throbber
GUARDIAN EXHIBIT 1004
`Guardian Alliance Technologies, Inc. v. Miller
`
`1
`
`

`

`INTERNET ARCHIVE
`httpv/www.esdevile.com/pabits/helpfindex html
`JAN
`WaYPGCHMOCTINE—+capture
`<
`
`1 Feb 2011
`
`POBITS User's Manual and Technical Reference
`
`Contents | Index | Search
`
`EI) Welcome and Introduction
`introduction
`
`(=) (ties
`System Benefits
`=) Electronic vs Paper
`information Integrity and Data Ownership
`information Security
`] System Architecture
`) About This Manual
`E] Learning to Use POBITS
`Useful Concepts
`1§ Investigator Roles
`12 Managing Candidates
`E1€ Managing Cases
`1§2 Managing Organizational Information
`© Help and Support
`
`©) 2020 Essent! Software Develooment, LLC
`
`
`
`POBITSis a database application for managing all aspects of a background investigation for a law enforcement position, and for managing many background investigations simultaneously. But it's way more than that. POBITS
`dramatically changes the process and drastically reduces the effort required by the Investigator. Because POBITS is web-based, all participants in the investigation can use the system to contribute to the process. This can
`greatly expedite the communications between the investigator and other participants.
`
`For example, the Investigator enters a Candidate's basic information into POBITS such as Name and Email Address, then opens a Personal History Statement for the Candidate to complete on-line. The Investigator then
`invites the Candidate to the POBITS system. This is a simple mouse-click action that creates user credentials and sends an email to the Candidate. The Candidate then uses POBITS to update their personal information and
`complete their Personal History Statement. Once complete, they submit the form electronically. Once submitted, the Investigator is notified and is able to review the information provided by the Candidate. At this point, the
`Investigator begins the "footwork", of contacting all of the Candidate's provided references.
`
`This is simplified by POBITS in the same manner. The Investigator can "invite" a reference to use the system and complete a questionnaire regarding the candidate. Throughout the process, the Investigator is aware of who
`they are waiting on for information and is notified when information is submitted to the system. When forms and questionnaires are submitted, the Investigator is notified via email by POBITS and by alerts within the system.
`
`When completing their on-line information, the Candidate can download a consent release form, sign it and notarize it, and upload it to the system. This completed form is presented to all persons who complete on-line
`questionnaires within the system.
`
`An investigative area, for example, Education, has a numberof investigative items, for example, Schools Attended. For each investigative item, the Investigator is able to enter investigative notes and optionally flag the item
`as being noteworthy to the investigation (red flag). For each investigative area (Personal, Financial, Education, etc.) the Investigator enters a narrative summary which collectively provide the entire narrative summary of the
`investigation.
`
`The Investigator can generate a number of standard forms and releases for the candidate as well as reports such as a Narrative Summary, Contact with Relatives and References, and many others. There are also several
`reports that quantify investigative actions and results both organizationally and on the Investigator level. This provides managementwith real-time insight into the progress of background investigations under their purview.
`
`
`
`2
`
`

`

`® @® @
`[tae Wr
`JAN
`hitov/Awww.esdevilc.com/pabits/help/indexhim
`INTERNET ARCHIVE
`WaYPACHMOCHIOE+caoture
`>
`
`1 Feb 2017
`
`POBITS User's Manual and Technical Reference
`
`Contents | Index | Search
`
`EI) Welcome and Introduction
`Introduction
`Concept of Operation
`
`E§System Benefits
`Electronic vs Paper
`Information Integrity and Data Ownership
`E] Information Security
`system Architecture
`About This Manual
`Learning to Use POBITS
`) Useful Concepts
`© Investigator Roles
`© Managing Candidates
`H1@> Managing Cases
`1&2 Managing Organizational Information
`4]@ Help and Support
`
`© 2000 Exentiel Software Develooment, LUC
`
`
`
`There are many obvious benefits to this concept. First and foremost is that it reduces the level of effort required of the background investigator while improving the process, organization, and managerial visibility. Secondis
`that it imposes rigor into the background investigation process. This rigor includes:
`
`Information Organization
`
`The background investigation process involves the collection of a great deal of information which is compounded by every investigation. Having more than a couple of ongoing investigations at once is a strain on even a well-
`organized investigator. Having an organized and well-structured environment ensures good organization and instant accessibility. For example, it is impossible for two investigators to organize their case files differently and
`organization concepts do not have to be learned; they are imposed.
`
`Continuity of Operations
`
`Some departments may have a staff dedicated to the background investigation process, For others, it may be a collateral duty for one or more officers or employees. Either way, POBITS provides a measurable benefit by
`standardizing how information is stored making it possible for any investigator to instantly determine the status of any investigation or any element of a particular investigation.
`Process Standardization
`
`POBITS establishes an organizational structure for investigative information. Whether you are the only Investigator or you work as part of a team of Investigators, this will provide consistency and organization to your
`investigative work.
`
`Paperless Process
`
`POBITS enables your organization to minimize paper products to the greatest extent possible,
`
`
`
`3
`
`

`

`INTERNET ARCHIVE
`http:/www.esdevile.com/pobits/help/indexhtml
`JAN
`WaQPACHMMACHIME—+capture
`
`
`
`Given the general requirements of a background investigation, it is not conceivable that the entire investigation can be committed entirely to an electronic system, and we don't intend for POBITS to do so, Ultimately, the
`Investigator must compile all investigative documents into a case file which must be preserved for a very long time. For many law enforcement positions, the background investigation report must be retained beyond the
`employment of the Peace Officer. Information systems come and go and may be adopted or abandoned at any time. For these reasons, we promote POBITS as a tool to help the investigator manage the investigation process
`and produce a case file for review. All of the information contained in POBITS can remain there for as long as the system remains in place. But we suggest that the POBITS output which represents the investigation case file
`be generated into paper format and preserved.
`
`We have designed POBITS as a tool to help the Investigator in the background investigation process, Once the process is completed, POBITS can generate documentation based on the information in the system. Each
`investigation case file in POBITS can have any number of documents attached. The documents can be anything that can be saved electronically, We envision documents will be scanned to a PDF format for inclusion to the
`case file. There may be some records that must be retained in original format. As stated, we anticipate that you will maintain physical records but many of those can be retained in POBITS either as data or as electronic files
`attached to the case record.
`
`More important is your ability to manage the workload and measure your results. Because your work is being managed within a single system, a wealth of information can be derived about the work in progress or the
`completed work. This provides a greater ability to coordinate and manage work as well as to determine how much work has been accomplished over a given period of time. This in turn can help you to determine staffing
`needs and adjust resources accordingly.
`
`POBITS User's Manual and Technical Reference
`
`Contents | Index | Search
`
`FIL Welcome and Introduction
`Introduction
`Concept of Operation
`[2] System Benefits
`
`Electronic vs Pape
`[2] Information Integrity and Data Ownership
`[2] Information Security
`[2] System Architecture
`[2] About This Manual
`Learning to Use POBITS
`[2] Useful Concepts
`1 Investigator Roles
`E1@> Managing Candidates
`E1€> Managing Cases
`[1€2 Managing Organizational Information
`© Help and Support
`
`2010 Essential Software Develooment, LLC
`
`Wwattin g for web.archive.org...
`
`
`
`4
`
`

`

`IneRNer ARcMiVE
`
`1 Feb 2011
`
`
`Wyaybaelmachine4capture ji < i Ho
`
`
`
`POBITS User's Manual and Technical Reference Contents | Index | Search
`
`ae
`
`@Oe@
`
`EI (Qj Welcome and Introduction
`Introduction
`Concept of Operation
`E) System Benefits
`[2] Electronic vs Paper
` Information Integrity and Data Ownershi
`Information Security
`System Architecture
`About This Manual
`Learning to Use POBITS
`) Useful Concepts
`© Investigator Roles
`© Managing Candidates
`E1@ Managing Cases
`[1&2 Managing Organizational Information
`]1@ Help and Support
`
`© 2000 Essential Software Development, LLC
`
`POBITS dramatically changes the way investigations are completed by creating a central information system where Investigators, Candidates, and their References all contribute to the process. Naturally, each participant is
`only able to view, enter, edit, or delete information appropriate for their role. For example, the Candidate will complete their Personal History Statement directly in POBITS. The investigator can view all of the information
`provided by the Candidate but cannot change it. The only exceptions are personal contact information so the investigator can updateit if this becomes necessary in the course of the investigation. References have an
`extremely limited view - they can complete one questionnaire specifically for them, and that's all.
`
`In the conduct of an investigation, the Investigator my issue system access to a numberof individuals. We've made this a simple mouse-click operation. In doing so, it gives the Investigator the ability to control system access
`without any need te consider access rights and privileges, and no ability to make a mistake that may jeopardize system integrity. As an Investigator, you will discover data that you have no ability to manipulate. This is by
`design. The Investigator cannot alter the responses provided by the Candidate and should not be able to. Nor can the Investigator add information that should be provided by the Candidate. Because of these controls, you
`can be assured thatall information has been entered and updated only by the very individuals who can be held accountable for the accuracy and integrity of the information.
`Should you discover that a Candidate has not provided complete information, simply re-invite the Candidate to the system with directions on what information is needed. Each time the Candidate access the on-line form, they
`are required to certify that all information contained in the record is complete and accurate.
`
`
`
`5
`
`

`

`
`
`INTERNET ARCHIVE httovJAwww.esdevilc.com/pobits/helpfindex.himl[Go]JAN
`aynaeyMachine
`capture
`4
`
`1 Feb 2011
`
`POBITS dramatically changes the way investigations are completed by creating a central information system where Investigators, Candidates, and their References all contribute to the pracess. Maturally, each participantis
`only able to view, enter, edit, or delete information appropriate for their role. For example, the Candidate will complete their Personal History Statement directly in POBITS. The investigator can view all of the information
`provided by the Candidate but cannot change it. The only exceptions are personal contact information so the investigator can updateit if this becomes necessary in the course of the investigation. References have an
`extremely limited view - they can complete one questionnaire specifically for them, and that's all,
`In the conduct of an investigation, the Investigator my issue system access to a number of individuals. We've made this a simple mouse-click operation. In doing so, it gives the Investigator the ability to control system access
`without any need to consider access rights and privileges, and no ability to make a mistake that may jeopardize system integrity. As an Investigator, you will discover data that you have no ability to manipulate. This is by
`design. The Investigator cannot alter the responses provided by the Candidate and should not be able to. Nor can the Investigator add information that should be provided by the Candidate. Because of these controls, you
`can be assured that all information has been entered and updated only by the very individuals who can be held accountable for the accuracy and integrity of the information.
`Should you discover that a Candidate has not provided complete information, simply re-invite the Candidate to the system with directions on what information is needed. Each time the Candidate access the on-line form, they
`are required to certify that all information contained in the record is complete and accurate.
`
`POBITS User's Manual and Technical Reference
`
`Contents | Index | Search
`
`5
`
`FI} Welcome and Introduction
`[2] introduction
`ula
`E
`E] System Benefits
`Electronic vs Paper
`Information integrity and Data Ownership
`
`Information Sisal
`System Architecture
`About This Manual
`E] Learning to Use POBITS
`) Useful Concepts
`© Investigator Roles
`© Managing Candidates
`EI Managing Cases
`1§2 Managing Organizational Information
`E1@ Help and Support
`
`©) 2020 Exsentee! Software Develooment, LLC
`
`Waiting for web.archive.org..
`
`
`
`6
`
`

`

`
`aaaacehitianggceaesdee.comipobisnelpindexhim!_][so] “=a @®©e
`
`
`WaYPGCHMOCHINE+cootute
`y
`no
`
`010
`
`i
`
`1 Feb 2011
`
`POBITS User's Manual and Technical Reference
`
`Contents | Index | Search
`
`Fly Welcome and Introduction
`introduction
`2) Concept of Operation
`system Benefits
`—) Electronic vs Paper
`Information Integrity and Data Ownership
`information Security
`
`E§SystemArchitectur
`About This Manual
`E] Learning to Use POBITS
`Useful Concepts
`1§2 Investigator Roles
`E1§ Managing Candidates
`1&2 Managing Cases
`[4] Managing Organizational Information
`© Help and Support
`
`©) 2020 Essential Software Develooment, LLO
`
`
`
`7
`
`POBITS is provided under the "Software as a Service” model, commonly referred to as SaaS in the industry. POBITS is a Web-based system and is hosted and serviced by Essential Software Development, LLC. All POBITS
`users access POBITS using their web browser, and just about any web browser will work. POBITS is regularly tested in Internet Explorer, Firefox, and Google Chrome. No special settings or plug-ins are required,
`
`Why Software as a Service?
`
`Because it's better for both of us. In this model, you do not acquire anything. You receive a service which is the use of the software somewhatlike a subscription. You do not make a financial investment in software or
`hardware. If the service is no longer needed for any reason, you simply stop using it and stop subscribing. If someone comes along with a better service, you can switch. You do not have to involve local IT resources with any
`aspect of system setup, use, operation, or maintenance. We support and service a single installation of our product and do not have to concern ourselves with any special circumstances within your computing environment.
`System updates and modifications are made with no customer involvement. This is considerably more economical and enables us to provide the service at the lowest possible cost. Lastly, it's easier for us to sell and for you to
`buy. The approval and budgeting process to procure technology in any well-managed organization is a considerable effort. Acquiring technology typically requires a lot of money and a lot of approvals. On the other hand,
`acquiring a service does not. The procurement of the service is most likely within the budget authority of the manager who requires it. Further, the service is severable, meaning that you can discontinue its use at will. This is
`the most efficient and economical way to provide this software to you and observers of the software industry will note a strong trend toward providing software as a service.
`
`Why a Web-based Application
`
`Using web architecture is what allows us to change the game. Making POBITS web-based allows us to extend the application to all participants in the investigative process. Now Investigators, Candidates, References,
`Landlords, past Employers, and departmental managers can all use this single system in a manner appropriate for their role in the process. There is simply no more efficient way to accomplish the background investigation
`process. It's significant to note that the federal government employs a system thatis similar in architecture to perform background investigations for personal security clearances. Similarly, all personal information is entered
`directly by the candidate and used by the background investigator to complete the elements of the investigation.
`
`
`
`7
`
`

`

` i7
`INTERNET ARCHIVE
`httpJAwww.esdevilc.com/pabits/helpindex.himl
`JAN
`WaYBACHMOCTIOE+capture
`<
`
`7 Feb 2011
`
`a
`
`You may be reading this manual as a PDF document or as HTML within your web browser, Either way, the content is the same. In creating POBITS, we have created an information system well conformed to your business
`process and you should recognize the terms used throughout the application. We assume you know how to use a computer application, If we have done our job well, you should never need to consult the documentation to
`accomplish a task. We did not create this documentation to provided step-by-step procedures for performing each task. If you understand the concept behind the software, and can navigate a computer application, you
`should have no difficulty getting your work done in POBITS, This documentation was written to help you understand the concepts and business rules that drive the application rather than to provide detailed job aids. If you
`read anything in this documentation, you should read the Concept of Operation topic.
`
`The best way to learn is to use. Most users will become familiar with POBITS in a very short time.
`
`POBITS User's Manual and Technical Reference
`
`Contents | Index | Search
`
`E1 (4) Welcome and Introduction
`2] Introduction
`] Concept of Operation
`2] System Benefits
`2] Electronic vs Paper
`Information Integrity and Data Ownership
`Information Security
`system Architecture
`
`EPAbout This Manual
`Learning to Use POBITS
`Useful Concepts
`[12 Investigator Roles
`[1 Managing Candidates
`E12 Managing Cases
`1§ Managing Organizational Information
`41 Help and Support
`
`©) 2010 Exsentel Soflvers Develooment, LUC
`
`
`
`8
`
`

`

`@ @® @
`"4 FE >
`httpviAwww_esdevilc_com/pobits/help/indexhim
`INTERNET ARCHIVE
`UaYBACHMMOCHIME+cooture
`Ho
`|
`
`¥_About this capture
`
`
`1 Feb 2011
`
`27012
`
`POBITS User's Manual and Technical Reference
`
`Contents | Index | Search
`
`Within POBITS you will find links to help and training in the Main Menu. These links will take you to this manual and to other resources such as the User's Forum. The User's Forum is a typical forum system where members
`Can post and respond to comments from other users. This forum is monitored by our support staff and your posts will usually be responded to by them. This is an excellent resource for searching for topics that may have
`already been asked and answered, especially if you are working in the off hours and you have a question or seek advice.
`
`There are also a number of short training videos designed to give users a guick introduction to the system and specific quidance on performing certain tasks, This is an excellent resource for persons mew to the background
`investigation process or to POBITS.
`On various screen forms, field level help is provided via mouse-over help icons. When you seen the help symbol @ next to a data field, just hover the mouse over it to see a short description of the purpose ofthefield.
`
`EI) Welcome and Introduction
`Introduction
`Concept of Operation
`System Benefits
`Electronic vs Paper
`Information Integnty and Data Ownership
`E] Information Security
`E] System Architecture
`[2] About This Manual
`
`=) (Ete hekesa8):
`Useful Concepts
`Investigator Roles
`1€
`G1§2 Managing Candidates
`EI Managing Cases
`12 Managing Organizational Information
`E1§ Help and Support
`
`©) 2010 Essential Software Develooment, LLC
`
`Wisttroand for web archiveorn...
`
`
`
`9
`
`

`

`® O) Q
`WAR
`[EGER
`JAN
`httovAwww.esdevilc.com/pabits/help/index.himl
`INTERNET ARCHIVE
`WaYPGCHMACHINE+capture
`
`POBITS User's Manual and Technical Reference
`
`Contents | Index | Search
`
`Et] Welcome and Introduction
`Introduction
`Concept of Operation
`E] System Benefits
`=] Electronic vs Paper
`Information Integrity and Data Ownership
`E) Information Security
`system Architecture
`About This Manual
`Learning to Use POBITS
`
`Useful Concepts
`1€2 Investigator Roles
`[1§2 Managing Candidates
`1 Managing Cases
`1§ Managing Organizational Information
`1§2 Help and Support
`
`© 2000 Essential Software Development, LLC
`
`
`
`Narrative vs. Comment
`
`POBITS gives the Investigator a tool to track all notes, thoughts, findings, observations, status, and narrative comments on all aspects of the background investigation. There is a basic structure to all of this information. Each
`Investigative area (for example, Education) has a section for Investigator's Narrative. At this level, all aspects of the investigative area are summarized in narrative form. These narratives collectively become the investigator's
`narrative report which POBITS assembles.
`
`Within the investigative area are items (for example, a college). In this example, the Candidate will enter all colleges attended and the investigator can review each and make a specific comment and optionally check a Red
`Flag. Investigator's comments and Red Flags are internal notes and serve to remind the investigator of issues that have been identified, or actions taken.
`
`For example, while investigating a prior residence, the Investigator learns from the Landlord that police were called to the residence on one occasion, yet the Candidate has made no disclosure of the incident, For the
`Investigator's Comments, the Investigator can make a note of this and check the Red Flag. Checking the Red Flag makes this comment more visible and searchable. This would ultimately be one investigative item as part of
`the entire Residence investigative area,
`
`Multiple Personal History Statements
`
`It is important to understand that a Candidate is an entity that may have any number of Personal History Statements. This will help you understand why these items are laid out as they are. You can use this concept as you
`see fit. We know that some organizations require a new Personal History Statement for each application, and others my not. The candidate will always see whichever Personal History Statement is "Open", and only one can
`be open when a Candidate is invited.
`
`10
`
`
`
`10
`
`

`

`INTERNET ARCHIVE
`httov/Awww.esdevilc.com/pobits/helpfindex.htmi
`JAN Tia
`WAR
`OOo
`WaYDCHMACHM—+caprure
`|
`<
`>
`no
`
`POBITS User's Manual and Technical Reference Contents | Index | Search
`
`1 Feb 2011
`
`12 Welcome and Introduction
`
`FI a WSRelma ae B =
`SteS
`poe
`
`lEWEr
`[2] Other Roles
`© Application Basics
`© Managing Candidates
`1 @ Managing Cases
`1€ Managing Organizational Information
`E1€ Help and Support
`
`2010 Essential Software Oevelooment, LUC
`
`All system users in your organization are Investigators but each has a different role. Every Candidate is assigned to an Investigator and an Investigator can be one of three types:
`* Manager;
`Investigator; or
`*
`Viewer (Candidates cannot be assigned to Viewers)
`
`1]
`
`
`
`11
`
`

`

`INTERNET ARCHIVE
`
`hitoviAwww_esdevilc_com/pobits/helpfindexhtml
`
`1 Feb 2011
`
`
`JAN
`Waynemachine4capture ||
`
`
`
`
`POBITS User's Manual and Technical Reference
`
`Contents | Index | Search
`
`0
`
`ee
`
`12 Welcome and Introduction
`FIL Investigator Roles
`EI
`=) Investigator
`Viewer
`
`Other Roles
`© Application Basics
`© Managing Candidates
`E12 Managing Cases
`1§ Managing Organizational Information
`[4]§2 Help and Support
`
`© 2010 Exentie Software Development, LLC
`
`A Manager is an Investigator with the ability to create Managers, Investigators, or Viewers within your organization. They can view all Candidates in the systern and view reports that reflect all organizational information. They
`can monitor the progress ofall Investigations or just those assigned to them. If you have only one Investigator in your organization they must be a Manager.
`If you want all Investigators to have the Manager role, that’s fine and may be more conducive to an organization where multiple Investigators may work on multiple cases with minimum "ownership" of the case by the
`Investigator.
`
`12
`
`
`
`12
`
`

`

`INTERNET ARCHIVE
`
`WAYDSENMMECWM
`
`
`httov/Awww.esdevilc.com/pobits/help/index.himl
`+contur
`
`reo 2)
`
`POBITS User's Manual and Technical Reference
`
`
`
`Contents | Index | Search
`
`[1§2 Welcome and Introduction
`EI) Investigator Roles
`2) Manager
`Ei
`E) Viewer
`E] Other Roles
`[1§ Application Basics
`E12 Managing Candidates
`[1&2 Managing Cases
`[4]€2 Managing Organizational Information
`1§% Help and Support
`
`©) 2010 Exsentiel Software Develooment, LUO
`
`
`
`13
`
`

`

`INTERNET ARCHIVE
`httpJAwww.esdevilc.com/pabits/helpindex.himl
`JAN
`[is
`WaYBACHMOCTIOE+capture
`
`7 Feb 2011
`
`Contents | Index | Search
`
`POBITS User's Manual and Technical Reference
`
`Viewers are Investigators with view-only privileges. In the real world they are not really Investigators. ‘You will probably assign this role to departmental managers who simply need access to the investigative records and
`reports. Viewers can access all Candidate records and view reports forall cases within the organization. There is no information in the system they can change, nor can they add any information. Since no Candidates can be
`assigned to them, their menu system has fewer options than other Investigators,
`
`& Welcome and Introduction
`EI Investigator Roles
`Es Manager
`Investigator
`
`2 )
`
`Other Roles
`«2 Application Basics
`© Managing Candidates
`E1§> Managing Cases
`1§2 Managing Organizational Information
`© Help and Support
`
`©) 2010 Exentes Software Development, LLC
`
`14
`
`
`
`14
`
`

`

`@® @ @
`JAN -B
`httpsAwww.esdevilc.com/pobits/help/findex himl
`INTERNET ARCHIVE
`WAURSCHMACTING=+capture
`
`1 Feb 2011
`
`
`
`Besides Investigators and Candidates, there are 5 other user roles in POBITS that are referred to as "Relatives and References" within the Personal History Statement. They are:
`*
`Reference
`
`*
`

`*
`*
`
`Parent
`
`Sibling
`Secondary Reference
` Weighbor
`
`In addition to these roles, there are three other roles of users who will potentially complete candidate questionnaires. They are:
`

`*
`
`*
`
`Employer
`Landlord
`
`Other Law Enforcement Agency
`
`The users in these roles are all references of some kind that will be provided by the Candidate but each is different and each enters the system with a slightly different visual perspective. For example, when a Landlord enters
`the system they are presented with a Landlord questionnaire and an Employer is presented with an employer questionnaire. The difference between a Parent and a Sibling is minor but is provided to support some minor
`differences in the information gathered on the Personal History Statement.
`
`Note that when a Candidate lists another law enforcement agency to which they have applied, you can invite a representative from that agency to complete a questionnaire. This questionnaire only asks basic information and
`does not solicit qualitative responses.
`
`POBITS User's Manual and Technical Reference
`
`Contents | Index | Search
`
`© Welcome andIntroduction
`Fila Investigator Roles
`Manager
`[2] Investigator
`[2] Viewer
`
`© Application Basics
`© Managing Candidates
`@ Managing Cases
`1§2 Managing Organizational Information
`© Help and Support
`
`©) 2010 Essent! Software: Development, LLC
`
`15
`
`
`
`15
`
`

`

`© Welcome andIntroduction
`FI) Investigator Roles
`Manager
`=) Investigator
`Viewer
`) Other Roles
`Elta Application Basics
`
`E
`Hication Basics
`E) Your Dashboard
`E] The Main Menu
`. When your cursor turns to a finger pointer, you can select a screen item. Inalist, this will open the item. In some instances, the list will include functions that pertain to thelist item you select, such as Print, to print the
`© Managing Candidates
`item. Items in a list that include an icon will execute the described function rather than open the object. The Print option is a good example.
`EI§> Managing Cases
`@1§2 Managing Organizational Information
`G1@ Help and Support
`
`ho
`
`tu
`
`aA
`
`Once you are working within a tab, for example on a list of candidates, your work remains within that tab. So when you select an item on thelist, you will be presented with a form for the object selected which replaces the
`list, When you close the form, the list will be retumed to view. Think of this a drilling down in a tree structure similar to navigating a computerfile system with many levels of depth. Some areas within POBITS can present
`many layers of depth to access a particular object. But as you drill down, you remain within the tab where you started. You can always close the tab but doing 50 will not require you to save any changes you made along
`the way. In general, POBITS will look after things and ensure that changed records are saved has you navigate about the system.
`
`. Mostlists include a Save icon and a Print icon at the top right corner. The Save icon will export the list to a .csv file and load it into MS Excel, presumingit is installed on the desktop. The Print icon will display the list in a
`basic HTML table on a new web page. This is also printable but printing structured web pages may have unpredictable results,
`
`. Like just about any web based application, you will be automatically logged out after a period of inactivity.
`
`.4 web application has no way of knowing your screen size or resolution. Generally, the application will maximize itself and use all available screen space as needed. Your screen size and resolution can dramatically impact
`usability. Bigger is better. It is recommended that you apply the highest resolution available unless you have vision impairments and require the largest possible screen fonts. POBITS will display particularly well on wide
`screen monitors.
`
`INTERNET ARCHIVE
`http/Awww_esdevilc.com/pobits/help/index. html
`ee CE
`WaYPOCHMOCHIME+copture
`>
`
`1 Feb 2041
`
` @o©
`
`POBITS User's Manual and Technical Reference
`
`Contents | Index | Search
`
`Web-based application have come a long way and now share many similarities with conventional desktop applications. POBITS was designed using modern web architecture techniques and the provides a very robust and
`feature rich user experience but a few minor difference should be understood:
`i
`
`When you open a record or select a menu item, it will be presented in a new tab on the application screen. You may apen as many tabs as you like. Once the number of tabs exceeds the display width of your screen, the
`tabs will scroll. Most users will not want or need that many tabs open at any given time.
`
`al
`
`. Network and server use can cause delays. We regularly monitor server use and capacity but there are times when either the server or the network has more demands than can be handled resulting in some delays in
`executing your actions.
`
`©) 2000 Essential Software Develooment, LUC
`
`16
`
`
`
`16
`
`

`

`@20O eo
`ma
`sk
`INTERNET ARCHIVE
`
`(ayogel(nacnine1capture < fo
`
`
`1 Feb 2011
`
`POBITS User's Manual and Technical Reference Contents | Index | Search
`
`Pa!
`
`© Welcome and Introduction
`When you login to POBITS your dashboard is displayed. Your dashboard presents the information that is most useful to you depending on your role, The Dashboard is always in view and if it does not present current
`EIN Investigator Roles
`information for any reason, select the Dashboard item in the main menu will refresh the screen with the most current information. This will reset the entire screen to the login view and will close all other open tabs.
`= ioe
`E] Manager
`[> Poems

`Wes
`investigator
`EI Viewer > C ff|httpy/locathost:8080/AwarelM/logonAdmin.aw > @ Og, # o DF
`
`
`Other Roles
`iiss cals oie
`Fil) Application Basics
` 2] Web Application Basics
`4 ae
`==
`CMEBer
`The Main Menu
`[1@ Managing Candidates
`He
`:
`:
`heanaray a 2
`4]€ Managing Organizational Information
`So Help and Support
`2 2020 Eseentie! Software Develorment, LLC
`
`mecnteern
`12ES0o O01
`1an3iee Oaa4
`;
`pa
`-
`aeans
`Oaeged 17209
`
`a
`New Candidate
`baligtassuin
`My Graphs
`| ayAlerts
`| 2)Groups
`EDGaDecartrneat: Carvialen
`#(_)DepartmentGraphs
`tf
`@ (Manager Toots
`| 2(S)HelpandSupper
`GijLogout
`
`a a ee
`8 § Johnny 6 Goode
` § Linda Rubio Gonzalez
`Nk Gooatisrenias
`Dyer
`Ovdil
`S& & Bi Featherweight
`[is 4 | Paget lofs F Fl
`
`ri
`
` HAD
`
`1215805 14:06.
`
`Oa2n09 17:10
`
`Henry Ford
`
`Henry Ford
`
`0a2n0S 17:09
`4
`| Paget
`jo

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket