Click here to close now.



Welcome!

Agile Computing Authors: Nicholas Lee, Ian Khan, Jayaram Krishnaswamy, Elizabeth White, Cloud Best Practices Network

News Feed Item

Cisco, CyberLock, Dove Net, ImageWare, Keyscan, Keep Your IP, Sentry360, Wave Systems and Bill Bozeman -- PSA Security Network, Discuss Security Solutions

RYE BROOK, NY -- (Marketwire) -- 12/11/12 -- ImageWare Systems (OTCQB: IWSY), Wave Systems (NASDAQ: WAVX)

Cisco
Mrs. Ulrica de-Fort Menares, Director of Product Management for Cisco Medianet, told us, "An intelligent network must become more application-savvy. It must have the ability to determine the importance of a session based on its business value, and treat the session accordingly, end to end. One of the key medianet characteristics is its ability to become media-aware. Imagine this: The network can discover the type of endpoint and automatically configure the switch port for that type of device. This ability to plug and play any endpoint in the network is an example of tight integration between an intelligent network and an endpoint."

For the complete interview: www.securitystockwatch.com/Interviews/in_Boardroom_Cisco_UFM.html

For more information: http://www.cisco.com/go/medianet, http://blogs.cisco.com/category/video

********

CyberLock

Videx, Inc., announced a new version of the CyberKey Vault 20, the CyberKey Vault 20 FX. The redesign features a sleek new look with weatherized input modules and an embedded Flex System Hub for improved performance, all offered at a new, lower price.

"The CyberKey Vault 20 FX is our most advanced key control cabinet (http://www.videx.com/cyberkey-vaults.html) yet," said James McGowan, VP of Sales and Marketing at Videx. "We built on the award winning original design and added extra durability and speed to meet the needs of today's demanding end-users. We believe it will surpass market expectations."

The Vault 20 FX is an intelligent key cabinet designed to manage, program, and dispense CyberKey smart keys. The keys are stored unprogrammed and locked securely in the cabinet until an RFID card and/or PIN code is presented to the cabinet. After reading the card and/or accepting the PIN, the CyberKey Vault programs a CyberKey with the individual's permissions. Keys are programmed with access privileges for each user, detailing which electronic locks (http://www.videx.com/cyberlock_cylinders.html) it can open and when. An audit record of all events is stored in both the locks and the keys. Each time a key is used at a lock, a record of the lock ID, date, and time is stored in the key, and a record of the key ID, date, and time is stored in the lock.

CyberKeys feature a unique electronic ID, preventing duplication. Although two keys can be programmed alike, each one leaves its own unique record within the system. When the key is returned to the Vault, the Vault downloads the key's audit trail, removes its permissions, and begins charging the key.

Videx offers three robust smart key vaults: CyberKey Vault 1, CyberKey Vault 20 FX, and CyberKey Vault WR. To learn more about the CyberLock line of access control (http://www.videx.com/cyberlock_overview.html) products, please visit our website at www.cyberlock.com.

For more information about CyberLock products: http://www.cyberlock.com/cyberlock_products.html.

For the complete interview with Mr. James McGowan, V.P. of Sales and Marketing, Videx:
www.securitystockwatch.com/Interviews/in_Boardroom_VIDEX.html

For CyberLock News & Events:
www.cyberlock.com/news_events.html

For the CyberLock Solutions Center:
www.cyberlock.com/solutions_center.html

For more information:
http://www.cyberlock.com

********

Dove Net Technologies

Mr. Tony Nasca, Dove Net Technologies, said, "The Project System is the Complete Business Computer System for Contractors and Integrators. Companies that install: sound systems, nurse call systems, fire alarm systems, computer cabling, burglar systems, cctv, video systems, and systems contracting in general. Other companies that are using Project include Video Wholesale Distributors, Audio Visual Specialists, Video & Film Duplicators, Telephone System Specialists, and more". The major benefit that The Project System brings to the table is the that The Project System has been written in such a way that the software understands the business needs of these different industries and provide tools and feature sets to aid the contractor in running his business better. The most important aspect of The Project System is that The Project System provides a process flow to organize the company so that there is a standard process for quotes using Dove Net supplied Manufacturers Price Lists. You can also import your own price lists into The Project System."

For the complete interview: http://www.securitystockwatch.com/Interviews/in_Boardroom_DNT.html

Dove Net Clients Rave About The Project System: http://www.dovenet.com/clients.htm

For a Dove Net Demo: http://www.dovenet.com/project2.htm

For more information about The Project System: http://www.dovenet.com/projectwin.htm

For more information: www.DoveNet.com

********

ImageWare Systems

ImageWare Systems recently announced, "In addition to product development, ImageWare has been preparing for a major international deployment as the exclusive provider of biometric identity management for a prime contractor installing cargo scanning security at the Republic of Ecuador's major seaports. The initial deployment is currently scheduled to begin in the early part of 2013 at the Port of Guayaquil, the country's main seaport that handles a majority of its imports and exports. ImageWare expects to receive a fee for every port worker receiving credentials, as well as an annual management and maintenance fee, based on a percentage of the initial credentialing cost per worker. Depending upon the number of enrollees, the company expects the contract value to exceed $3.0 million over its seven year term.

"The high-end biometric secure credentialing solution we are providing for Ecuador is the same technology being deployed for the Los Angeles World Airports, which we announced earlier this year," noted Jim Miller, Chairman and CEO. "In fact, we can easily replicate this platform for virtually any port system that needs transportation worker identification cards in order to comply with the SAFE Port Act. Not only are our solutions easily deployable, for ImageWare they generally represent gross margins above 70% as well as a recurring revenue stream. Our unique patented technology has the potential to provide us strong, steady revenue growth, along with excellent forward-looking visibility."

For the complete interview with Jim Miller, ImageWare Systems, Chairman and CEO: www.securitystockwatch.com/Interviews/in_Boardroom_IMW.html

For more information about ImageWare Systems Solutions: http://www.iwsinc.com/solutions.cfm and ImageWare Systems Products: http://www.iwsinc.com/SecureCredentials.cfm

For ImageWare Systems Investors: http://www.iwsinc.com/investors.cfm

For more information: www.iwsinc.com, (OTCQB: IWSY)

********

Keyscan Access Control Systems

Keyscan Access Control Systems recently announced that its' next generation communication module, the CIM (Communications Interlink Module), is now available.

The Keyscan CIM is a new communication control module designed to use a CAN Bus communication network to provide optimized server to Access Control Unit (ACU) communication as well as give users an all new ACU to ACU network permitting inter-panel communication for global functions including anti-passback, global input/output and global time zones.

"The Keyscan CIM is just another example of Keyscan Access Control Systems' commitment to innovation and quality. It is the new communication standard for Keyscan and opens up a host of new features as well as enhancements especially for global communication," says Steve Dentinger, Keyscan Director of Sales and Marketing.

The Keyscan CIM utilizes a Controller Area Network (CAN) Bus infrastructure to establish a communication network among multiple ACUs as well ACUs and a host server. The capabilities of CAN already surpass those of other serial communication technologies. But, Keyscan didn't stop there.

Keyscan CIM combines the robust CAN Bus protocol with a hardware interface that is superior to the standard commercial-grade CAN Bus. It is a fully isolated CAN Bus using high speed digital isolation devices that separates ground reference of the CIM and ACU from the ground reference of the CAN Bus transceiver. This reduces problems found when there is a difference in ground potential between units. This is often observed in multi-building installations or in poor grounding conditions.

This isolation further protects the CIM, and connected ACU, from lightning strikes or electrical surges reducing the occurrence of module failure. It also ensures a single unpowered CIM cannot adversely affect the data of the CAN Bus.

A common-mode filtering at the CAN Bus transceiver reduces ground referenced noise from the CAN Bus which improves signal quality reducing bit errors and bus faults. DC biased termination resistors provide the necessary termination of the CAN Bus cabling but also ensure the full potential of the CAN Bus signal is utilized. In addition to providing server to ACU and global inter-panel communication, the Keyscan CIM also includes impressive new features including ground loop protection, enhanced device-based diagnostic capabilities, improved speed and unprecedented reliability.

"The Keyscan CIM offers new features, enhancements and possibilities, especially when it comes to global communications," Dentinger continued.

"It changes the dynamics of Keyscan ACU to ACU and ACU to server communication and forms a new foundation for global communication. And, once again, demonstrates how Keyscan offers access control systems without limits; and innovation without boundaries."

We invite you to learn more about the new Communication Interlink Module and our family of access control units. Click here to visit our website www.keyscan.ca

For the complete interview with Mr. Steve Dentinger, Keyscan Director of Sales and Marketing: http://www.securitystockwatch.com/Interviews/in_Boardroom_Keyscan.html

For the Keyscan Corporate Video: http://www.keyscan.ca/video.html

For Keyscan Case Studies: http://www.keyscan.ca/casestudies.html

For more information: www.Keyscan.ca

********

KEEP YOUR IP

Keep Your IP recently announced their cooperation with global standards provider, UL (Underwriters Laboratories) in an attempt to expand the scope of several of their standards and categories wherein the Keep Your IP line of IP forwarding services can become certified.

At present, UL's Certification of Alarm Services is specific to protected properties and has some limits. These limits include the aspects of the telecommunications infrastructure within the service. UL Alarm Service Certificates currently specify that their Certificates do not apply to the communications channel between the protected property and any facility that monitors signals from the protected property.

Keep Your IP's service, and its supporting hardware, lie in the communications channel between protected property and the monitoring facility which presently puts it outside the scope of UL's Certification.

Davin Roos, President of KYI, Inc., says, "We are very excited to assist UL in establishing a category that will address new technological advancements on communications within the alarm industry."

"Today's technology makes it possible for innovators to deliver an amazing array of new and beneficial services. Helping organizations bring those services into the market in a way that preserves the integrity of the public's security is a big part of UL's mission." stated Steve Schmit, Engineering Manager at UL LLC out of Northbrook, IL. "We look forward to working with Keep Your IP and the entire industry on Certification solutions that bring trust and confidence to all stakeholders."

UL has confirmed that an alarm company's use of the Keep Your IP service would not impact their Listing or Certification status in any way.

To that end, UL has communicated their desire to better accommodate the rapidly changing communications infrastructure and hope to have an offering that fits the Keep Your IP product in the not too distant future, possibly as early as the first quarter of 2013.

Keep Your IP also recently announced a major reseller agreement with COPS Monitoring, one of the country's largest wholesale monitoring companies.

KYI, Inc. and COPS Monitoring have signed an agreement wherein COPS will offer the complete lineup of Keep Your IP services to their approximately 3,500 dealers.

Keep Your IP is considered the industry's first and only internet IPv4 forwarding service designed exclusively for the alarm industry. Keep Your IP services will be both a tool to increase value for the alarm dealer by giving them better control over of their accounts as well as critical IP disaster recovery support service for the Central Station.

Davin Roos, president of KYI, Inc., says, "By providing alarm professionals with their own secure IPv4 numbered address, they get the peace of mind of knowing that as their business grows and merges into the new internet IP based world, they will be able to direct that growth as they desire."

"COPS Monitoring continually searches for ways to offer leading-edge services to help our dealers prosper," added Jim McMullen, President and COO of COPS Monitoring. "We are proud to offer Keep Your IP's services and we're confident that our dealers will see the advantages of having the flexibility and assurances they can offer."

For the complete interview with Davin Roos, President of KYI: http://www.securitystockwatch.com/Interviews/in_Boardroom_KYIP.html

For more information about Keep Your IP and "How It Works": https://www.keepyourip.com/how_it_works

For Keep Your IP FAQ's: https://www.keepyourip.com/faqs
www.KeepYourIP.com

********

Sentry360

Mr. Thomas Carnevale, President and CEO, Sentry360, told us, "2012 brought several exciting flagship projects and record deployments for Oil and Gas, transportation & retail markets. All of Sentry360's cameras are securing JFK Airport Terminal 1. After an extensive product evaluation cycle by the end-user sentry360 were selected over the competition.

"In the retail space Sentry360 was selected as the megapixel camera of choice for Microsoft's Retail division. Sentry360 products were also chosen to secure several hundred natural gas fueling centers reducing their camera counts and improving while delivering forensic detail of license plates upon entrance and exits with our InSight™ 5 megapixel cameras and 360-degree coverage with our FullSight™ Omni-directional cameras."

For the complete interview with Mr. Thomas Carnevale, President and CEO, Sentry360: http://www.securitystockwatch.com/Interviews/in_Boardroom_Sentry360.html

For more information about Sentry360, please see these additional resources:
Sentry360 Blog: http://sentry360.wordpress.com

Sentry360 Partner Portal: Calculate Field-of-View, Image Quality & Storage/Bandwith along with tutorial and training videos we believe our portal is one of the most uniqe feature rich design tools for IP Video on the market and it's Free.
http://sentry360.com/Partner/login.html#toregister

Sentry360 2012 Product Catalog: http://www.sentry360.com/files/Sentry360_Catalog_2012.pdf

Demonstration Videos: http://www.youtube.com/sentry360security

www.Sentry360.com

********

WAVE SYSTEMS

eSignSystems, a division of Wave Systems Corp., recently announced that CoreLogic® has launched AuthoSign™, a comprehensive electronic document management and signing capability built upon eSignSystems technology. AuthoSign is a custom deployment of eSignSystems' SmartSAFE electronic signing and management software that has been integrated directly into IntelliMods™, a complete loan modification decisioning solution from CoreLogic. CoreLogic is a leader in providing comprehensive data, analytics and services to financial services and real estate professionals.

CoreLogic provides tremendous time and cost savings through its automated and customizable loan modification decisioning and delivery solution. IntelliMods from CoreLogic can upload a single loan or an entire loan portfolio within minutes to qualify loan modifications, output documents, and send them to the borrower. This presents significant cost savings for the mortgage banking industry, which has completed more than 5.82 million permanent loan modifications since 2007 as reported by HOPE NOW.

The AuthoSign integration with IntelliMods shortens the loan modification process by several days, and even weeks, for significant time and cost savings over traditional paper-based loan modification decisioning systems. Additionally, AuthoSign tracks and creates action alerts for each individual participating in the mortgage process and hosts the entire signing ceremony online. Every transaction is logged for retrieval by IntelliMods, ensuring comprehensive tracking of every user and signer's activity within AuthoSign. Additionally, management of the entire process is even easier with the detailed tracking, compliance and alerts. This simplifies and speeds up the loan modification process, and keeps all stakeholders informed on the status of the loan modification decisioning and signings.

"CoreLogic is committed to increasing quality and reducing cost and turnaround time for our clients," said Sapan Bafna, Senior Director at CoreLogic. "By including the eSignSystems' technology as part of CoreLogic IntelliMods, we can offer our customers an easy to use and secure electronic SigningRoom. Plus, AuthoSign tracks electronic documents throughout their lifecycle, and creates an enforceable, legally-binding electronic record."

Maintaining an electronically signed record is essential to the integrity of a legally binding transaction. With AuthoSign, all records are verified and authenticated from eDelivery through eSignature and eRetention. This ensures that the access or signing credential (i.e., digital certificate, username or password) is verified and that the records remain free from tampering. Additionally, AuthoSign continuously updates the status of the loan modification's execution for real-time reporting.

AuthoSign also supports signer access to electronically signed documents as required by the ESIGN act. To meet the ESIGN act's legal and compliance requirements, users may access and print certified copies, while the actual archived, eSigned document is left untouched. Authorized individuals can manage, search, transfer and share electronic files, signed or unsigned, via the Web. All records are available to all interested parties in a secure and compliant environment.

"With the Treasury Department requiring a Single Point of Contact for all loan modifications, AuthoSign provides IntelliMods with a secure and compliant tool to manage, track and execute every aspect of the loan modification process, with audit trails from the beginning to the end of the transaction," said Kelly Purcell, EVP of eSignSystems. "CoreLogic even broke new ground as the first integrator to utilize a powerful new PDF text tagging feature of the SigningRoom, which expands their customers' ability to effectively identify and sign within PDF documents."

By integrating eSignSystems SmartSAFE technology into the IntelliMods loan modification decisioning solution, CoreLogic is providing better security and privacy for all parties involved in the transaction. In addition, traditional document transportation and storage costs are reduced dramatically, and the cycle time of loan modification is reduced by days or even weeks.

Wave Systems also recently announced that Scrambls for Enterprise (www.scrambls.com) was launched, giving organizations a means for their employees to safely collaborate over social media sites like Twitter® (www.Twitter.com) and Facebook (www.Facebook.com), and share files with cloud services like Dropbox™ (www.Dropbox.com) and Salesforce.com® (www.Salesforce.com). Scrambls protects data that is often overlooked in corporate security initiatives -- information shared online via social media, files stored in the cloud and data in motion.

Employees are free to leverage existing social media infrastructures to enter status updates, Tweets, blog posts, files and more, without jeopardizing security or privacy. Scrambls for Enterprise encrypts data before it ever leaves a user's computer or smartphone. Posts and files can only be viewed by those the enterprise grants permission to -- everyone else sees scrambled text.

"Social media and cloud services are expanding the way business is done, but enterprises need greater control of the information they share across the public web," commented Steven Sprague, scrambls co-creator and CEO of Wave Systems. "These services are often self-discovered by employees who use them to share critical information. Enterprises need to take responsibility for this new flow of data, and scrambls provides the privacy, security and audit controls similar to what you'd see with corporate email accounts."

The power of scrambls lies in the permissions granted to group members. To read a post or descramble a file, the service automatically applies the permission to make it readable again for only those individuals granted access. Business administrators set the policy and manage the groups. Add or remove people from the groups at any time to change who can read messages and files, even after they've been published on the web.

"Scrambls can open up new business opportunities with use cases for every type of vertical market," continued Sprague. "In healthcare, a private and protected channel for communication leads to better care and service. It's easy for doctors, social workers and caregivers to have sensitive discussions about the care of a family member in real time using popular tools like Twitter or Facebook. Those conversations remain private with scrambls."

For complete details about these announcements: http://www.wave.com/news/

For Wave Webcasts and Presentations: http://www.wave.com/news/webcasts.asp

For the Wave Blog: http://blog.wave.com/

For Wave Solutions: http://www.wave.com/solutions

For Wave Products: http://www.wave.com/products

For our exclusive interview with Mr. Steven Sprague, CEO and President of Wave Systems: http://www.securitystockwatch.com/Interviews/Conversation_WAVE_trusted.html

See Wave's "White Paper" Network Security: How to Defend an Infinitely Expanding Frontier: http://www.wave.com/collateral/03-000273_TPM-SED_whitepaper.pdf

For more information: www.wave.com (NASDAQ: WAVX)

********

PSA Security Network

Mr. Bill Bozeman, CPP, CHS, President/CEO, PSA Security Network, said, "PSA Security Network's Business Solutions (http://www.buypsa.com/Solutions) is a suite of value-added products, services and programs that help security professionals be more competitive in the marketplace. Each month, PSA President and CEO Bill Bozeman (http://www.buypsa.com/bbozeman) discusses a Business Solution in detail. This month we'll be focusing on Security Dealer Marketing (http://www.buypsa.com/Security-Dealer-Marketing).

SecurityStockWatch.com: What is Security Dealer Marketing's main focus?
Bill Bozeman:
Security Dealer Marketing (SDM) focuses on creating brand awareness for and educating dealers and manufacturers on how marketing tools work, from collateral production to strategy deployment, to generate more recurring monthly revenue. They focus on generating results and creating services that work specifically for the security community.

SecurityStockWatch.com: What types of managed services are included with Security Dealer Marketing?
Bill Bozeman:
They can help with any marketing questions or needs, from traditional design/print services to targeted online campaigns to comprehensive marketing strategy overhaul or development. Security Dealer Marketing works with many types of semi-custom website development packages, including Search Engine Optimization (SEO), Pay-Per-Click (PPC) and Google Analytics services. They also offer marketing support for point of sale materials, logo design or redesign, email marketing, social media campaigns and press releases.

SecurityStockWatch.com: How can Security Dealer Marketing help companies better their business?
Bill Bozeman:
Security Dealer Marketing can handle the logistics and details of your marketing programs, allowing you to focus on other areas of your business. With years of expertise in security marketing, they eliminate the guess work. SDM has spent the last 15 years working with numerous large domestic brands, and they will that experience and use it to guide your company to get greater return on investment. They work with a number of PSA integrators and partners and we've been pleased with the partnership, service and results.

SecurityStockWatch.com: Where do I go to find more information or to start using Business Solutions?
Bill Bozeman:
To learn more about Security Dealer Marketing (http://www.buypsa.com/Security-Dealer-Marketing) or any of the PSA Business Solutions programs, schedule a webinar demonstration, or get signed up, simply visit www.buyPSA.com/Solutions, call 303-450-3461, or email [email protected]. Additionally, all of PSA's trusted providers of Business Solutions will be at PSA-TEC 2013 (http://www.buypsa.com/Education/PSA-TEC), exhibiting on Wednesday, May 8, 2013. For the most up-to-date information on this event, visit http://www.psaTEC.com.

********

Security Industry Association

https://www.siaonline.org/

The Security Industry Association (SIA) Government Summit is an annual event that brings together government and industry leaders in the area of physical and electronic security. Attendees will enjoy an insightful, intimate environment where they can meet, speak with and network among our nation's leading policy makers, end-users and other relevant decision makers. Pulitzer-Prize winning journalist and best-selling author Bob Woodward will be the keynote speaker at this year's Government Summit, which will be held June 4-5, 2013. Those who register by Dec. 31, 2012 can save 50% off their registration fee; visit the SIA website to register today! (https://siamembers.siaonline.org/eweb/DynamicPage.aspx?WebCode=CSCEventInfoSC&evt_key=5addf3d8-5cc1-45c2-a330-cce8e650323b)

********

Imperial Capital Security Investor Conference
The Waldorf Astoria
301 Park Avenue New York, NY 10022
December 12-13, 2012
http://www.securityinvestorconference.com/

The Imperial Capital Security Investor Conference has grown to become the sector's premier annual event. Whether your firm specializes in cutting edge technology or traditional security systems, you will get a first-hand look at state-of-the-art solutions in the Enterprise, Residential and Homeland Security markets. Our 2012 Keynote Speaker Richard A. Clarke served in the Reagan, Clinton and both Bush administrations, was Special Advisor to the President on Cyber Security, a US counter-terrorism czar, and is the author of Cyber War.

You will hear from more than 60 leading Security companies -- the companies setting industry trends by leading innovation and delivering exceptional products & services and economic resilience. Gain a crucial edge in your market by learning how the Security industry is evolving into a critically integrated component of the business process.

  • Access management teams driving the latest offerings tailored to the market's changing needs.
  • Learn first-hand which companies will impact your business now and in the future.
  • Hear how leading providers are responding to the current political and financial environment.
  • Keep pace with strategic dynamics in the related M&A and Finance Markets.

Scheduled speakers include:
Jane Holl Lute, United States Deputy Secretary of Homeland Security

Richard Alan Clarke, Former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States

Robert J. Carey, Principal deputy Chief Information Officer, United States Department of Defense

Mark Weatherford (Invited), Deputy Under Secretary for Cybersecurity, National Protection and Programs Directorate (NPPD)

Bradley N. Rotter, Executive Chairman, AirPatrol Corporation

Adrian Turner, Founder & CEO, Mocana

********

Please read our Terms of Use, Conditions and Disclaimers ("Terms"): http://www.securitystockwatch.com/Main/Terms_of_Use.html.
By using our website and any information located at www.SecurityStockWatch.com you agree to these "Terms".

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@ThingsExpo Stories
As enterprises work to take advantage of Big Data technologies, they frequently become distracted by product-level decisions. In most new Big Data builds this approach is completely counter-productive: it presupposes tools that may not be a fit for development teams, forces IT to take on the burden of evaluating and maintaining unfamiliar technology, and represents a major up-front expense. In his session at @BigDataExpo at @ThingsExpo, Andrew Warfield, CTO and Co-Founder of Coho Data, will dis...
SYS-CON Events announced today that Fusion, a leading provider of cloud services, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Fusion, a leading provider of integrated cloud solutions to small, medium and large businesses, is the industry's single source for the cloud. Fusion's advanced, proprietary cloud service platform enables the integration of leading edge solutions in the cloud, including clou...
With the Apple Watch making its way onto wrists all over the world, it’s only a matter of time before it becomes a staple in the workplace. In fact, Forrester reported that 68 percent of technology and business decision-makers characterize wearables as a top priority for 2015. Recognizing their business value early on, FinancialForce.com was the first to bring ERP to wearables, helping streamline communication across front and back office functions. In his session at @ThingsExpo, Kevin Roberts...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management...
SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful...
SYS-CON Events announced today that VAI, a leading ERP software provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. VAI (Vormittag Associates, Inc.) is a leading independent mid-market ERP software developer renowned for its flexible solutions and ability to automate critical business functions for the distribution, manufacturing, specialty retail and service sectors. An IBM Premier Business Part...
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, will provide an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profes...
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, will discuss the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filte...
Fortunately, meaningful and tangible business cases for IoT are plentiful in a broad array of industries and vertical markets. These range from simple warranty cost reduction for capital intensive assets, to minimizing downtime for vital business tools, to creating feedback loops improving product design, to improving and enhancing enterprise customer experiences. All of these business cases, which will be briefly explored in this session, hinge on cost effectively extracting relevant data from ...
SYS-CON Events announced today that Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centers, 14 virtual data centers and 31 colocation centers, with connections to 195 ad...
Most people haven’t heard the word, “gamification,” even though they probably, and perhaps unwittingly, participate in it every day. Gamification is “the process of adding games or game-like elements to something (as a task) so as to encourage participation.” Further, gamification is about bringing game mechanics – rules, constructs, processes, and methods – into the real world in an effort to engage people. In his session at @ThingsExpo, Robert Endo, owner and engagement manager of Intrepid D...
Eighty percent of a data scientist’s time is spent gathering and cleaning up data, and 80% of all data is unstructured and almost never analyzed. Cognitive computing, in combination with Big Data, is changing the equation by creating data reservoirs and using natural language processing to enable analysis of unstructured data sources. This is impacting every aspect of the analytics profession from how data is mined (and by whom) to how it is delivered. This is not some futuristic vision: it's ha...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Learn how IoT, cloud, social networks and last but not least, humans, can be integrated into a seamless integration of cooperative organisms both cybernetic and biological. This has been enabled by recent advances in IoT device capabilities, messaging frameworks, presence and collaboration services, where devices can share information and make independent and human assisted decisions based upon social status from other entities. In his session at @ThingsExpo, Michael Heydt, founder of Seamless...
The IoT's basic concept of collecting data from as many sources possible to drive better decision making, create process innovation and realize additional revenue has been in use at large enterprises with deep pockets for decades. So what has changed? In his session at @ThingsExpo, Prasanna Sivaramakrishnan, Solutions Architect at Red Hat, discussed the impact commodity hardware, ubiquitous connectivity, and innovations in open source software are having on the connected universe of people, thi...
WebRTC: together these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at WebRTC Summit, Cary Bran, VP of Innovation and New Ventures at Plantronics and PLT Labs, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it may enable, complement or entirely transform.
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, showed how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants received the download information, scripts, and complete end-t...
For manufacturers, the Internet of Things (IoT) represents a jumping-off point for innovation, jobs, and revenue creation. But to adequately seize the opportunity, manufacturers must design devices that are interconnected, can continually sense their environment and process huge amounts of data. As a first step, manufacturers must embrace a new product development ecosystem in order to support these products.
Manufacturing connected IoT versions of traditional products requires more than multiple deep technology skills. It also requires a shift in mindset, to realize that connected, sensor-enabled “things” act more like services than what we usually think of as products. In his session at @ThingsExpo, David Friedman, CEO and co-founder of Ayla Networks, discussed how when sensors start generating detailed real-world data about products and how they’re being used, smart manufacturers can use the dat...
When it comes to IoT in the enterprise, namely the commercial building and hospitality markets, a benefit not getting the attention it deserves is energy efficiency, and IoT’s direct impact on a cleaner, greener environment when installed in smart buildings. Until now clean technology was offered piecemeal and led with point solutions that require significant systems integration to orchestrate and deploy. There didn't exist a 'top down' approach that can manage and monitor the way a Smart Buildi...