

Integration with Online Maps and Google Earth Search for text in saved files such as Word, Excel, PDF, txt, etc. Save link chart to PNG, JPG, or BMP files Link Analysis to Identify Connections, Relationships, and TrendsĮntity Replacement (Hide/Keep) based on Entity and Relationship TypesĮxport link chart to PDF for large plotter/printer Save files for each entity and relationship Metadata types and values for each entity and relationship Supports tables linked to dBase, FoxPro, ODBC and OLEDBĬreate rich text descriptions for each entity and relationship Proprietary binary file format (links to other formats for additional fees) Attendees must also have completed the IBM i2 Analyst's Notebook Essentials (U59I02G) course or have equivalent experience. See also the highly recommended pre-class assessment.Industry-standard Microsoft SQL Server database This advanced course is specifically designed for Analysts working in Commercial and Government sectors.Ī basic understanding of and working knowledge of Windows and Microsoft Office Suites is useful. This curriculum is designed to focus on the ANB program functionality regardless of data type analyzed. The focus is on advanced analytic techniques, importing, and understanding displayed data to pinpoint nodes of interest to answer questions. This three-day course is designed for current i2 Analyst?s Notebook (ANB) users that have a desire to advance their skills in advanced search and discovery functions.

The i2 intelligence analysis platform tracks critical missions across law enforcement, fraud and financial crime, military defense, and national security and intelligence sectors. It is commonly used by digital analysts at law enforcement, military and other government intelligence agencies, and by fraud departments. Based on ELP (entity-link-property) methodology, it reveals relationships between data entities to discover patterns and provide insight into data. Harris Computer Corporation, the Security i2 Analyst's Notebook is a software product for data analysis and investigation. You can quickly find hidden connections and critical patterns buried in internal, external, and open-source data, and can make confident decisions in near-real time by using multi-dimensional visual analysis to turn overwhelming and disparate data into actionable crime intelligence.įormerly owned by IBM but now part of N.

The software combines advanced analytics with multidimensional visual analysis capabilities to give analysts greater situational awareness. The i2 is an intelligence analysis software that arms analysts with the advanced fusion and multi-dimensional analytics they need to create actionable intelligence to detect, disrupt, and defeat sophisticated threats.
