The All-Important School Bus Video Surveillance

School Bus Video Surveillance

Every morning around the world, millions of children use school buses as their primary means of transportation to and from school, and these numbers look likely to grow. With carbon reducing initiatives that attempt to reduce the numbers of cars on the road in place in many countries, the use of shared and public transportation …

Read more

Lanner Network Appliances based on Intel Xeon Processor Scalable Family

Accelerating Transformation and Virtualization with Future-ready Network Appliance Due to the increasing convergence in IoT, SDN, NFV and 5G, we have experienced the unprecedented network transformation that has redefined what we have known about connectivity, security and services. Featuring next-generation high-throughput, virtualization optimized design and hardware-assisted security, the Intel® Xeon® Scalable Processors are the platforms …

Read more

5G Networks And Their Impact On The Internet Of Things

5G networks

With the number of devices connected to the Internet of Things (IoT) set to top 20 billion by the year 2020, the wireless mobile internet networks that enable these will need to be improved upon in order to handle such an increase in numbers. This is where 5G networks will come into play. As the …

Read more

NCA-2510: Beefing Up Lanner’s Hardware Solutions for SDN/NFV Implementations

Today sees the release of Lanner’s NCA-2510, a 1U 19” rackmount network appliance with virtualization optimized design and Intel® Atom™ C3000 CPU (codenamed Denverton). The NCA-2510 is powered by Intel’s Atom™ C3958, C3758 or C3558 CPU, offering up to 16 cores of processing prowess. In additional to having a high core count, the NCA-2510 also features 10G interface for SFP+, …

Read more

Evolution of Artificial Intelligence – Big Data promise coming to fruition

The human brain is one of, if not the, most complex machine we have found so far in our universe. While there have been and still are many attempts underway to recreate or emulate the layout and functions of the human brain, none have come close to being true representations of our own grey matter. …

Read more

Industrial PC Applications In Industrial Automation

Industrial automation can be roughly defined as the use of technology and control systems (Industrial PC, PLC, PAC, etc) to automate industrial processes to improve on quality and output without the need for significant human intervention. Control systems are used to dictate the automatic operation of integrated technology and other equipment. In large car factories …

Read more

Railway Video Surveillance Makes Metro Transit More Secured

Background In recent years, the incidents of attempted terror attacks on metro systems have increased at a global level. To assure the safety of the passengers, video surveillance systems for public transit setting seem to be the immediate solution. Being the country with world’s most complicated transit network and highest passenger volume, the metro operators …

Read more

Protect Your Valuable Data from Ransomware with Network Security Appliances

The recent incidents of ransomware have revealed new types of vulnerabilities towards enterprise data or the access to the data. Ransomware presents a new wave of malicious attacks based on cryptovirology, like Petya and WannaCry, which are well-known examples of new multi-vector ransomware that can evade detection and spread swiftly across network shares, resulting in …

Read more

Police Car NVR – comparing IP vs analog option

car NVR

Deployment of Police Car NVR systems over the years has resulted in greater professionalism from officers and reduction in lawsuits based on baseless claims saving millions of dollars to the law enforcement authorities. Recording the events that take place during police interactions with the public or when responding to crimes taking place is of critical …

Read more

The long-reaching effects of inadequate cyber security

Effects of inadequate Cyber security

This year has highlighted the need for cyber security overhauls across every industry, from hospitals still running 15-year-old software, to extremely vulnerable electronic voting systems which threaten the integrity of a democracy. It’s becoming more and more apparent that the massive data breaches, spy tool leaks, and proliferating ransomware born from it are only symptoms …

Read more