speeds up to 70 miles and hour while the proprietary machine learning algorithm identifies a vehicle fingerprint including license plate, vehicle type, and vehicle color. Once images are captured, the camera almost immediately uploads them into our securely encrypted cloud server. This means that even if an individual device is tampered with or vandalized, there will be no footage on the actual camera. The system can run the plates against local and national law enforcement databases as well as Amber and Silver Alerts.
Using Software Not Listed?
Blue Light builds connectors every month to customer owned-systems, databases or technologies. If you would like information to discuss your data connectivity requirements, please contacts us at anytime!
IBM i2 Solutions
Trusted by Governments, Agencies, Companies, and Communities around the world.
Blue Light has been working with hundreds of various entities to ensure that their analytic needs are met. From anti-terrorism and counter IED efforts to opiate, sexual and drug trafficking to corporate and event security. Blue Light has ensured that customer centric solutions were built with the correct i2 product mix and third party products to provide advanced, yet affordable analytics.
Call us Today!
2139 Valleygate, Suite 201, Fayetteville, NC 28304
© Blue Light LLC 2020