|By Marketwired .||
|April 8, 2014 12:01 AM EDT||
RYE BROOK, NY -- (Marketwired) -- 04/08/14 -- ImageWare Systems, Inc. (OTCQB: IWSY) and StrikeForce Technologies, Inc. (OTCBB: SFORD)
Ms. Jody Ross, Vice President of Business Development, AMAG Technology, told us, "AMAG's Symmetry access control system is the best software on the market today. Our software and hardware come packed with features that other manufacturers charge for. The GUI is similar to Microsoft's so it's familiar to everyone, reducing training time, and it integrates to a wide variety of technology partners to provide video, audio, HR, etc. options to customers who need those options. Innovative features such as Alarm Workflow, Task Manager and Threat Level Manager allow security directors to better manage their security team's response times and actions, and secure their building during crisis situations. Symmetry is a leading-edge security system designed for buildings of any kind, which combines all aspects of security into a single well-designed and future-proof software solution suitable for small, large or very large applications."
For the complete interview with Jody Ross: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_AMAG_JodyRoss.html
For more information www.AMAG.com and please see the following links:
About AMAG: http://www.amag.com/About-AMAG-Technology.aspx
AMAG Products: http://www.amag.com/Products.aspx
AMAG Solutions: http://www.amag.com/solutions.aspx
AMAG Services & Support: http://www.amag.com/Support.aspx
AMAG Partners: http://www.amag.com/area-of-interest.aspx
AMAG Case Studies: http://www.amag.com/Case-Studies.aspx
AMAG Resources: http://www.amag.com/library.aspx
AMAG News: http://www.amag.com/library/News.aspx
HP Enterprise Services
Mr. John Felker, Director, Cyber and Intelligence Strategy, HP Enterprise Services, U.S. Public Sector, told us, "HP takes an enterprise view of security which, in turn, helps our clients overcome the limitations typically associated with historical and siloed views of risk mitigation, globalized security and cost reductions. With the increased deployment of digital technologies, frequently operated remotely and unmanned, comes the need for increased cyber- and physical security for critical assets such as SCADA systems. At HP, we don't simply improve your security posture to address threats and manage risk and compliance, we also bring to bear an array of services, solutions and industry-leading technology to ensure you maintain a proactive, mature and agile security posture designed to navigate through ever-evolving threat and regulatory landscapes. By leveraging cloud, big data and mobility initiatives, you can evolve into a more proactive operating model which will increase productivity, optimize resource utilization and help you build and maintain safe, secure and environmentally sound operations."
For the complete interview with John Felker: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_HP_JohnFelker.html
For more information on these topics:
Risk Management and Compliance for US Public Sector
Cybersecurity for U.S. Public Sector (http://www8.hp.com/us/en/industries/public-sector.html?compURI=1087497)
Public Sector Services and Solutions (http://www8.hp.com/us/en/industries/public-sector.html?compURI=1131347)
ImageWare Systems, Inc. (OTCQB: IWSY) (ImageWare), a leader in mobile and cloud-based, multi-modal biometric identity management solutions, has issued financial results for the fourth quarter and full year ended December 31, 2013, as well as provided a corporate update to highlight the company's progress since its last update on November 14, 2013.
Key Milestones and Events
- Initiated a pilot with T-Systems, a wholly owned subsidiary of one of the world's leading integrated telecommunications companies, Deutsche Telekom AG. The partnership will start with a pilot in T-Systems' labs in Germany to integrate ImageWare's patented, multi-modal biometric, cloud-based identity management and credential technology into T-Systems' products.
- Completed delivery of ImageWare's QuickCapture application in connection with a U.S. federally sponsored pilot program for iris recognition with 20 state and local law enforcement agencies.
- Recognized as 2014 Innovation and Design Award Winner for its Biometric Engine 2.0® by industry research firm Envisioneering at the Mobile World Congress in Barcelona, Spain.
- Settled patent litigation with WCC Services US (WCC) and Creative Information Technology (CITI) that resulted in WCC and CITI obtaining royalty bearing licenses from IWSY for the patents at issue. These patents cover IWSY's multi-modal biometric platform and fusion of biometric modalities.
Fourth Quarter and Full Year 2013 Financial Results
Total revenues in the fourth quarter of 2013 increased to $929,000 from $926,000 in the fourth quarter of 2012. Total revenues for the full year of 2013 increased 135% to $5.3 million from $4.0 million in 2012, with the increase primarily due to approximately $1.5 million received in August for software licenses in connection with a $2.2 million contract with the U.S. Department of Veteran Affairs.
Gross margin in the fourth quarter of 2013 increased 160 basis points to 72.4% compared to 70.8% in the fourth quarter of 2012, with the increase primarily due to reduced costs from the relocation of certain technical support functions from the company's Canadian office to its San Diego office. Gross margin for the full year of 2013 increased to 79.4% from 69.6% in 2012, with the increase primarily due to higher software license revenues and, to a lesser extent, savings from the aforementioned relocation of technical support functions.
Net loss in the fourth quarter of 2013 was $1.8 million, or ($0.02) per diluted share, compared to net income of $62,000, or $0.00 per diluted share, in the fourth quarter of 2012. Net income in the fourth quarter of 2012 included a $1.8 million gain from the change in fair value of derivative liabilities. Net loss in the full year of 2013 was $9.9 million, or ($0.12) per diluted share, compared to a net loss of $10.2 million, or ($0.14) per diluted share, in 2012. Net loss in 2013 included a $4.8 million loss from the change in fair value of derivative liabilities, while net loss in 2012 included a $ $4.7 million loss from the change in fair value of derivative liabilities.
At December 31, 2013, cash and cash equivalents totaled $2.4 million compared to $4.2 million at December 31, 2012. The company continues to carry virtually no debt and, subsequent to the end of the quarter, increased their line of credit from $2.5 million to $3.5 million.
"2013 was a pivotal year for ImageWare, as we formed partnerships with two of the world's largest IT services providers, Fujitsu and T-Systems," said Jim Miller, chairman and CEO of ImageWare. "We are starting to see a shift in companies evangelizing biometrics, moving from the small biometric companies trying to prove their practical application in the commercial and consumer markets, to many large corporations understanding the real-world benefits of bringing biometrics to the mainstream public. This shift has created an attractive opportunity for ImageWare and we plan to leverage our large partners' sales and marketing power to capitalize on it.
"Our new partnership and close collaboration with T-Systems represents the outcome of a number of months of discussion and planning. We're now taking the next step by integrating our technology into their products and expect this new relationship to expand our presence throughout European and worldwide markets.
"These and other proactive steps we've taken to position ImageWare as a leader in multi-modal biometric security are beginning to attract broader attention. We recently attended the Mobile World Congress in Barcelona where the reception we received was incredible, particularly for our patented PillPhone®, which is the first and only FDA-approved biometric-enabled enterprise mobile application."
Miller concluded: "Working closely with our technology partners, we continue to build a healthy pipeline of potential customers and are currently in discussions with several clients regarding licensing opportunities. We will continue to target large enterprise businesses and emerging applications and believe the steps we are taking to advance our cloud, SaaS and mobile offerings in the commercial and consumer marketplace will continue to build shareholder value, along with greater visibility that includes a healthy recurring revenue stream."
For more information, please click here.
For the complete interview with Jim Miller, ImageWare Systems, Chairman and CEO, please click here (http://www.securitystockwatch.com/Interviews/in_Boardroom_ImageWare.html)
For more information:
IWS CloudID: http://iwsinc.com/products/next-generation-iws-cloudid-product-suite/
ImageWare Systems Solutions: http://www.iwsinc.com/markets/overview
ImageWare Systems Products: http://www.iwsinc.com/products/overview2
For ImageWare Systems Investors: http://www.iwsinc.com/about-iws/investors/overview1
For more information: www.iwsinc.com
Recently announced that...
And, in other recent news...March Networks announced that...
For More Information About March Networks Solutions:
March Networks Financial Solutions (www.marchnetworks.com/solutions/financial/default.aspx)
March Networks Retail Solutions (www.marchnetworks.com/solutions/retail/default.aspx)
March Network Airports-Seaports Solutions (http://www.marchnetworks.com/solutions/airports-seaports/default.aspx)
March Network Commercial-Industrial Solutions (http://www.marchnetworks.com/solutions/commercial-industrial/default.aspx)
March Networks Critical Infrastructure Solutions (http://www.marchnetworks.com/solutions/critical-infrastructure/default.aspx)
March Networks Government Solutions (http://www.marchnetworks.com/solutions/government/default.aspx)
And, For More Information:
About March Networks (www.marchnetworks.com/company/about-us/)
What's New At March Networks (www.marchnetworks.com/products/whats-new.aspx)
March Networks Blog (http://www.marchnetworks.com/intelligent-ip-video-blog/)
For the latest March Networks News (www.marchnetworks.com/company/news-center/2013/9/24/497)
StrikeForce Technologies, Inc., a company that specializes in Cyber Security solutions for the prevention of Data Breaches and Cyber Theft, recently announced it has received an official Notice of Allowance from the United States Patent Office stating that a second patent application titled "Methods and apparatus for securing keystrokes from being intercepted between the keyboard and a browser" has been approved for issuance.
"We are extremely excited about receiving this Notice of Allowance for our Keystroke Encryption technology," says Mark L. Kay, CEO of StrikeForce, "it has game changing implications for our Company and the industry. This expands on our original patent and includes: all computers, smart phones, tablets, and all the keystrokes you enter. Our patented Keystroke Encryption technology proactively encrypts each and every keystroke typed on a keyboard. All security experts agree that the use of encryption is the best way to protect data on your mobile device," continues Kay. "Until we developed our Keystroke Encryption Technology for mobile devices, there wasn't any way to encrypt data in motion at the point of origin, when typed on a mobile device keyboard."
"Additionally, as announced two weeks ago on March 11th, StrikeForce has received an official Notice of Allowance from the US Patent and Trademark Office that we have been approved for Issuance of our third patent for Out-of-Band Authentication," says Kay. "Our patent portfolio continues to increase. After these two Notices become patents, StrikeForce will then own five patents in our portfolio, and there will still be three more pending. Owning the patents for Keystroke Encryption and Out-of-Band Authentication positions us on the forefront of what is hot in security and regulatory requirements today, as seen through our new contracts and increasing pipeline. As we learned at the recent RSA Security Show, these are the types of product purchasesnow being included in security budgets. Our increasing patent portfolio also improves our value as we continue to protect our intellectual property assets."
The timing of this Notice of Allowance coincides perfectly with StrikeForce's recently announced two new mobile products (MobileTrust® and GuardedID® Mobile SDK). Both products already include our patented keystroke encryption technology and should be available within the next thirty to sixty days. Individuals and Corporations will now for the first time, be able to protect themselves with our MobileTrust application, while mobile application developers will be able to build our one-of-a-kind Keystroke Encryption technology directly into their mobile applications.
"Keystroke Encryption is an extremely critical security technology, which plays a major role in preventing the most widespread malware from stealing confidential data from mobile devices," says Kay.
In other recent news, StrikeForce Technologies, Inc. announced today that Blank Rome LLP, a top 100 law firm has licensed StrikeForce's ProtectID Outof-Band Two-Factor Authentication Platform to protect remote access and their clients Intellectual Property.
"We were extremely pleased that Blank Rome has chosen to deploy our ProtectID Out-of-Band Two-Factor Authentication Platform," says Mark L. Kay, CEO of StrikeForce, "Blank Rome has been in business for more than sixty five years and is amongst the most prestigious Law Firms. They realize the importance of protecting network access and the intellectual property of their customers."
"As part of our effort to continue improving the Firm's overall security posture, Blank Rome decided to employ two-factor authentication to bolster the security of remote access to the Firm's network. After being introduced to StrikeForce Technologies' solution, we liked their approach to out-of-band authentication. We knew anything we implemented for this purpose had to be easy to use, as well as being secure and flexible. StrikeForce's system achieves this simplicity and flexibility by supporting a variety of methods to input the second factor, and it also is economical and easy to implement," says Laurence Liss, CTO of Blank Rome.
"For a long time now, law firms have worked under the implicit assumption that they were not targets of hackers. Law firms thought of themselves as above the rough and tumble world of spying and IP theft. However, all of that has changed," says Kay. "Law enforcement agencies throughout the world have warned of an increasing threat of hacking to law firms. These concerns have escalated to such an extent that the White House, the Attorney General and the FBI are publicly warning law firms to tackle the escalating risk of cyber attacks."
"Working with law firms to protect their remote access and intellectual property is now high on our radar, just within two months we helped Superior Discovery with similar concerns as they service many prominent law firms," says Kay.
For more information about:
www.strikeforcetech.com; (OTCBB: SFORD)
SYS-CON Events Announces Cloud Expo 2014 New York
14th International Cloud Expo to take place June 10-12, 2014, at the Javits Center in New York City
SYS-CON Events announced today that 14th Cloud Expo®, co-located with 5th Big Data Expo, 3rd SDDC Expo, 2nd DevOps Summit, 2nd WebRTC Summit, and 1st Things Expo, will take place June 10-12, 2014, at the Javits Center in New York City.
The three-day event will offer a vast selection of technical and strategic breakout sessions, General Sessions, Industry Keynotes, and "Power Panels" from a rock star conference faculty chosen from among the leading industry players in the cloud computing and Big Data worlds. The bustling Expo Floor will include two busy Demo Theaters so that as a delegate you can kick the tires of solutions and offerings, and discuss one-on-one with all the leading Cloud and Big Data players what they are offering and how to make use of it in your particular situation.
All the main layers of the Cloud ecosystem will be represented -- the infrastructure players, the platform providers, and those offering applications. The high-energy event is a must-attend for senior technologists from CEOs on down -- including CIOs, CTOs, directors of infrastructure, VPs of technology, IT directors and managers, network and storage managers, network engineers, enterprise architects, and communications and networking specialists.
For 37 years FOSE has served as the nation's premier event for government technology professionals seeking tools and best practices to equip their agency for the 21st century. From policy updates -- straight from the Hill -- and exclusive insights from today's leading authorities, to the most comprehensive showcase of technology in action -- it's all at FOSE.
FOSE's three-day conference addresses the most relevant and pressing technology and management priorities and issues for government and its private sector partners. With more than 60 sessions including keynotes, panel discussions and in-depth technical sessions, you can expect to take home best practices, policy updates and detailed guidance across 8 in-demand tracks.
GovSec 2014 Conference & Free Expo
Experience the Largest, Most Dynamic Government Security Expo in Washington, DC, May 13-14, FREE. Discover the newest trends, cutting-edge technology, tools, equipment and the exciting companies who provide them in the exhibit hall.
Plus, get valuable training to enhance your career without straining your budget at the full conference -- with conference prices starting at $99, you won't want to miss out!
GovSec resource trusted by thousands of security professionals and is the nation's premier event for government, homeland security, and law enforcement!
Get more information and register for the full conference or free expo today -- SecuritySolutionsWatch.com Readers save 10% on conference prices! Use code: PMG02 @ www.GovSecInfo.com.
June 17-19, 2014
If you're looking focused content, features and leading suppliers catering for every security requirement, IFSEC International in London is the only destination for you this June! With a global focus on expertise and guidance, you'll discover high level security content that covers both public and private security, from SMEs to the largest enterprises. An international gathering of over 28,000 professionals, the event is the key forum in which to meet with the manufacturers leading the way in security innovation, including Axis, Samsung, ASSA Abloy, Canon and many more.
If you're a trade visitor, take the opportunity to network with the potential clients with live projects, while sourcing your full range of kit on the show floor. If you're an end user, attend to meet the installers, integrators and consultants who can steer you towards an increasingly successful security strategy.
Register free of charge at www.ifsec.co.uk/register
For more information about:
IFSEC Community: http://www.ifsecglobal.com/
IFSEC Directory: http://directory.ifsecglobal.com/
IFSEC Events: http://www.ifsecglobal.com/events/
InfoSec World Conference & Expo 2014
April 7-9, 2014
Disney's Contemporary Resort
The event features 70+ sessions, dozens of case studies, 8 tracks (including a Hands-On Track), 11 in-depth workshops, 3 co-located summits and an exhibit hall showcasing the industry's leading vendors. With the primary objective of providing top-notch education to all levels of information security and IT auditing professionals, InfoSec World delivers practical sessions that give you the tools to strengthen your security without restricting your business!
29th April - 01st May 2014
Network, engage and do business with +15,000 other information security professionals at 19th Infosecurity Europe 29th April - 01st May 2014
Infosecurity Europe is the largest and most attended information security event in Europe. Held in London, it is a free exhibition featuring over 325 exhibitors featuring the most diverse range of new products and services and an unrivalled free education programme attracting visitors from every segment of the industry.
Collect CPD/CPE Credits
The Education Programme is shaped by the industry for the industry. Addressing the latest challenges and industry needs it will provide you with business critical insight, best practice and practical case studies. Speakers include information security thought-leaders from public and private sector end-users, policy-makers and government, analysts, industry experts, service providers and vendors.
Featuring five conference and seminar theatres and a comprehensive programme of workshops and training courses, attending the Infosecurity Europe Education Programme helps you to further develop your career and learning.
Meet with the key industry players
From the New Exhibitor zone to the Country Pavilions, discover the latest products and solutions of the local and international scene. This is your best opportunity to receiving expert advice and to discuss your needs with key information security players.
Infosecurity Europe is the most important date in the calendar for information security professionals across Europe. The attendees reflect every segment of the information security industry coming from key sectors including:
- IT distribution companies
- IT hardware, software, manufacturers and suppliers
- End-user information security professionals
- Government professionals
For more information and to register please visit http://www.infosec.co.uk/visiting/
LinuxCon North America
August 20-22, 2014
LinuxCon is the conference for all matters Linux, bringing together developers, sysadmins and architects to learn and collaborate on the latest technical issues facing the Linux and IT operations ecosystems. Launched in 2009, LinuxCon has quickly become known for offering top speaking talent, a cross-section of the leading players in the Linux community, innovative and timely content, a wide variety of opportunities for attendee collaboration and a place for smaller groups to co-locate for topic-specific mini-summits and workgroups.
Congress Centre Düsseldorf
October 13 - 15, 2014
LinuxCon Europe is the conference for all matters Linux, bringing together developers, sysadmins and architects to learn and collaborate on the latest technical issues facing the Linux and IT operations ecosystems. Launched in 2009, LinuxCon has quickly become known for offering top speaking talent, a cross-section of the leading players in the Linux community, innovative and timely content, a wide variety of opportunities for attendee collaboration and a place for smaller groups to co-locate for topic-specific mini-summits and workgroups.
PSA Security Network
Mr. Bill Bozeman, CPP, CHS, President/CEO, told us, "... the TEC event will be May 5-9 in Colorado. TEC stands for Training, Exhibits and Conference. For this yearly event, which is open to the entire security industry, we took all the best parts of your typical security event and brought them together under one roof, and for one low price. At TEC you will get the training and education you need for your entire company with hundreds of hours of courses to choose from. We also offer physical security certifications, where you will get the opportunity to learn from the leading minds in the industry, and explore new and innovative ideas with your peers.
The full day exhibit hall is where attendees can see the latest products and service offerings from over 100 of the security industry's top manufacturers. Explore state-of-the-art technologies and cutting-edge business solutions that will prepare your company for success. And finally, the Conference portion of TEC. This is where you will become a part of the industry's best networking opportunities by engaging with your peers and technology leaders in a fast-paced, lively environment. For the complete interview with Bill Bozeman: www.securitysolutionswatch.com/Interviews/in_Boardroom_PSA.html.
For more information: www.buyPSA.com
Read the PSA Blog: http://blog.buypsa.com/blog
Locate A PSA Integrator: http://www.buypsa.com/Integrators
PSA Vendor Partners: http://www.buypsa.com/Vendors
PSA Education: http://www.buypsa.com/Education
RFID Journal LIVE! 2014
Apr. 8-10, 2014 -- Orlando, Fla.
Learn how to track and manage everything at the world's largest RFID event, RFID Journal LIVE! 2014. RFID technologies are advancing rapidly and adoption is accelerating. Learn how your company can benefit at the only RFID event featuring more than 75 hours of education, more than 50 end-user case studies and more than 200 technology companies. Hear how industry leaders are benefitting from RFID in the defense, aerospace, health-care, pharmaceuticals, manufacturing, retail and apparel industries. See live demonstrations of the latest solutions and learn how to deploy the technology successfully.
Register now-SecuritySolutionsWatch.com VIP Discount: Save 15% with promo code EADW.
SDW 2014 - Exhibition sold out and exceeding all expectations
With still more than 4 months to go to SDW 2014, the SDW Exhibition has completely sold out, beating all previous records for the event. Some 103 companies have signed up to participate at the world's leading event for next-generation human identity and secure credential solutions, and a waiting list is in operation.
A full list of exhibiting companies can be viewed at: http://www.sdw2014.com/exhibitors/
Entry to the exhibition is free to registered visitors, and all visitors pre-registering before 9th May 2014 will be upgraded to Visitor Plus+ status and be entered into the SDW Conference Delegate draw with the chance of winning a free delegate pass to SDW 2014. In addition, they will receive a complimentary £ 5.00 catering voucher to use at the show.
Pre-registration can be completed at: http://www.sdw2014.com/visitor-registration
Delegates from government departments in Asia, Africa and Latin America can access the entire three day event, including the conference and exhibition for just £ 399 +VAT. Government attendees from other world regions can register for £ 499 +VAT (Rate expires 28th February 2014.) Plus, for multiple registrations for every government delegate registered, the second is at half price.
In addition, for 2014, all conference sessions will have simultaneous translation into French and Spanish.
Industry delegates are also able to attend the SDW 2014 conference at a discounted rate. The show operates a limited-availability, stepped pricing policy, meaning that delegates who book early access the lowest rates. Delegates can register online at: http://www.sdw2014.com/delegate-booking
Diary Date - SDW 2014, 16-18 June 2014, Queen Elizabeth II Conference Centre, London, UK
Security Industry Association (SIA)
Register for the 2014 SIA Government Summit
Registration is now open for the 2014 SIA Government Summit, hosted by the Security Association (SIA) June 3-4, 2014, at the W Hotel in Washington, D.C.
SIA Members can register for $550; nonmembers for $775 through May 4.Registration includes breakfast and lunch both days as well as the semi-formal SIA Public Policy Dinner, where SIA recognizes leading legislators and outstanding SIA volunteers.
The Summit provides attendees with unparalleled policy insights that help create new market opportunities. The exclusive nature of the setting allows one-on-one conversations with government decision makers about legislation and regulations important to the security industry.
Questions about the SIA Government Summit? Contact Elizabeth Hunger at 301-804-4714 or [email protected].
SIA Unveils New Certification Exam
At ISC West in Las Vegas on April 4, the Security Industry Association (SIA) unveiled revised exam for its Certified Security Project Manager (CSPM®) certification program.
SIA will present the refreshed CSPM® Review Course and later this year. The 2.5-day, instructor-led training is offered to SIA Members for $995 and $1,295 for nonmembers. Contact Kimberly Roberts at 301-804-4708 or [email protected] for more information.
CSPM® Review Course Schedule:
May 5-7, in Westminster, Colo. (to be delivered at 2014 PSA-TEC, costs may vary)
June 10-12, in Pomona, Calif.
Aug. 4-6, in Silver Spring, Md.
Oct. 1-3, in Atlanta, Ga.
The CSPM® Review Course goes beyond foundational principles and offers newer and seasoned project managers clear perspective on the importance of their role to stakeholders and identifies risks that could hinder project success. Attendees receive the SIA Security Project Manager's Common Body of Knowledge Guidebook, which includes a compendium of resources, checklists, templates and other materials to help prepare for success on future projects.
By using our website and any information located at www.SecuritySolutionsWatch.com you agree to these "Terms."
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
Sep. 28, 2016 03:15 PM EDT Reads: 4,123
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Sep. 28, 2016 03:15 PM EDT Reads: 306
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
Sep. 28, 2016 03:15 PM EDT Reads: 1,295
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Sep. 28, 2016 03:00 PM EDT Reads: 3,859
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
Sep. 28, 2016 02:45 PM EDT Reads: 1,736
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Sep. 28, 2016 02:30 PM EDT Reads: 2,921
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
Sep. 28, 2016 02:30 PM EDT Reads: 3,294
We’ve been doing it for years, decades for some. How many websites have you created accounts on? Your bank, your credit card companies, social media sites, hotels and travel sites, online shopping sites, and that’s just the start. We do it often without even thinking about it, quickly entering our personal information, our data, in a plethora of systems. Sometimes we’re not even aware of the information we are providing. It could be very personal information (think of the security questions you ...
Sep. 28, 2016 02:00 PM EDT Reads: 4,753
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Sep. 28, 2016 02:00 PM EDT Reads: 4,414
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Sep. 28, 2016 01:57 PM EDT Reads: 201
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
Sep. 28, 2016 01:23 PM EDT Reads: 235
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
Sep. 28, 2016 01:00 PM EDT Reads: 166
Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself. Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, will discuss how VPaaS enables you to move fast, creating scalable video experiences that reach your...
Sep. 28, 2016 01:00 PM EDT Reads: 1,104
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Sep. 28, 2016 01:00 PM EDT Reads: 3,547
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
Sep. 28, 2016 12:30 PM EDT Reads: 1,047