Software Licenses

The following license options  are available for TACCS™ software.  Each license is assigned to a single machine, which may be connected to a computer network only for the purposes of data input or networking with other TACCS™ licensed computers. A description of each license option is as follows; this description does not address licenses supplied by third party data providers.

TACCS™ Multi-User Workgroup (Enterprise Server) License.  This software is installed on a Linux server conforming to Priority 5 performance specifications.  This license also entitles the user to one Workstation License as described below.  This installation is a full-featured version of TACCS™ and its database, which, as the name indicates, supports the creation of a workgroup that allows collaboration between multiple workstations.  The workstations may operate in a user defined operating picture mode, or one of the workstations may be designated as a control unit, which will then determine the imagery and simulated conditions (the “canvas”) viewed by the other workstations in the workgroup.  Discounts are provided if additional TACCS™ Multi-User Workgroup Licenses are installed on an existing TACCS™ Enterprise Server and share the same database.

TACCS™ Desktop (Single-user Workgroup) License.  This software is installed on a Linux server that has TACCS™ Multi-User Workgroup (Enterprise Server) License installed.  This license provides the user with the ability to operate independent of other users in a workgroup to conduct simulations or other analyses.

TACCS™-ISE.  This software is installed on a Linux server conforming to Priority 5 performance specifications.  This license also entitles the user to one Workstation License as described below.  TACCS™-ISE provides the basic capabilities required for most law enforcement applications (i.e., aggregating information from disparate sources, identifying potential threats, and coordinating operational responses.  While TACCS™-ISE does not provide live state tracking of asset operational status or “what if” simulation capability, a full credit of the amount paid for the ISE license is provided should the decision to upgrade be made at a later date.

TACCS™ Workstation License.  This software is installed on a Windows XP or later PC with a multi-touch display (if desired) supplied by the user and conforming to Priority 5 performance specifications.  A workstation requires access to a TACCS™ or a TACCS™-ISE server.  The purpose and concept of operation with the use of multiple workstations within a network is to support a focused common operating picture (COP) involving multiple office and/or field-based users.

TACCS™Mobile Extension.  The TACCS™Mobile Extension License is installed on a Linux server that has TACCS™ Multi-User Workgroup (Enterprise Server) or TACCS™-ISE License installed.  It extends the power of TACCS™ situational awareness to first responders in the field by allowing appropriately licensed Apple and Android tablets to access information from the Server using a secure mobile browser-based connection.  TACCS™Mobile allows first responders and agents in the field to interact with the TACCS™ server.  The field agents can be tracked on the canvas and have the ability to both receive information from TACCS™ and submit live reports, including images, back to the server.

TACCS™DST Extension.  The TACCS™DST Extension License is installed on a Linux server that has TACCS™ Multi-User Workgroup (Enterprise Server) License installed.  This too lset allows the user to optimize the application of post-event recovery crews, including the ability to coordinate public and private efforts.  Using this tool, the operator can: designate the types and locations of supplies, equipment and personnel (Recovery Assets) that are or may be available to be used to restore damaged CI/KR; identify all CI/KR that are required to be restored in order for critical societal or organizational missions to be fulfilled; identify the relative priorities of restoring the damaged CI/KR so as to enable the critical societal or organizational missions to be fulfilled; and create a plan for deploying the available Recovery Assets in the most effective manner.

Risk Management & Business Continuity

It's about embedding risk management into everyday processes at all levels of the enterprise to truly drive business continuity. It's about allowing you to marshal, protect and restore your resources. Priority 5 software gives you the ability to identify and analyze potential problems in advance. It enables you to be ahead of the curve and gives you the peace of mind that comes from knowing you are as ready as can be to restore business after a crisis.

Read More >>

Request More Information
captcha