|By Marketwired .||
|December 11, 2012 12:01 AM EST||
RYE BROOK, NY -- (Marketwire) -- 12/11/12 -- ImageWare Systems (OTCQB: IWSY), Wave Systems (NASDAQ: WAVX)
Mrs. Ulrica de-Fort Menares, Director of Product Management for Cisco Medianet, told us, "An intelligent network must become more application-savvy. It must have the ability to determine the importance of a session based on its business value, and treat the session accordingly, end to end. One of the key medianet characteristics is its ability to become media-aware. Imagine this: The network can discover the type of endpoint and automatically configure the switch port for that type of device. This ability to plug and play any endpoint in the network is an example of tight integration between an intelligent network and an endpoint."
For the complete interview: www.securitystockwatch.com/Interviews/in_Boardroom_Cisco_UFM.html
Videx, Inc., announced a new version of the CyberKey Vault 20, the CyberKey Vault 20 FX. The redesign features a sleek new look with weatherized input modules and an embedded Flex System Hub for improved performance, all offered at a new, lower price.
"The CyberKey Vault 20 FX is our most advanced key control cabinet (http://www.videx.com/cyberkey-vaults.html) yet," said James McGowan, VP of Sales and Marketing at Videx. "We built on the award winning original design and added extra durability and speed to meet the needs of today's demanding end-users. We believe it will surpass market expectations."
The Vault 20 FX is an intelligent key cabinet designed to manage, program, and dispense CyberKey smart keys. The keys are stored unprogrammed and locked securely in the cabinet until an RFID card and/or PIN code is presented to the cabinet. After reading the card and/or accepting the PIN, the CyberKey Vault programs a CyberKey with the individual's permissions. Keys are programmed with access privileges for each user, detailing which electronic locks (http://www.videx.com/cyberlock_cylinders.html) it can open and when. An audit record of all events is stored in both the locks and the keys. Each time a key is used at a lock, a record of the lock ID, date, and time is stored in the key, and a record of the key ID, date, and time is stored in the lock.
CyberKeys feature a unique electronic ID, preventing duplication. Although two keys can be programmed alike, each one leaves its own unique record within the system. When the key is returned to the Vault, the Vault downloads the key's audit trail, removes its permissions, and begins charging the key.
Videx offers three robust smart key vaults: CyberKey Vault 1, CyberKey Vault 20 FX, and CyberKey Vault WR. To learn more about the CyberLock line of access control (http://www.videx.com/cyberlock_overview.html) products, please visit our website at www.cyberlock.com.
For more information about CyberLock products: http://www.cyberlock.com/cyberlock_products.html.
For the complete interview with Mr. James McGowan, V.P. of Sales and Marketing, Videx:
For CyberLock News & Events:
For the CyberLock Solutions Center:
For more information:
Dove Net Technologies
Mr. Tony Nasca, Dove Net Technologies, said, "The Project System is the Complete Business Computer System for Contractors and Integrators. Companies that install: sound systems, nurse call systems, fire alarm systems, computer cabling, burglar systems, cctv, video systems, and systems contracting in general. Other companies that are using Project include Video Wholesale Distributors, Audio Visual Specialists, Video & Film Duplicators, Telephone System Specialists, and more". The major benefit that The Project System brings to the table is the that The Project System has been written in such a way that the software understands the business needs of these different industries and provide tools and feature sets to aid the contractor in running his business better. The most important aspect of The Project System is that The Project System provides a process flow to organize the company so that there is a standard process for quotes using Dove Net supplied Manufacturers Price Lists. You can also import your own price lists into The Project System."
For the complete interview: http://www.securitystockwatch.com/Interviews/in_Boardroom_DNT.html
Dove Net Clients Rave About The Project System: http://www.dovenet.com/clients.htm
For a Dove Net Demo: http://www.dovenet.com/project2.htm
For more information about The Project System: http://www.dovenet.com/projectwin.htm
For more information: www.DoveNet.com
ImageWare Systems recently announced, "In addition to product development, ImageWare has been preparing for a major international deployment as the exclusive provider of biometric identity management for a prime contractor installing cargo scanning security at the Republic of Ecuador's major seaports. The initial deployment is currently scheduled to begin in the early part of 2013 at the Port of Guayaquil, the country's main seaport that handles a majority of its imports and exports. ImageWare expects to receive a fee for every port worker receiving credentials, as well as an annual management and maintenance fee, based on a percentage of the initial credentialing cost per worker. Depending upon the number of enrollees, the company expects the contract value to exceed $3.0 million over its seven year term.
"The high-end biometric secure credentialing solution we are providing for Ecuador is the same technology being deployed for the Los Angeles World Airports, which we announced earlier this year," noted Jim Miller, Chairman and CEO. "In fact, we can easily replicate this platform for virtually any port system that needs transportation worker identification cards in order to comply with the SAFE Port Act. Not only are our solutions easily deployable, for ImageWare they generally represent gross margins above 70% as well as a recurring revenue stream. Our unique patented technology has the potential to provide us strong, steady revenue growth, along with excellent forward-looking visibility."
For the complete interview with Jim Miller, ImageWare Systems, Chairman and CEO: www.securitystockwatch.com/Interviews/in_Boardroom_IMW.html
For ImageWare Systems Investors: http://www.iwsinc.com/investors.cfm
For more information: www.iwsinc.com, (OTCQB: IWSY)
Keyscan Access Control Systems
Keyscan Access Control Systems recently announced that its' next generation communication module, the CIM (Communications Interlink Module), is now available.
The Keyscan CIM is a new communication control module designed to use a CAN Bus communication network to provide optimized server to Access Control Unit (ACU) communication as well as give users an all new ACU to ACU network permitting inter-panel communication for global functions including anti-passback, global input/output and global time zones.
"The Keyscan CIM is just another example of Keyscan Access Control Systems' commitment to innovation and quality. It is the new communication standard for Keyscan and opens up a host of new features as well as enhancements especially for global communication," says Steve Dentinger, Keyscan Director of Sales and Marketing.
The Keyscan CIM utilizes a Controller Area Network (CAN) Bus infrastructure to establish a communication network among multiple ACUs as well ACUs and a host server. The capabilities of CAN already surpass those of other serial communication technologies. But, Keyscan didn't stop there.
Keyscan CIM combines the robust CAN Bus protocol with a hardware interface that is superior to the standard commercial-grade CAN Bus. It is a fully isolated CAN Bus using high speed digital isolation devices that separates ground reference of the CIM and ACU from the ground reference of the CAN Bus transceiver. This reduces problems found when there is a difference in ground potential between units. This is often observed in multi-building installations or in poor grounding conditions.
This isolation further protects the CIM, and connected ACU, from lightning strikes or electrical surges reducing the occurrence of module failure. It also ensures a single unpowered CIM cannot adversely affect the data of the CAN Bus.
A common-mode filtering at the CAN Bus transceiver reduces ground referenced noise from the CAN Bus which improves signal quality reducing bit errors and bus faults. DC biased termination resistors provide the necessary termination of the CAN Bus cabling but also ensure the full potential of the CAN Bus signal is utilized. In addition to providing server to ACU and global inter-panel communication, the Keyscan CIM also includes impressive new features including ground loop protection, enhanced device-based diagnostic capabilities, improved speed and unprecedented reliability.
"The Keyscan CIM offers new features, enhancements and possibilities, especially when it comes to global communications," Dentinger continued.
"It changes the dynamics of Keyscan ACU to ACU and ACU to server communication and forms a new foundation for global communication. And, once again, demonstrates how Keyscan offers access control systems without limits; and innovation without boundaries."
We invite you to learn more about the new Communication Interlink Module and our family of access control units. Click here to visit our website www.keyscan.ca
For the complete interview with Mr. Steve Dentinger, Keyscan Director of Sales and Marketing: http://www.securitystockwatch.com/Interviews/in_Boardroom_Keyscan.html
For the Keyscan Corporate Video: http://www.keyscan.ca/video.html
For Keyscan Case Studies: http://www.keyscan.ca/casestudies.html
For more information: www.Keyscan.ca
KEEP YOUR IP
Keep Your IP recently announced their cooperation with global standards provider, UL (Underwriters Laboratories) in an attempt to expand the scope of several of their standards and categories wherein the Keep Your IP line of IP forwarding services can become certified.
At present, UL's Certification of Alarm Services is specific to protected properties and has some limits. These limits include the aspects of the telecommunications infrastructure within the service. UL Alarm Service Certificates currently specify that their Certificates do not apply to the communications channel between the protected property and any facility that monitors signals from the protected property.
Keep Your IP's service, and its supporting hardware, lie in the communications channel between protected property and the monitoring facility which presently puts it outside the scope of UL's Certification.
Davin Roos, President of KYI, Inc., says, "We are very excited to assist UL in establishing a category that will address new technological advancements on communications within the alarm industry."
"Today's technology makes it possible for innovators to deliver an amazing array of new and beneficial services. Helping organizations bring those services into the market in a way that preserves the integrity of the public's security is a big part of UL's mission." stated Steve Schmit, Engineering Manager at UL LLC out of Northbrook, IL. "We look forward to working with Keep Your IP and the entire industry on Certification solutions that bring trust and confidence to all stakeholders."
UL has confirmed that an alarm company's use of the Keep Your IP service would not impact their Listing or Certification status in any way.
To that end, UL has communicated their desire to better accommodate the rapidly changing communications infrastructure and hope to have an offering that fits the Keep Your IP product in the not too distant future, possibly as early as the first quarter of 2013.
Keep Your IP also recently announced a major reseller agreement with COPS Monitoring, one of the country's largest wholesale monitoring companies.
KYI, Inc. and COPS Monitoring have signed an agreement wherein COPS will offer the complete lineup of Keep Your IP services to their approximately 3,500 dealers.
Keep Your IP is considered the industry's first and only internet IPv4 forwarding service designed exclusively for the alarm industry. Keep Your IP services will be both a tool to increase value for the alarm dealer by giving them better control over of their accounts as well as critical IP disaster recovery support service for the Central Station.
Davin Roos, president of KYI, Inc., says, "By providing alarm professionals with their own secure IPv4 numbered address, they get the peace of mind of knowing that as their business grows and merges into the new internet IP based world, they will be able to direct that growth as they desire."
"COPS Monitoring continually searches for ways to offer leading-edge services to help our dealers prosper," added Jim McMullen, President and COO of COPS Monitoring. "We are proud to offer Keep Your IP's services and we're confident that our dealers will see the advantages of having the flexibility and assurances they can offer."
For the complete interview with Davin Roos, President of KYI: http://www.securitystockwatch.com/Interviews/in_Boardroom_KYIP.html
For more information about Keep Your IP and "How It Works": https://www.keepyourip.com/how_it_works
Mr. Thomas Carnevale, President and CEO, Sentry360, told us, "2012 brought several exciting flagship projects and record deployments for Oil and Gas, transportation & retail markets. All of Sentry360's cameras are securing JFK Airport Terminal 1. After an extensive product evaluation cycle by the end-user sentry360 were selected over the competition.
"In the retail space Sentry360 was selected as the megapixel camera of choice for Microsoft's Retail division. Sentry360 products were also chosen to secure several hundred natural gas fueling centers reducing their camera counts and improving while delivering forensic detail of license plates upon entrance and exits with our InSight 5 megapixel cameras and 360-degree coverage with our FullSight Omni-directional cameras."
For the complete interview with Mr. Thomas Carnevale, President and CEO, Sentry360: http://www.securitystockwatch.com/Interviews/in_Boardroom_Sentry360.html
For more information about Sentry360, please see these additional resources:
Sentry360 Blog: http://sentry360.wordpress.com
Sentry360 Partner Portal: Calculate Field-of-View, Image Quality & Storage/Bandwith along with tutorial and training videos we believe our portal is one of the most uniqe feature rich design tools for IP Video on the market and it's Free.
Sentry360 2012 Product Catalog: http://www.sentry360.com/files/Sentry360_Catalog_2012.pdf
Demonstration Videos: http://www.youtube.com/sentry360security
eSignSystems, a division of Wave Systems Corp., recently announced that CoreLogic® has launched AuthoSign, a comprehensive electronic document management and signing capability built upon eSignSystems technology. AuthoSign is a custom deployment of eSignSystems' SmartSAFE electronic signing and management software that has been integrated directly into IntelliMods, a complete loan modification decisioning solution from CoreLogic. CoreLogic is a leader in providing comprehensive data, analytics and services to financial services and real estate professionals.
CoreLogic provides tremendous time and cost savings through its automated and customizable loan modification decisioning and delivery solution. IntelliMods from CoreLogic can upload a single loan or an entire loan portfolio within minutes to qualify loan modifications, output documents, and send them to the borrower. This presents significant cost savings for the mortgage banking industry, which has completed more than 5.82 million permanent loan modifications since 2007 as reported by HOPE NOW.
The AuthoSign integration with IntelliMods shortens the loan modification process by several days, and even weeks, for significant time and cost savings over traditional paper-based loan modification decisioning systems. Additionally, AuthoSign tracks and creates action alerts for each individual participating in the mortgage process and hosts the entire signing ceremony online. Every transaction is logged for retrieval by IntelliMods, ensuring comprehensive tracking of every user and signer's activity within AuthoSign. Additionally, management of the entire process is even easier with the detailed tracking, compliance and alerts. This simplifies and speeds up the loan modification process, and keeps all stakeholders informed on the status of the loan modification decisioning and signings.
"CoreLogic is committed to increasing quality and reducing cost and turnaround time for our clients," said Sapan Bafna, Senior Director at CoreLogic. "By including the eSignSystems' technology as part of CoreLogic IntelliMods, we can offer our customers an easy to use and secure electronic SigningRoom. Plus, AuthoSign tracks electronic documents throughout their lifecycle, and creates an enforceable, legally-binding electronic record."
Maintaining an electronically signed record is essential to the integrity of a legally binding transaction. With AuthoSign, all records are verified and authenticated from eDelivery through eSignature and eRetention. This ensures that the access or signing credential (i.e., digital certificate, username or password) is verified and that the records remain free from tampering. Additionally, AuthoSign continuously updates the status of the loan modification's execution for real-time reporting.
AuthoSign also supports signer access to electronically signed documents as required by the ESIGN act. To meet the ESIGN act's legal and compliance requirements, users may access and print certified copies, while the actual archived, eSigned document is left untouched. Authorized individuals can manage, search, transfer and share electronic files, signed or unsigned, via the Web. All records are available to all interested parties in a secure and compliant environment.
"With the Treasury Department requiring a Single Point of Contact for all loan modifications, AuthoSign provides IntelliMods with a secure and compliant tool to manage, track and execute every aspect of the loan modification process, with audit trails from the beginning to the end of the transaction," said Kelly Purcell, EVP of eSignSystems. "CoreLogic even broke new ground as the first integrator to utilize a powerful new PDF text tagging feature of the SigningRoom, which expands their customers' ability to effectively identify and sign within PDF documents."
By integrating eSignSystems SmartSAFE technology into the IntelliMods loan modification decisioning solution, CoreLogic is providing better security and privacy for all parties involved in the transaction. In addition, traditional document transportation and storage costs are reduced dramatically, and the cycle time of loan modification is reduced by days or even weeks.
Wave Systems also recently announced that Scrambls for Enterprise (www.scrambls.com) was launched, giving organizations a means for their employees to safely collaborate over social media sites like Twitter® (www.Twitter.com) and Facebook (www.Facebook.com), and share files with cloud services like Dropbox (www.Dropbox.com) and Salesforce.com® (www.Salesforce.com). Scrambls protects data that is often overlooked in corporate security initiatives -- information shared online via social media, files stored in the cloud and data in motion.
Employees are free to leverage existing social media infrastructures to enter status updates, Tweets, blog posts, files and more, without jeopardizing security or privacy. Scrambls for Enterprise encrypts data before it ever leaves a user's computer or smartphone. Posts and files can only be viewed by those the enterprise grants permission to -- everyone else sees scrambled text.
"Social media and cloud services are expanding the way business is done, but enterprises need greater control of the information they share across the public web," commented Steven Sprague, scrambls co-creator and CEO of Wave Systems. "These services are often self-discovered by employees who use them to share critical information. Enterprises need to take responsibility for this new flow of data, and scrambls provides the privacy, security and audit controls similar to what you'd see with corporate email accounts."
The power of scrambls lies in the permissions granted to group members. To read a post or descramble a file, the service automatically applies the permission to make it readable again for only those individuals granted access. Business administrators set the policy and manage the groups. Add or remove people from the groups at any time to change who can read messages and files, even after they've been published on the web.
"Scrambls can open up new business opportunities with use cases for every type of vertical market," continued Sprague. "In healthcare, a private and protected channel for communication leads to better care and service. It's easy for doctors, social workers and caregivers to have sensitive discussions about the care of a family member in real time using popular tools like Twitter or Facebook. Those conversations remain private with scrambls."
For complete details about these announcements: http://www.wave.com/news/
For Wave Webcasts and Presentations: http://www.wave.com/news/webcasts.asp
For the Wave Blog: http://blog.wave.com/
For Wave Solutions: http://www.wave.com/solutions
For Wave Products: http://www.wave.com/products
For our exclusive interview with Mr. Steven Sprague, CEO and President of Wave Systems: http://www.securitystockwatch.com/Interviews/Conversation_WAVE_trusted.html
See Wave's "White Paper" Network Security: How to Defend an Infinitely Expanding Frontier: http://www.wave.com/collateral/03-000273_TPM-SED_whitepaper.pdf
For more information: www.wave.com (NASDAQ: WAVX)
PSA Security Network
Mr. Bill Bozeman, CPP, CHS, President/CEO, PSA Security Network, said, "PSA Security Network's Business Solutions (http://www.buypsa.com/Solutions) is a suite of value-added products, services and programs that help security professionals be more competitive in the marketplace. Each month, PSA President and CEO Bill Bozeman (http://www.buypsa.com/bbozeman) discusses a Business Solution in detail. This month we'll be focusing on Security Dealer Marketing (http://www.buypsa.com/Security-Dealer-Marketing).
SecurityStockWatch.com: What is Security Dealer Marketing's main focus?
Bill Bozeman: Security Dealer Marketing (SDM) focuses on creating brand awareness for and educating dealers and manufacturers on how marketing tools work, from collateral production to strategy deployment, to generate more recurring monthly revenue. They focus on generating results and creating services that work specifically for the security community.
SecurityStockWatch.com: What types of managed services are included with Security Dealer Marketing?
Bill Bozeman: They can help with any marketing questions or needs, from traditional design/print services to targeted online campaigns to comprehensive marketing strategy overhaul or development. Security Dealer Marketing works with many types of semi-custom website development packages, including Search Engine Optimization (SEO), Pay-Per-Click (PPC) and Google Analytics services. They also offer marketing support for point of sale materials, logo design or redesign, email marketing, social media campaigns and press releases.
SecurityStockWatch.com: How can Security Dealer Marketing help companies better their business?
Bill Bozeman: Security Dealer Marketing can handle the logistics and details of your marketing programs, allowing you to focus on other areas of your business. With years of expertise in security marketing, they eliminate the guess work. SDM has spent the last 15 years working with numerous large domestic brands, and they will that experience and use it to guide your company to get greater return on investment. They work with a number of PSA integrators and partners and we've been pleased with the partnership, service and results.
SecurityStockWatch.com: Where do I go to find more information or to start using Business Solutions?
Bill Bozeman: To learn more about Security Dealer Marketing (http://www.buypsa.com/Security-Dealer-Marketing) or any of the PSA Business Solutions programs, schedule a webinar demonstration, or get signed up, simply visit www.buyPSA.com/Solutions, call 303-450-3461, or email [email protected]. Additionally, all of PSA's trusted providers of Business Solutions will be at PSA-TEC 2013 (http://www.buypsa.com/Education/PSA-TEC), exhibiting on Wednesday, May 8, 2013. For the most up-to-date information on this event, visit http://www.psaTEC.com.
Security Industry Association
The Security Industry Association (SIA) Government Summit is an annual event that brings together government and industry leaders in the area of physical and electronic security. Attendees will enjoy an insightful, intimate environment where they can meet, speak with and network among our nation's leading policy makers, end-users and other relevant decision makers. Pulitzer-Prize winning journalist and best-selling author Bob Woodward will be the keynote speaker at this year's Government Summit, which will be held June 4-5, 2013. Those who register by Dec. 31, 2012 can save 50% off their registration fee; visit the SIA website to register today! (https://siamembers.siaonline.org/eweb/DynamicPage.aspx?WebCode=CSCEventInfoSC&evt_key=5addf3d8-5cc1-45c2-a330-cce8e650323b)
Imperial Capital Security Investor Conference
The Waldorf Astoria
301 Park Avenue New York, NY 10022
December 12-13, 2012
The Imperial Capital Security Investor Conference has grown to become the sector's premier annual event. Whether your firm specializes in cutting edge technology or traditional security systems, you will get a first-hand look at state-of-the-art solutions in the Enterprise, Residential and Homeland Security markets. Our 2012 Keynote Speaker Richard A. Clarke served in the Reagan, Clinton and both Bush administrations, was Special Advisor to the President on Cyber Security, a US counter-terrorism czar, and is the author of Cyber War.
You will hear from more than 60 leading Security companies -- the companies setting industry trends by leading innovation and delivering exceptional products & services and economic resilience. Gain a crucial edge in your market by learning how the Security industry is evolving into a critically integrated component of the business process.
- Access management teams driving the latest offerings tailored to the market's changing needs.
- Learn first-hand which companies will impact your business now and in the future.
- Hear how leading providers are responding to the current political and financial environment.
- Keep pace with strategic dynamics in the related M&A and Finance Markets.
Scheduled speakers include:
Jane Holl Lute, United States Deputy Secretary of Homeland Security
Richard Alan Clarke, Former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States
Robert J. Carey, Principal deputy Chief Information Officer, United States Department of Defense
Mark Weatherford (Invited), Deputy Under Secretary for Cybersecurity, National Protection and Programs Directorate (NPPD)
Bradley N. Rotter, Executive Chairman, AirPatrol Corporation
Adrian Turner, Founder & CEO, Mocana
By using our website and any information located at www.SecurityStockWatch.com you agree to these "Terms".
The Internet of Things (IoT) is going to require a new way of thinking and of developing software for speed, security and innovation. This requires IT leaders to balance business as usual while anticipating for the next market and technology trends. Cloud provides the right IT asset portfolio to help today’s IT leaders manage the old and prepare for the new. Today the cloud conversation is evolving from private and public to hybrid. This session will provide use cases and insights to reinforce the value of the network in helping organizations to maximize their company’s cloud experience.
Oct. 1, 2014 11:45 PM EDT Reads: 1,040
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water, are pursuing SmartGrid initiatives that represent one of the more mature examples of SAE. We have spoken with, or attended presentations from, utilities in the United States, South America, Asia and Europe. This session will provide a look at the CREPE drivers for SmartGrids and the solution spaces used by SmartGrids today and planned for the near future. All organizations can learn from SmartGrid’s use of Predictive Maintenance, Demand Prediction, Cloud, Big Data and Customer-facing Dashboards...
Oct. 1, 2014 11:45 PM EDT Reads: 875
IoT is still a vague buzzword for many people. In his session at Internet of @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, will discuss the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. The presentation will also discuss how IoT is perceived by investors and how venture capitalist access this space. Other topics to discuss are barriers to success, what is new, what is old, and what the future may hold.
Oct. 1, 2014 10:00 PM EDT Reads: 1,752
Whether you're a startup or a 100 year old enterprise, the Internet of Things offers a variety of new capabilities for your business. IoT style solutions can help you get closer your customers, launch new product lines and take over an industry. Some companies are dipping their toes in, but many have already taken the plunge, all while dramatic new capabilities continue to emerge. In his session at Internet of @ThingsExpo, Reid Carlberg, Senior Director, Developer Evangelism at salesforce.com, to discuss real-world use cases, patterns and opportunities you can harness today.
Oct. 1, 2014 08:30 PM EDT Reads: 2,161
All major researchers estimate there will be tens of billions devices – computers, smartphones, tablets, and sensors – connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be!
Oct. 1, 2014 05:00 PM EDT Reads: 2,376
Noted IoT expert and researcher Joseph di Paolantonio (pictured below) has joined the @ThingsExpo faculty. Joseph, who describes himself as an “Independent Thinker” from DataArchon, will speak on the topic of “Smart Grids & Managing Big Utilities.” Over his career, Joseph di Paolantonio has worked in the energy, renewables, aerospace, telecommunications, and information technology industries. His expertise is in data analysis, system engineering, Bayesian statistics, data warehouses, business intelligence, data mining, predictive methods, and very large databases (VLDB). Prior to DataArchon, he served as a VP and Principal Analyst with Constellation Group. He is a member of the Boulder (Colo.) Brain Trust, an organization with a mission “to benefit the Business Intelligence and data management industry by providing pro bono exchange of information between vendors and independent analysts on new trends and technologies and to provide vendors with constructive feedback on their of...
Oct. 1, 2014 03:30 PM EDT Reads: 1,018
Software AG helps organizations transform into Digital Enterprises, so they can differentiate from competitors and better engage customers, partners and employees. Using the Software AG Suite, companies can close the gap between business and IT to create digital systems of differentiation that drive front-line agility. We offer four on-ramps to the Digital Enterprise: alignment through collaborative process analysis; transformation through portfolio management; agility through process automation and integration; and visibility through intelligent business operations and big data.
Sep. 30, 2014 10:30 AM EDT Reads: 1,580
There will be 50 billion Internet connected devices by 2020. Today, every manufacturer has a propriety protocol and an app. How do we securely integrate these "things" into our lives and businesses in a way that we can easily control and manage? Even better, how do we integrate these "things" so that they control and manage each other so our lives become more convenient or our businesses become more profitable and/or safe? We have heard that the best interface is no interface. In his session at Internet of @ThingsExpo, Chris Matthieu, Co-Founder & CTO at Octoblu, Inc., will discuss how these devices generate enough data to learn our behaviors and simplify/improve our lives. What if we could connect everything to everything? I'm not only talking about connecting things to things but also systems, cloud services, and people. Add in a little machine learning and artificial intelligence and now we have something interesting...
Sep. 29, 2014 06:45 AM EDT Reads: 1,917
Last week, while in San Francisco, I used the Uber app and service four times. All four experiences were great, although one of the drivers stopped for 30 seconds and then left as I was walking up to the car. He must have realized I was a blogger. None the less, the next car was just a minute away and I suffered no pain. In this article, my colleague, Ved Sen, Global Head, Advisory Services Social, Mobile and Sensors at Cognizant shares his experiences and insights.
Sep. 28, 2014 09:45 AM EDT Reads: 1,559
We are reaching the end of the beginning with WebRTC and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will want to use their existing identities, but these will have credentials already that are (hopefully) irreversibly encoded. In his session at Internet of @ThingsExpo, Peter Dunkley, Technical Director at Acision, will look at how this identity problem can be solved and discuss ways to use existing web identities for real-time communication.
Sep. 27, 2014 11:30 PM EDT Reads: 1,939
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. It also ensured scalability and better service for customers, including MUY! Companies, one of the country's largest franchise restaurant companies with 232 Pizza Hut locations. This is one example of WebRTC adoption today, but the potential is limitless when powered by IoT. Attendees will learn real-world benefits of WebRTC and explore future possibilities, as WebRTC and IoT intersect to improve customer service.
Sep. 27, 2014 10:30 PM EDT Reads: 1,850
From telemedicine to smart cars, digital homes and industrial monitoring, the explosive growth of IoT has created exciting new business opportunities for real time calls and messaging. In his session at Internet of @ThingsExpo, Ivelin Ivanov, CEO and Co-Founder of Telestax, will share some of the new revenue sources that IoT created for Restcomm – the open source telephony platform from Telestax. Ivelin Ivanov is a technology entrepreneur who founded Mobicents, an Open Source VoIP Platform, to help create, deploy, and manage applications integrating voice, video and data. He is the co-founder of TeleStax, an Open Source Cloud Communications company that helps the shift from legacy IN/SS7 telco networks to IP-based cloud comms. An early investor in multiple start-ups, he still finds time to code for his companies and contribute to open source projects.
Sep. 27, 2014 10:30 PM EDT Reads: 2,315
The Internet of Things (IoT) promises to create new business models as significant as those that were inspired by the Internet and the smartphone 20 and 10 years ago. What business, social and practical implications will this phenomenon bring? That's the subject of "Monetizing the Internet of Things: Perspectives from the Front Lines," an e-book released today and available free of charge from Aria Systems, the leading innovator in recurring revenue management.
Sep. 27, 2014 09:45 PM EDT Reads: 2,537
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges.
Sep. 27, 2014 08:45 PM EDT Reads: 2,406
There’s Big Data, then there’s really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at 6th Big Data Expo®, Hannah Smalltree, Director at Treasure Data, to discuss how IoT, Big Data and deployments are processing massive data volumes from wearables, utilities and other machines.
Sep. 27, 2014 01:00 PM EDT Reads: 2,078
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at Internet of @ThingsExpo, Erik Lagerway, Co-founder of Hookflash, will walk through the shifting landscape of traditional telephone and voice services to the modern P2P RTC era of OTT cloud assisted services.
Sep. 26, 2014 11:45 PM EDT Reads: 1,602
While great strides have been made relative to the video aspects of remote collaboration, audio technology has basically stagnated. Typically all audio is mixed to a single monaural stream and emanates from a single point, such as a speakerphone or a speaker associated with a video monitor. This leads to confusion and lack of understanding among participants especially regarding who is actually speaking. Spatial teleconferencing introduces the concept of acoustic spatial separation between conference participants in three dimensional space. This has been shown to significantly improve comprehension and conference efficiency.
Sep. 26, 2014 10:45 PM EDT Reads: 1,522
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, will discuss single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example to explain some of these concepts including when to use different storage models.
Sep. 26, 2014 07:45 PM EDT Reads: 2,335
SYS-CON Events announced today that Gridstore™, the leader in software-defined storage (SDS) purpose-built for Windows Servers and Hyper-V, will exhibit at SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Gridstore™ is the leader in software-defined storage purpose built for virtualization that is designed to accelerate applications in virtualized environments. Using its patented Server-Side Virtual Controller™ Technology (SVCT) to eliminate the I/O blender effect and accelerate applications Gridstore delivers vmOptimized™ Storage that self-optimizes to each application or VM across both virtual and physical environments. Leveraging a grid architecture, Gridstore delivers the first end-to-end storage QoS to ensure the most important App or VM performance is never compromised. The storage grid, that uses Gridstore’s performance optimized nodes or capacity optimized nodes, starts with as few a...
Sep. 26, 2014 06:15 PM EDT Reads: 1,715
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace. These technological reforms have not only changed computers and smartphones, but are also changing the data processing model for all information devices. In particular, in the area known as M2M (Machine-To-Machine), there are great expectations that information with a new type of value can be produced using a variety of devices and sensors saving/sharing data via the network and through large-scale cloud-type data processing. This consortium believes that attaching a huge number of devic...
Sep. 26, 2014 06:00 PM EDT Reads: 1,629