|By Business Wire||
|July 1, 2014 11:27 PM EDT||
Leading security and home automation provider ADT (NYSE:ADT) today announced availability of ADT Pulse® Voice, a new app that combines the ADT features customers know and love with the security and convenience of personal voice commands. ADT Pulse Voice technology is the first of its kind in the smart home space, enabling homeowners to log in and log out of the Pulse Voice app via custom technology that recognizes unique voice signatures. Once logged in, users can arm and disarm their Pulse security panel, control their home’s lighting, adjust thermostats, lock and unlock doors, and check the overall status of their home – all verbally and virtually touchless through an iOS or Android smart phone. It’s a new frontier in the world of smart home technology, and it’s brought to consumers first by ADT.
ADT recognizes consumers’ increasing need for easy-to-use technologies that can adapt to the pace of today’s lifestyles. From long hours at the office to keeping up with the kids or checking in on pets, it’s safe to say that despite today’s hectic lifestyles, families still want to stay connected. Now, there is no need to break away from a task at hand to manually control smart home features; instead, a homeowner’s voice can trigger ADT Pulse functions by recognizing select key words, device names and phrases to perform. In addition to accepting personal voice commands, the ADT Pulse Voice app provides auditory feedback to confirm actions and system status for all of its connected devices.
“It’s all about providing the best possible user experiences for our customers,” said Arthur Orduña, senior vice president and chief innovation officer for ADT. “As more people use voice commands to interact with their smart phones and other devices, it’s critical for us to securely extend the convenience and accessibility of ADT Pulse through voice input. The launch of ADT Pulse Voice is another example of how ADT is using innovative technology to ultimately improve the user experience for customers and meet their individual needs in a way that complements their digital world.”
With protection as ADT’s foremost priority, the ADT Pulse Voice app leverages a multi-layered identification process allowing only registered members of a household to log in. Through voice commands, a user is approved by three personal checkpoints: a secret phrase, state-of-the-art voice recognition, and confirmed identification of a mobile device. ADT’s identification technology is a critical safety measure as it ultimately allows only verified users to gain access to the ADT Pulse Voice app in the event their mobile device is lost or stolen. Without all three verification checkpoints confirmed, any login attempt will be denied.
Voice control also lends access to visually impaired consumers, allowing less interaction on screen and providing the benefit of virtually touchless technology. From arming their system to turning on the lights to unlocking doors on the drive home, ADT Pulse Voice provides intuitive technology for users to manage and control their smart home from the inside and out.
For more information on solutions to protect and automate the home, and to learn more about ADT Pulse Voice, please visit, www.adt.com/voice.
The ADT Corporation (NYSE: ADT) is a leading provider of electronic security, interactive home and business automation and monitoring services for residences and small businesses in the United States and Canada. ADT's broad and pioneering set of products and services, including ADT Pulse® interactive home and business solutions, and health services, meet a range of customer needs for today’s active and increasingly mobile lifestyles. Headquartered in Boca Raton, Florida, ADT helps provide peace of mind to more than six million customers, and it employs approximately 16,000 people at 200 locations. More information is available at www.adt.com.
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Oct. 8, 2015 03:15 PM EDT Reads: 170
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, al...
Oct. 8, 2015 03:15 PM EDT
In their session at DevOps Summit, Asaf Yigal, co-founder and the VP of Product at Logz.io, and Tomer Levy, co-founder and CEO of Logz.io, will explore the entire process that they have undergone – through research, benchmarking, implementation, optimization, and customer success – in developing a processing engine that can handle petabytes of data. They will also discuss the requirements of such an engine in terms of scalability, resilience, security, and availability along with how the archi...
Oct. 8, 2015 03:00 PM EDT Reads: 384
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
Oct. 8, 2015 03:00 PM EDT Reads: 214
Chris Van Tuin, Chief Technologist for the Western US at Red Hat, has over 20 years of experience in IT and Software. Since joining Red Hat in 2005, he has been architecting solutions for strategic customers and partners with a focus on emerging technologies including IaaS, PaaS, and DevOps. He started his career at Intel in IT and Managed Hosting followed by leadership roles in services and sales engineering at Loudcloud and Linux startups.
Oct. 8, 2015 03:00 PM EDT Reads: 133
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
Oct. 8, 2015 03:00 PM EDT Reads: 110
Saviynt Inc. has announced the availability of the next release of Saviynt for AWS. The comprehensive security and compliance solution provides a Command-and-Control center to gain visibility into risks in AWS, enforce real-time protection of critical workloads as well as data and automate access life-cycle governance. The solution enables AWS customers to meet their compliance mandates such as ITAR, SOX, PCI, etc. by including an extensive risk and controls library to detect known threats and b...
Oct. 8, 2015 03:00 PM EDT Reads: 196
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
Oct. 8, 2015 03:00 PM EDT
You have your devices and your data, but what about the rest of your Internet of Things story? Two popular classes of technologies that nicely handle the Big Data analytics for Internet of Things are Apache Hadoop and NoSQL. Hadoop is designed for parallelizing analytical work across many servers and is ideal for the massive data volumes you create with IoT devices. NoSQL databases such as Apache HBase are ideal for storing and retrieving IoT data as “time series data.”
Oct. 8, 2015 02:45 PM EDT Reads: 489
DevOps has often been described in terms of CAMS: Culture, Automation, Measuring, Sharing. While we’ve seen a lot of focus on the “A” and even on the “M”, there are very few examples of why the “C" is equally important in the DevOps equation. In her session at @DevOps Summit, Lori MacVittie, of F5 Networks, will explore HTTP/1 and HTTP/2 along with Microservices to illustrate why a collaborative culture between Dev, Ops, and the Network is critical to ensuring success.
Oct. 8, 2015 02:45 PM EDT Reads: 105
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
Oct. 8, 2015 02:30 PM EDT Reads: 125
Clearly the way forward is to move to cloud be it bare metal, VMs or containers. One aspect of the current public clouds that is slowing this cloud migration is cloud lock-in. Every cloud vendor is trying to make it very difficult to move out once a customer has chosen their cloud. In his session at 17th Cloud Expo, Naveen Nimmu, CEO of Clouber, Inc., will advocate that making the inter-cloud migration as simple as changing airlines would help the entire industry to quickly adopt the cloud wit...
Oct. 8, 2015 02:30 PM EDT Reads: 639
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Oct. 8, 2015 02:15 PM EDT Reads: 182
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Oct. 8, 2015 02:15 PM EDT Reads: 219
Overgrown applications have given way to modular applications, driven by the need to break larger problems into smaller problems. Similarly large monolithic development processes have been forced to be broken into smaller agile development cycles. Looking at trends in software development, microservices architectures meet the same demands. Additional benefits of microservices architectures are compartmentalization and a limited impact of service failure versus a complete software malfunction....
Oct. 8, 2015 02:00 PM EDT Reads: 143