Saturday, May 28, 2016

Detachable cabin invented to save lives during plane crashes

A way of saving lives in plane crashes has been conceived, after an inventor released designs for a detachable cabin.

The technology was invented by Tatarenko Vladimir Nikolaevich, who has been working on the project for the past three years. The video above demonstrates exactly how it would work during in-flight emergency situations.

It consists of a detachable cabin that could be ejected at any time during take off, mid-flight or landing and allow the passengers to land safely.

READ MORE
Airline tickets hit lowest price in three years
MH370 search team unearth 19th century shipwreck in ocean
Teenager invents system to stop germs travelling around planes
Due to parachutes attached to the cabin, which would automatically open once the lower capsule is separated from the aircraft, passengers could land safely on water or on the ground.

The prototype also includes storage space designed to hold luggage under the cabin, so that passengers wouldn’t lose any of their personal belongings.
Viewers have had mixed reactions to the innovation, with some supporting the idea but others considering it impractical.

Questions have been raised over the potential impact on the rest of the plane, the possibility of the detached cabin crashing against mountains or buildings before landing and the fate of the pilots.

Friday, May 27, 2016

Best Masticating / Wheatgrass Juicer 2016

#1. Tribest Masticating Juicer
#2. Kuvings Masticating Juicer
#3. Omega Masticating Juicer

Thursday, May 26, 2016

Hottest Tech Gifts Gadgets and Ideas for 2016

UPDATE: 04/03/2016

After checking out all these amazing tech toys, gadgets and gift idea at the 2016 Consumer Electronics Show aka CES 2016, we took a couple months playing, testing and putting them through the ringer to make sure they held our attention for longer than a Hollywood agents. These were the main ones out of nearly one hundred that we tested that we feel are the hottest and best technology gifts for 2016.
ech Gifts Gadgets and Ideas for 2016

Hottest Tech Gifts Gadgets and Ideas for 2016 images

UPDATE: 04/03/2016

After checking out all these amazing tech toys, gadgets and gift idea at the 2016 Consumer Electronics Show aka CES 2016, we took a couple months playing, testing and putting them through the ringer to make sure they held our attention for longer than a Hollywood agents. These were the main ones out of nearly one hundred that we tested that we feel are the hottest and best technology gifts for 2016.

sensorwake best tech gifts of 2016 images

Imagine waking up to the smell of coffee, peppermint or even the smell of the ocean and not to the blaring sound of your run-of-the-mill alarm clock. You can’t say ‘five more minutes’ to coffee can you? Well you can stop imagining because that technology is now here and is one of the hottest, innovative pieces of technology from the Consumer Electronics Show or CES 2016. Some of these technologies will eventually make their way to our homes, some won’t but hopefully Sensorwake makes it mainstream.

Sensorwake is an alarm clock that wakes you up, not with some noise but with scents most people love. It can be put out of reach but close enough to coax you into waking up without giving you a headache. Many can’t resist the smell of coffee, toast, croissants and peppermints in the morning. The scents are contained in replaceable, interchangeable capsules so owners don’t get too desensitized to just one smell. Sensorwake is from the clever mind of Guillaume Rolland and was funded through KickStarter and has made its way to CES 2016. It’s cool, innovative but a bit disappointing that coffee and croissants aren’t actually waiting for you when you get out of bed. When the device runs out of capsules, it can still wake you up with a sound alarm wherein you can negotiate for five more minutes.
Now imagine Amazon actually delivering your orders through their drone delivery project. That would be cool. Now imagine a bigger drone which will deliver someone who will sing your happy birthday message to grandma, or have yourself delivered to a meeting. Yes, a drone can get big enough to carry someone and a Chinese company called Ehang actually came up with one. The drone is an attractive-looking one-seater cab with gull-wing doors and surrounded with four arms with rotors. It looks like a conventional quadcopter drone except bigger. The Ehang 184 has enough power to carry a single passenger for up to 23 minutes at a speed of 60 miles per hour. Control will be done by remote so it’s a bit disconcerting for the lonely passenger not to have some form of control. It’s not exactly airworthy but it’s a viable proof of concept. If this thing takes off, it’s goodbye traffic.

Wednesday, May 25, 2016

Android-powered laptops reportedly coming next year with help from Google

Rumor has it Google will fold its Chrome OS into Android as soon as 2017, but the company could kick off the transition even sooner. A new report claims the search giant will work with hardware partners to produce Android laptops starting next year.

According to Re/code and its anonymous sources, Google won’t force any companies to abandon Chrome OS for now. Starting next year laptop-makers will be able to choose between Chrome OS and Android. An earlier report from The Wall Street Journal suggests that by 2017 the two operating systems could be merged into one.

Of course, this won’t be the first time we see an Android laptop hit the market. Multiple companies, including HP and Lenovo have tried bringing the mobile OS to traditional computers before, though they never really caught on. Hopefully with Google’s support the idea will actually pick up some momentum.

We’d love to see an official update to Android that added multi-window support so you could view two or more apps side-by-side on laptops, tablets and even big-screened smartphones. We’re guessing that’s what a combined version of Android and Chrome OS will look like, but in the meantime it will be interesting to see how Google begins to bridge the two operating systems starting next year.

A hotel in space

Russian company Orbital Technologies reckons it'll be sending tourists into space as early as next year. Guests would zoom up to the Commercial Space Station on a rocket, then spend their time in one of the station's four cabins enjoying zero gravity and watching earth through the ship's giant portholes. And this is only the beginning: Mashable has totted up nine commercial companies planning to send normal people into space over the next decade or so.

Monday, May 23, 2016

Programmable Clothes Are Going Commercial

Electronic clothing is the next frontier in sustainable fashion, as it removes the need to amass a large wardrobe. But will people buy it?
Clothes speak volumes about us, conveying messages about wealth, taste, and personal beliefs. So in this age of ubiquitous screens and social sharing, it's no surprise that textiles have become another platform for electronic communication.

Yet up to now, price and material limitations have restricted these garments to couture and concept—red-carpet spectacles like Nicole Scherzinger’s Twitter dress, which spelled out in microLEDs fan tweets, scrolling the across "The X Factor" judge’s lap in real time. But two new efforts are commercializing the technology, creating consumer fashions that allow the wearer to project any electronic text or image she desires.

CuteCircuit—the London-based makers of Scherzinger’s dress—have been leading the charge. Founded in 2004 by designers Francesca Rosella and Ryan Genz, the company recently introduced InfiniTshirt, a programmable top that features a 1,024-pixel screen of full-color LEDs.

Internet Of Things, Wearables, Robotics To Dominate Technology Trends In 2016

The Internet of Things and wearable technologies will continue to dominate in 2016 and it’s likely that robotics and artificial intelligence solutions will go mainstream. These are the key predictions in a new report – ‘What’s Hot In 2016 – Technology Trends’ published by managed service provider Advanced 365 in association with Global Futures and Foresight.

The report, compiled by David Smith of Global Futures and Foresight, highlights 15 technologies, which are most likely to create disruption and opportunities for businesses, whilst including best practice recommendations for a range of industries.

Neil Cross, managing director of Advanced 365, outlines his top six technological developments that organisations should consider in the next 12 months to drive business innovation and growth.

1. A new era of cybercrime – Organisations will increasingly be targeted by independent groups of cyber criminals. As businesses become more connected, influenced by technology platforms such as IoT, hackers will develop specific malware with potentially devastating consequences. To mitigate risk, it is vital to develop relationships with trusted partners who can provide security assessments and additional forms of due diligence to address these IT challenges.

2. The rise and fall of apps – Growth in apps is predicted to peak in the short term before consumers switch to virtual assistants in the cloud by 2020.

3. IoT at the edge – IoT is shifting from a connected device (remote sensors and monitoring) to an intelligent device paradigm (equipment, instruments or machines with computing capabilities). To take advantage, organisations will need to ensure that their IT infrastructures are sufficiently robust to store, process and analyse increased volumes of IoT-related data close to, or ‘at the edge’, of networks.

4. Mobile technologies, including wearables – Consumers and employees are increasingly demanding access to the information they need, when and wherever they need it. The wearable tech market could reach 385 million people worldwide by 2025 which will see it evolve into a viable mass alternative to smartphones. Almost three-quarters (72 per cent) of consumers believe wearables represent the future of in-store shopping and 50 per cent expect this technology to provide full health monitoring from implantable devices. Bio batteries, where wearables harvest kinetic energy from users, could also emerge as early as 2016.

5. Software robotics – Software robotics enable organisations to generate new growth opportunities and enhance existing products and services. Analyst Gartner believes that by 2017, these autonomics-based managed services and cognitive platforms will reduce the cost of IT solutions by 60 per cent through automating processes currently performed by humans. Businesses should evaluate employee skill sets to determine how software robotics can augment creative thinking by freeing them from routine tasks; benefits include reduced costs and better interaction between staff and customers.

6. Virtual reality (VR) – By replacing how we create, share and experience anything, VR technologies will dominate industries that train through simulation. VR and adjacent solutions are anticipated to generate mass consumer revenues from software platforms and delivery services, television and gaming content and hardware and distribution channels. Organisations should consider how their existing training processes could benefit and examine whether customer engagement would be enhanced from a more experiential form of interaction.

“The speed of innovation within business technology is creating much uncertainty, particularly for organisations who are reluctant to abandon old processes and systems. Whilst disruption should not be underestimated, businesses which are bold enough to embrace change stand to be rewarded with significant opportunities and efficiencies," said Cross.

“There remains a real need for businesses to understand how the competitive advantages on which they have based their strategy might erode or be enhanced a decade from now by emerging technologies. Greater collaboration and forming alliances with trusted partners is therefore critical to tackling big issues, such as software robotics and cybercrime.”

NEW TECHNOLOGY COMEBACKS IN 2016 – GOOGLE GLASS

It was back in 2012 when Google introduced the world to “the Glass.” A smart pair of glasses that can show you maps, places and how to get there. The glasses that lets you check your e-mails, take pics and also record videos. It was a wonderful gadget.
Geeks all over the world fell in love with it. It became the “must have” gadget if you were a geek. If you saw yourself as a forward thinker. A futurist. A dreamer.
However, by the end of the year, the expectations that the $1.500 wearable PC would be a consumer hit had been shattered. The reason? It just disturbed people. You would be quite right to say that it was not the “right time” again.
Developers stopped working on apps for Glass, and the consumer launch was postponed. Even Google co-founder Sergey Brin, the Glass visionary, was no longer wearing the device.
However, the glass geeks are still there. Even better, the time is right now. We are in 2016. It is the year of Google Glass. Expect a better, polished version this time. In fact, we expect two versions here at WT VOX.
The industrial version of Glass is going to be a success. There’s no doubt about it. Think niche applications. You’ll see the new Glass in the Army. You’ll see the new Glass in the hospitals. You’ll see it in constructions. Google Glass is back and here to stay this time.


6. NEW TECHNOLOGY COMEBACKS IN 2016 – BRAIN-MACHINE DEVICES
magine a paralysed person getting up from a wheelchair. Walking, shopping with his family. Imagine him going to see an Arsenal match in the Champions League and have a beer with his mates, once again.The mind-machine-interface expert Miguel Nicolelis, a professor at Duke University, was one of the first to explore this field. Control “the machine” with your mind.With $15 million grant from Brazil’s government, Nicolelis, and his team built an exoskeleton propelled by the wearer’s thoughts. The wearer was expected to stand up and hit the opening ball at World Cup 2014.On paper, the idea is quite straightforward. Collect the brain signals with an EEG cap, translate them and send them to the machine for processing. However, the signals produced – that way, at that time – were not able to control the exoskeleton.Some say that Nicolelis failed in his task. He, on the opposite, declared that “those 17 months of hard work” were a success. The truth is that rather than seeing a man rising from a wheelchair and walking, the exoskeleton achieved the task of moving one foot forward to hit the ball.Two years later and we are in 2016. We know much more about the Brain-Machine interfaces. We understand the human brain better to a point where we want to try telepathy. 2016 is the year when the first functional brain-controlled exoskeleton is “for real.”I’d say that success in “new technology” means that your device, your gadget or your product can solve a problem. However, “the right time” plays a big part in the success of your idea. It might not be now. It might not be tomorrow. But still, you’ll be successful one day, just don’t give up. Good luck.

1. 5-Port USB Charging Station | Useful Gadget 2016

You know it is difficult when you have siblings and a huge family but having little ports to charge up your smartphones all in one go. Here I have something exciting, a USB port that gives you 7 slots for smartphones and tablet. Feel easy and use them to charge your phones simultaneously with safe USB charging station.

2. Handheld Mobile Portable Document scanner 1050 DPI | Technology Gadget 2016

Gone are the times when people used to have huge scanners at their workplaces or at their homes. Now the market has introduced portable scanners that are easy to carry and work so smartly. This portable, handheld scanner is so apt for the businessmen, students and travelers etc. It magically and digitally converts your color or black & white photos, receipts and books into digital files. Now you can yourself scan images with up to 1050 DPI resolution and save them directly to a SD memory card. It for sure is a must have for 2016


2016 Technology Report: New Security Solutions and Risks Go Hand-in-Hand.

Technology moves quickly, as military and commercial tools and toys merge with security applications to create both new solutions and risks for the enterprise. What should you be on the lookout for this year?

The future, according to scientists and R&Ders, will be exactly like the past, only far more expensive. It can also be less expensive, more practical, more effective and at times more dangerous.

One of the first computers, the ENIAC, consisted of 18,000 vacuum tubes and weighed 30 tons. Today, there is more processing power in a typical lightweight laptop. Back in 1945, a computer bug – really a moth caught in the first Mark II – fried the computer works. Today, whole corporations can be brought to their economic knees thanks to Russian or Chinese cybercriminals.

In March 1876, Alexander Graham Bell famously said: “Mr. Watson, come here. I want to see you.” Today, the number of smartphone users will surpass 2 billion worldwide, representing over a quarter of the global population. Thousands of security professionals can view their cameras on their phones. At the same time, it is reported that global terrorists communicate with encrypted phones.

Major law enforcement organizations are calling for “immediate action” to halt encryption on what some call dark smartphones. The Paris terrorist attacks late last year could have been thwarted, according to some, if officials had access to their dark smartphones. A report, “A Law Enforcement Perspective on the Challenges of Gathering Electronic Evidence,” authored by the International Association of Chiefs of Police and the National District Attorneys Association, maintains that smartphones manufactured by the likes of Apple and Google should no longer come with built-in encryption, unless the government has easy access to encryption keys.



Tape to Hard Disc

In 1951, the first video tape recorder, costing over $50,000, captured live images from television cameras. Nowadays, there are millions of security cameras in the U.S. and petabytes of security video stored locally and in the cloud. Crime prevention’s their aim, but some may aim the wrong way.

Biometrics, say the experts, dates back to 1891 when Juan Vucetich started a collection of fingerprints of criminals in Argentina. Today, biometrics is automated and diversified, ranging from finger and palm, iris, retinal and face to voice and even behavior. With attention to better accuracy and faster throughput, biometrics seems destined to be the perfect balance of convenience and security or an imbalance of personal intrusion.

Virtual reality, another innovation, will make a big splash at this month’s Consumer Electronics Show (CES), sponsored by the recently renamed Consumer Technology Association. Newer virtual reality headsets such as the Gear VR from Samsung Electronics, also a physical security tech player, make it practical and less expensive to use immersive video technology. At CES, such headsets are an emerging entertainment device; it’s just a matter of time for the tech approach to nest into physical security and law enforcement for patrols and investigations. But is it good to turn a security patrol into a gamer scenario?

And then there are drones, one of the hottest gifts this last Christmas. The earliest recorded military use of an unmanned aerial vehicle or UAV occurred in 1849 when Austrians attacked the Italian city of Venice with unmanned balloons loaded with explosives. Today, drones are patrolling the Mexico and Canada borders and are credited for thousands of arrests and the seizure of thousands of tons of illegal drugs.



Drones Doing Bad; Drones Doing Good

A growing number of utilities, ports and stadiums though are concerned about the dark side of drones. For example, some security operations are using or considering small radar technology to alert to drone intrusions. And drones have intruded into sports stadiums and parades, peeked into windows and landed on the White House lawn.

On the other hand, experts at the University of Maryland's Robert H. Smith School of Business say drones are already into law enforcement and security applications. "We are missing out on a commercial opportunity that other countries have already embraced," says Smith School professor Oliver Schlake, a drone hobbyist who challenges his MBA students to develop business applications for the technology. Hank Lucas, another Smith School professor who wrote “The Search for Survival: Lessons from Disruptive Technologies,” says the impact will be immense as more companies discover commercially viable applications for drones. "It's well beyond our imagination," he says.

Storm watching:Drones can fly into the eye of a hurricane or hover over an active volcano, sending back data without risking lives. Global Hawk drones developed by Northrop Grumman can monitor stormy areas for up to 30 hours, generating data not available any other way.

Search and rescue:After severe storms hit Texas and Oklahoma in May 2015, the FAA sent drones from one of its test sites to search for survivors along the Blanco River.

Security:Drones equipped with headlamps, cameras and alarms can startle intruders and records their movements – and they often can arrive at the scene faster than police or private security officers. A company with commercial security contracts in New Zealand plans to deploy the technology by the end of 2015.

Innovation and technology as applied to the security industry can, not surprisingly, be a two-edged sword. Still, the good side of that tech sword can slice through crime prevention, situational awareness, forensics and other security tasks with ease.

One example: Innovative integration through diverse software is squeezing more value out of enterprise investments in security technology that evolves from protection and into the natural workflow of an organization.

At Austin Hall in the College of Business at Oregon State University in Corvallis, a security management system (VI Connect from Vanderbilt) represents one of the most unique systems integration projects within the higher education market.

The technology seamlessly integrates building access control into a single data management solution that not only enables school officials to streamline door access, but also allows students and staff to reserve one of 21 project rooms in the facility simply by using their existing credential. In addition to the project rooms, the building also features classrooms, faculty conference rooms, IT closets, a four-room research suite, a mailroom and an assortment of event spaces.

To help manage access control at Austin Hall, which includes credentials for approximately 4,500 students each semester, Kirk Wydner, operating systems network analyst for the College of Business, and his team chose to take an innovative and integrated approach.



Innovative User-Defined Fields

According to Wydner, the system, which was installed by security systems integrator Steve Murphy of Chown Security, Portland, Oregon, had to not only work with existing HID Global identification cards used by students across campus; it also had to have an easy-to-access user repository. “A key feature that really helped us was the ability to add in user-defined fields because we needed to have our own unique key,” Wydner says.

The innovative charm of the access system’s technology, however, is its hand- shaking with other software platforms for a completely interoperable access and room reservation system. To accomplish this, Wydner and his team installed the data management engine (Pinwheel DME from SwiftData Technology). Pinwheel integrates data from the access system along with several other enterprise software solutions employed at the facility, including sophisticated room scheduling, Web calendar and online event registration software (from Dean Evans & Associates) and an enterprise resource planning platform from higher education software provider Ellucian.

However, there were several significant hurdles that had to be overcome by both the OSU IT group and others involved to help make these interoperability goals a reality. An integration of this magnitude had never been done before, so much of the project was uncharted water, comments Murphy. “We didn’t know quite where to begin,” Wydner adds. “We knew that we needed to get all of the user data – our faculty, staff members and students. We needed some way of defining who is taking a college business class and which system we were going to pull that out of, whether that’s going to be our central student repository, Active Directory or if we were going to go off of Salesforce.”

Wydner said the university eventually decided the best way to bring this information together was to enter it into Salesforce, the San Francisco, California-based firm known for its Web customer relationship management system and its strength in application programming interfaces or APIs. He started a separate project focused on integrating the identification numbers from the campus HID cards into their Salesforce database. Aside from that, the team also had to figure out a way to format the data from Salesforce so that it would be recognized by the access and Dean Evans event management software solutions.

By using the Pinwheel data management engine or DME platform, students are now enrolled automatically based upon the information entered into the Ellucian enterprise resource planning system. The successful integration of these systems would not have been possible, however, without some of the unique features provided by the access control platform with its innovative way of combining the access levels of students and staff members with their respective rights and privileges through a process known as nesting.

Austin Hall also uses an automated lock system which saved significantly on time and manpower.



Door Access and Meeting Scheduling

“The main thing that our faculty and students enjoy about the integration is that they can just walk up to a project room or a meeting room [and] tap their OSU ID on the lock (AD-400 wireless networked locks from Schlage). It then opens up, lets them in, and it also gives them an automatic one-hour reservation on the room,” observes Wydner.

“Multi-tech locks are future-proof and access panels can handle up to 16 locks,” points out Murphy, who believes the project took system integration capabilities to new and innovative heights.

There are other tech trends embedded in such an approach, according to Mitchell Kane, president, Vanderbilt. As compared to security video, it may seem that advances in electronic access control emerge and evolve more slowly. From a hardware perspective, technology moves at a snail's pace, says Kane. What is more innovatively important is the trend of interoperability with other systems and big data. Until recently, most data integration with access management was through HR or IT databases. Kane sees a trend toward integration with workflow applications, working with data on an automated level, based on logic and analytics.

Multifunctional ability can be viewed as innovative.

That’s the bottom line for Guy Grace, manager of security and emergency planning for the Littleton, Colorado, Public Schools, and who is installing a network-based communication and security system (the IX Series from Aiphone) featuring video entry security, internal communication, emergency stations and paging. All units and apps in the systems can unlock doors remotely on a network, assist onsite visitors from an offsite location, broadcast emergency announcements and communicate using Power over Ethernet (PoE).

Among the “cool things we get from the technology is the intercom’s ability to record audio and video of visitors on our network digital video recorders or NDVRs. So now we have an extra camera, the ability to record all the transactions at the door in voice and video, the ability to talk to the door from the school and the security office miles away. And also these now can be used as call for help stations 24/7,” says Grace.



Audio/Video Intercom

Upgrading infrastructure is a crucial way to anticipate emerging innovations, contends Grace, who has spent time and resources on PoE to better handle “cutting edge, not bleeding edge. We can talk to people before they even talk to us by hearing noise before you see something with two-way microphones and mass notification when needed.”

Kevin Miller, corporate director of security for the Davenport Hotels in Spokane, Washington, had a simple though mighty protection challenge and an innovative security video solution. The Davenport Hotels are a unique collection that includes the Davenport Grand with a city convention center and INB Performing Arts Center connected to the hotel via a skybridge. The Spokane Veteran’s Arena, River Front Park, Spokane River and Centennial Trail are all within walking distance.

To provide a comfortable, safe experience for guests, Miller with his IT department sought out proposals for new video technology. The Davenport Hotels have been leading edge since the first in the collection – The Historic Davenport Hotel – opened in 1914. It was the first hotel with air conditioning, a pipe organ, a central vacuum system, housekeeping carts and accordion ballroom doors.



Virtual Network Approach

When it came to security video, “I knew where I wanted to place cameras,” he says. And after the vetting process, he picked IP-based megapixel cameras (Omni from Arecont Vision). The manufacturer “gave me a first class proposal, came out and visited. The quality of the cameras was there and the software was user friendly,” contends Miller. “We can cover everything from guest vehicles to slip and falls, and with fewer cameras.” He can easily search 31 days of recorded video and, with a virtual network approach, “I can look in from any angle. I also get alerts on my phone.” The innovative technology has “already paid for itself.”

Of course, there is an even bigger picture when it comes to innovation and technology. It is a challenging view for Philip Lisk, director of information technology at the Bergen County Sheriff’s Office, Hackensack, New Jersey. He put together a top notch technology-based set of solutions which includes a shared wired network as well as wireless net.

When evaluating new technology, “I look at what is applicable to what I need now as my long-term growth needs. Suppliers must be well known and reputable, no flash in the pan,” Lisk advises. “Sure there is convergence and a blending of physical and network security. But don’t put all things in one basket. Intrusion protection is especially important” these days. One innovative trend that’s both exciting and troubling is the so-called Internet of Things or IoT. The endgame is for all devices and things to talk and share among themselves. “As we all invest in IoT, we also must invest in more and better network security,” adds Lisk. “The level of awareness must increase.”



Identity Across the Enterprise

Speaking of the big picture, the really BIG picture, global giant Schneider Electric, the supplier of integrated energy solutions, faced a major update to its IT infrastructure. With more than 170,000 employees across more than 100 countries, the company needed an identity and authentication management (IAM) strategy that could scale with the company’s next phase of growth while maximizing efficient use of resources. The goal: Implement an IAM system with single sign-on (SSO) across the whole company; a system that could reuse identities and streamline disjointed “islands of data.”

It implemented a quick and successful proof of concept and selected Auth0 for its new federated identity management system. “What we found (in Auth0) was an authentication-as-a-service solution built by developers with the modern developer in mind,” says Stephen Berard, senior global software architect at Schneider Electric.

“Security is often misunderstood, and when it is an afterthought, left to the end, it tends to bite you in the butt. We didn’t have to kick the proverbial can down the road every time a new security or authentication question came up, whether the question was hypothetical, practical or mission critical,” says Berard. “With the platform, we can plan and integrate identity architecture early to save critical time and ensure a secure system is in place when a project gets off the ground.” The outcome:

Empowers the IT team to invest in strategic business, customer demands and innovation;
Enables the IT team to be able to plan identity scenarios early and make any necessary integrations quickly; and
Provides both traditional enterprise SSO as well serve as the ultimate accelerator to integrate the same identity management into custom applications and APIs.
Workhorse storage is another area of surprising innovation that impacts security.

There is a security strategy about what to put where. Especially for highly regulated organizations, the strategy is to keep storage locally, on premises on the enterprise’s devices.

For chief security officers and chief information security officers, there is game-changing architecture and user experience that fundamentally redefines expectations of what storage should be. Such designs extend far beyond traditional storage by being data-aware and tracking data access and analyzing data as it is stored.

Eric Chapman, network and systems administrator at Radiation Monitoring Devices, Inc., (RMD) the research business unit of Dynasil Corporation of America, uses innovative technology “to create detailed logs auditing who is accessing what,” Chapman says. He works with the Discovery Series (from DataGravity), a unified storage appliance for an organization’s most critical and sensitive data. It enables turnkey data management by combining a flash-optimized storage design with data protection, enhanced data governance and integrated search and discovery capabilities. It elevates storage from just a filing cabinet to a data-aware business asset.



Storage Appliance Unification

Data awareness is important to RMD, which itself provides innovative solutions across a broad range of security, medical and industrial applications, including radiation imaging and detection, nuclear instrumentation and non-destructive test equipment. The unique storage appliance was easy and fast to set up. “Thirty minutes and you power on and configure,” comments Chapman.

Perry Dickau, DataGravity director of product management, says the analysis of data provides security. Data storage is in mirror form, with a primary side where the data is written and then a duplicate side for redundancy and intelligence. Applying data analysis to this dormant mirror side can show enterprises who is sharing or looking at the data, and helps enterprise security leaders to make create actionable intelligence out of data.

Getting the word out faster and more accurately can be both helpful and innovative.

States such as Wisconsin are turning to solutions (for example, Roam Secure Alert Network from Eaton) for crime alerting systems to communicate to businesses and citizens about crimes committed in their neighborhood. Through alerting systems, law enforcement is able to increase awareness of crimes, build trust with the community and put thousands of additional eyes and ears on the streets looking for suspects.

When a crime is reported in a specific area, the alerting system enables law enforcement officers to send real-time information via email, text message, fax, pager and voice call to registered users. The system provides a description of the alleged perpetrator.

The Wisconsin Department of Justice launched the Wisconsin Crime Alert Network, which partners local law enforcement with residents
and business to keep the public informed, solve and prevent crimes and help find missing people. Today, more than 10,000 Wisconsin citizens, businesses and law enforcement officers are using the network, including approximately 900 police departments. Alerts can be sent quickly based on location or can be targeted to groups from more than 50 categories, such as pharmacies or convenience stores. Officers can choose to issue those alerts to specific, affected groups across the county, a multi- county region or statewide.

Security innovations can extend beyond security and law enforcement personnel.

For instance, Kindred Health Transitional Care and Rehabilitation in Eagle Creek, Indiana, is a nursing home and rehabilitation center specializing in short-term rehabilitation therapy, bridging the gap between hospital and home, as well as long-term care.



Taking Video to the Workers

Before using new technology (DuraVision from Eizo), Kindred Health operated two nursing stations that included several clinical systems without an adequate PC storage and cable management solution. Nurses could not monitor the activity in hallways, parking lots and entrances with the previous configuration rendering them vulnerable and susceptible to physical security issues and time away from attending to patients. Their immediate need was to be able to monitor all activities from any nursing station within the facility.

Kindred Health deployed the solution at each nursing station. With IP cameras already installed and connected to an NVR and view stations at security and the manager’s office, the technology connects directly to the nursing network with no computer or software needed. Nurses and administrative personnel now view up to 16 different cameras from any of the nursing stations.

Unique communications can help bring innovative security to tricky locations.

The Pennsylvania Police Department and the Redevelopment Authority of the City of Bethlehem are leveraging millimeter wave radio technology (Siklu and its EtherHaul radios) to secure the new Hoover Mason Trestle at SteelStacks, a 10-acre campus dedicated to arts, culture, family events that was once home to Bethlehem Steel, the second largest steel manufacturer in the nation.

A safe and secure experience is part of the mission of SteelStacks, says Tony Hanna, executive director of the Redevelopment Authority.

Hanna points out that the trestle, which used to be a small gauge railroad line bringing materials to the steel plant, is now a public walkway 40 feet or so off the ground, open day and night with multiple cameras monitoring all the time. Axis Communications provided cameras, while LTW (Let’s Think Wireless) provided system integration, design and installation services.



Outside Video Wireless Transmission

The project included building a wireless network that could extend the police department’s video surveillance system to the Trestle. The radios were selected as they transmit on different frequencies than Wi-Fi, and would therefore be able to assure reliable operation of the security video delivery system, even in potentially congested areas. Video from the cameras is aggregated to a rooftop point and then transmitted to the local police department, the Bethlehem Redevelopment Authority and to additional radio links throughout the city.

Small footprint but unique radar technology also is playing an innovative role in enterprise perimeter protection.

A virtual “iron dome” pulls together radar and security video to uniquely protect the nation’s power grid. Recently Honeywell Security Group and SpotterRF Radar were part of a design to cover an electrical generation and transmission facility that features state-of-art generators.

Typically, unmanned plants operate in secluded locations, and are configured for efficient power generation rather than security. Chain link fences have become antiquated in a modern world of heightened access. Following an attack on a substation in California in 2013, the North American Electric Reliability Corporation (NERC) increased its security standards. When these standards are not met, noncompliance penalties can range up to $1 million per day.



More Sophisticated Analytics

The resulting innovative installation integrates active surveillance with intelligent video analytics, video management, access control and perimeter intrusion detection and fire. A central management solution (Pro-Watch) for intrusion and access control handles all alarms and system messages.

Honeywell collaborated with SpotterRF, integrating its active radar technology with intrusion detection and protection of the perimeter and beyond. With a range of 350 meters, the appliance blankets the surrounding 20 acres with complete coverage while using less power than a 10 watt lightbulb. Integrated behavioral filters detect moving targets, automatically analyze behavior and instantly cue cameras to that spot using GPS coordinates for pinpoint accuracy. Thermal capabilities of the HD cameras can determine if movement belongs to a live individual who might present a threat or simply another of the man-sized tumbleweeds that are routinely thrown against the fence by the wind.

According to SpotterRF CEO Logan Harris, the radar device weighs less than two pounds, and its small size enables easier installation in a variety of locations. The device can detect up, down and sideways, setting it apart from a standard spinning radar.

The system also actively monitors the surrounding skies. And the use of thermal imaging along with intelligent video analytics enables accurate visual detection 24/7 at night, in fog, during inclement weather and even behind obstructions.

The integrated solution includes access control, robust reporting to meet strict auditing regulations and constant monitoring of the perimeter surrounding the fence line and hundreds of meters beyond to make it easy for the station to exceed requirements and establish best practices, possible future compliance requirements and operational needs.

It’s all about situational awareness and accuracy of alarms by reducing false ones, according to Angela Oberman, senior channel manager, critical infrastructure at Honeywell. The technology targets four steps, she says: deter, detect, delay and respond. Beyond the lightweight radar, another tech breakthrough is gunshot detection that can even indicate the caliber of the bullet as well as more use of thermal cameras.

Innovative technology for special events often emphasizes ease of set-up, effectiveness and ease of removal after the event. No one knows better than those who protected Pope Francis during his September 2015 visit to the United States.

Mobile deployable vehicle crash barriers (from Delta Scientific) helped police and security personnel protect Pope Francis from vehicle bomb attack and errant drivers as he traveled to various venues in Washington, D.C., Philadelphia and New York City. At each location, the totally self-contained barriers were towed into position and controlled vehicle access within 15 minutes. No excavation or sub-surface preparation was required. Once positioned, the mobile barricades unpacked themselves by using hydraulics to raise and lower the barriers off their wheels. DC-powered pumps then raised or lowered the barriers. The shorter mobile deployable vehicle crash barriers can stop 7.5 ton vehicles traveling 30 mph. Both the operation of the barrier as well as deployment and retrieval are push-button controlled.

When exploring innovative technology that helps prevent crime and mitigate losses, there is a serious race to fight growingly sophisticated fraud. According to a Javelin Strategy & Research study released in 2015, fraudsters stole $16 billion from 12.7 million U.S. consumers in 2014. Technology is helping combat this; but companies also are concerned with creating too much friction in the consumer experience.

Gasan Awad, vice president, global identity and fraud product management at Equifax, the Atlanta, Georgia-based consumer credit reporting agency, and one of the three largest American credit agencies, realizes the need for a balance between higher level security and convenience. “We’ve been helping through big data before it was cool,” he says.



Fraud Fighting

“It’s important to have a multi-layered approach. Do things match? There is need to deploy fraud-fighting models that manage the customer experience as well as the assets” that might potentially be lost, Awad points out. One innovation: the Canada Known Fraud Exchange, which collects data on frauds and perpetrators and allows enterprises to dip into the big data to stop a fraudster sooner than later. Equifax is helping establish a U.S. Known Fraud Exchange, too.

There also is a unique organization working on fraud from another perspective.

The Open Identity Exchange (OIX) is a San Ramon, California-based technology agnostic, non-profit trade organization of leaders from competing business sectors focused on building the volume and velocity of trusted transactions online. OIX enables members to expand existing identity services and serve adjacent markets. To effectively provide digital services, businesses and governments need to validate, verify and authenticate identity in a cheap, reliable, repeatable manner. The rapid advancement of open identity technologies has created an interoperable technical platform to make this possible.

While the technology exists for relying parties (such as an online retailer or government agency) to use third-party identity providers, the business and legal policies that set the rules for identity issues such digital transactions have lagged behind. Without clear agreements on the business, legal and technical terms of a transaction, how can parties trust each other? OIX was formed to facilitate the development of the business and legal policies that match open identity technologies, thereby establishing trust that will enable deeper deployments of existing services and rapid deployments of new online products.

Awad sees yet another innovative fraud-fighting avenue: the selfie. At the point of a transaction, selfies, coupled to facial and document biometrics, can speed a fraud-free experience.

Sometimes, when migrating to network video from analog, enterprises look at other ways to innovate and squeeze more value from their investment. A case in point is wireless mesh.

The Willow Lane Trading Estate in Surrey, England, houses more than 150 businesses and employs more than 2,500 people. When the business upgraded an existing analog video surveillance system, the business park chose a wireless mesh networking solution (from Fluidmesh Networks). The new installation uses multiple-input multiple-output MIMO-based wireless radios designed for backhauling mission-critical video, voice and data, and other radios, which host an integrated sector antenna, providing coverage of 120 degrees.

Beyond upgrading to network cameras, another key goal was that the system be designed to enable substantial expansion. And it was critically important that the recorded images provide legible, evidential quality image capture.

This solution didn’t come without its challenges. Among them, there was no existing duct infrastructure, and the system needed to be wholly wireless.



Mesh Goes Beyond

Wireless mesh networks (WMNs) are an innovative technology for video surveillance, among mission-critical applications, often because trenching and creating direct cable connections is an expensive undertaking and usually requires permits. And, it also resolves distance issues associated with Wi-Fi, where security exposure can be a liability.

Simply stated, a wireless mesh network is a communications network comprised of radio nodes set up in a mesh topology, which is the arrangement of the various elements (links, nodes, etc.) of a computer network, according to Umberto Malesci, Fluidmesh Networks’ co-founder and CEO.

Wireless mesh networks in outdoor wireless networking applications rank as the third most commonly used topology, following point-to-point links and point-to-multipoint networks.  Every device deployed in a wireless mesh network is called a mesh node, and each is connected to multiple other mesh nodes simultaneously.

WMNs can connect nodes through multiple hops and leveraging other nodes as repeaters, creating inherent redundancy and reliability, says Malesci. This is an advantage for enterprises because mesh networks are able to reroute data traffic through multiple paths to overcome interference, link failures, power failures or network device failures.

Two types of wireless mesh networks are usually deployed for government and commercial applications: Structured wireless mesh networks and unstructured (omni-directional) wireless mesh networks.

Sunday, May 22, 2016

The Headset That Helps You Hack Life

Virtual-reality headsets, like the Oculus Rift, create escapes. Put one on, and you’re suddenly swimming with dolphins or fighting in the Battle of Waterloo. Microsoft’s HoloLens, by contrast, augments reality—overlaying holograms and data onto existing surroundings, so you’re not “confined to the virtual world,” as designer Alex Kipman puts it. Imagine gamers defending their homes from robot invaders, engineers manipulating 3-D models or surgeons following directions “on” the human body. Early tests indicate all are possible. Already the HoloLens is being used by NASA to mimic Mars’ terrain in labs and by medical students to dissect virtual bodies. —Alex Fitzpatrick

The under,ground park

It’s not like any park you’ve ever seen before,” says Dan Barasch of the Lowline, an abandoned trolley terminal in New York City’s Lower East Side that he and architect James Ramsey are trying to turn into an acre of lush green space, replete with flowering plants and areas to relax in the sun. The key: a “remote skylight” dish system that captures sunlight from surrounding rooftops and funnels it underground via fiber-optic cable; once there, it’s beamed out via reflective dome, enabling plants to grow. To prove the technology works, Barasch and Ramsey opened the Lowline Lab; it’s a prototype version of the final park, which is still several approvals—and $70 million in funding—away from completion. But Barasch, who attracted more than 3,300 backers on Kickstarter, is undeterred. Even forgotten places, he says, can still be used “for public good.” —Julie Shapiro

The ‘Hoverboard’ Scooter Gregory Reid for TIME Developed by multiple brands

Part Segway, part skateboard, the self-balancing scooter—generally known as a hoverboard, even though it doesn’t actually hover—is easily the year’s most viral product, drawing fans like Justin Bieber, Jimmy Fallon and Kendall Jenner. Once someone hops on, the device uses a pair of electric gyroscopes (one under each pad) to balance automatically, allowing users to speed forward, backward and around by slightly shifting their body weight. That enables all kinds of fun stunts, ranging from hallway races to motorized dance routines. Maxx Yellin, co-founder of PhunkeeDuck, one of more than 20 companies making versions of the device, sees larger implications. “It could evolve as a new form of transportation for cities and colleges,” Yellin says (though British authorities recently caused a stir by outlawing their use on public sidewalks and streets). But convenience comes at a cost: prices range from $350 to $1,700, depending on the brand and its features. —Lisa Eadicicco

Saturday, May 21, 2016

The best technology from the 2016 North American International Auto Show

The automotive industry are the originators of the notion to push ‘new and improved,’ models yearly. Be it a new variants of beloved marquees, the addition of more chrome or fins, to moving the needle on performance, fuel economy, safety and of course, price.

Detroit, MI – Just days after the car-heavy International Consumer Electronics Show (CES) in Las Vegas wrapped up, many expected the Detroit Auto Show to focus on new technologies like Apple CarPlay and Android Auto integration, improved driver assistive technologies, electrification and autonomous driving technology to name but a few.

Just like the consumer technology industry, the motoring world thrives on iteration and upgrade cycles and game changing breakthroughs.

The automotive industry are the originators of the notion to push ‘new and improved,’ models yearly. Be it a new variants of beloved marquees, the addition of more chrome or fins, to moving the needle on performance, fuel economy, safety and of course, price.

In 2016, technology and the car manufacturing businesses are careening into an inevitable collision. While there are upstarts and start-ups like Tesla and more recently Faraday Future, who are applying the bare-bones structure of hungry tech startups into a model for innovation and manufacturing electric vehicles. We have giants like General Motors who are placing considerable R&D investment and quickly adapting to new technology-focused electric vehicle platforms.

It’s definitely an arms race, with many similar objectives in sight. Affordable long-rage electric vehicle, connected vehicles that easily morph into an extension of a driver’s chosen mobile ecosystems and infotainment, smarter vehicles that proactively improve driver and passenger safety.

Samsung Family Hub Refrigerator

Our kitchens are getting smarter by the year. This year Samsung introduced its new Family Hub Refrigerator designed to do a whole lot more than just store your food. On the outside of the fridge is a 21.5-inch Android tablet that can display your family’s calendar as well as things like notes and photos. A camera inside the fridge snaps a picture each time you close it, recording what’s inside so you can check in from anywhere and see if you’re out of something. (So, when you do use that last bit of salad dressing, you can also order groceries right from the refrigerator door and have them delivered to your home.) Other features include music streaming through its built-in speakers and the ability to watch TV through screen mirroring with a Samsung Smart TV. Pricing and release date info for the fridge has yet to be announced.

Fisher Price Code-a-Pillar

There’s no denying that learning to code is becoming less of a choice and more of a must. While some elementary and middle schools have started implementing coding classes, Fisher Price introduced a $50 toy this year to targeted towards a much younger demographic: preschoolers. The Code-a-Pillar isn’t going to have your toddler writing iPhone apps, but it will teach her some of the basic ideas behind creating code using its interchangeable parts. That way when she does have that million-dollar idea, she’ll have leg up on learning how to build it.

Related: Fisher-Price's Cute New Toy Aims to Teach Preschoolers the Basics of Computer Programming

Oculus Rift


The consumer version of Oculus Rift is finally headed our way. Facebook used CES as an opportunity to announce consumer availability and pricing for the VR headset. Unlike some other virtual reality devices on the market that use smartphones for the display, Rift has its own built-in display designed specifically for VR. The Facebook-owned device has a high refresh rate, allowing users to become fully immersed in the virtual world.  Available now for $599, the headset ships with a sensor for motion tracing as well as an Xbox One controller.

The Best New Tech to Look Out For in 2016 and Beyond

At CES tech companies from around the world descended on Las Vegas to show off their biggest and brightest innovations for the upcoming year and beyond. Not only is the event a time when many of those companies made some of their largest announcements of the year, but it is also a place where we, as consumers, got a idea of what’s in store for the upcoming year. But with over 3,600 companies and 2.4 million square feet to cover, the event can be a bit overwhelming.

Don't fret. We scoured the show floor all week to find the best new tech out there. Here are some of our favorites from the show:

Chevy Bolt EV

Finally, there’s an electric car that’s affordable for the average consumer. Chevrolet’s new 2017 Bolt EV has a 200-mile range, more than doubling the range of other consumer models out there. Set to launch later this year, the car also has a number of built-in tech features including Bluetooth low energy, which will automatically set the vehicle’s seat, temperature and other personalized TK to the driver's personal settings as he or she approaches the vehicle to drive. The car is priced at $37,500 ($30,000 after tax credits), making it within reach of everyday consumers.

Related: What To Expect From CES 2016

EHang 184

Forget flying a drone. What if you could be flown by a drone? EHang’s 184 drone is a quadcopter with one unique feature: it can carry a person. Once someone climbs inside she just tells the drone where to go, and it navigates her there with no need for any pilot skills. The drone can fly at a maximum altitude of 11,000 feet, has a top speed of 60 mph and has 23 minutes airtime.  It’s not going to be a replacement for an airplane, but it could ultimately be something you use to make that morning commute a little easier, that is if the FAA approves use of the gadget. No release date is available but when it does hit the market, the estimated starting price will be $300,000.