Month: March 2016

Video Wall Controllers and Other AV Technology Becoming More User-Friendly

download (8)Have you ever wanted to really dazzle an audience with high-definition screens that showcase your brand? Video wall systems are one of the most in-demand AV technologies right now due to their versatility in a variety of environments. But sometimes these new and rapidly improving technological innovations can seem too complicated, and tech novices can feel a little left out of the changing 21st Century marketplace.

That’s why there’s a new wave in technology manufacturing right now that’s putting a focus on user-friendly and intuitive design. Even watching commercials or checking out your local electronics store will show you the direction the world is moving, as phones, computers, tablets, and AV technology are increasingly designed not just for tech-savvy geniuses, but for the average consumer with no technical training.

We live now in the era of technology, meaning almost everyone, from business owners to regular folks, relies on technology in almost every aspect of life. Many electronics companies are still figuring out how to make their products simpler for the average user, but others are already leading the way towards a technologically intuitive world.

Walk through a mall, airport, restaurant, casino, or almost anywhere, and you may notice a video wall display being used to show advertising or other dynamic content. Thanks to this current trend towards technological pluralism, this relatively new technology may be easier to use and manage than you think.

The screens you see are powered by a video wall controller, which is a piece of hardware that is responsible for distributing content via inputs and outputs. The video wall controller splits an image into parts to be displayed on the screens or “clones” the content by routing it individually to each screen. In the past, this type of technology may have required a lot of training to use, but now there are companies that have simplified the process.

The average user looking for a simple solution wants something that allows them to display their content beautifully and without any hassle. A basic, entry-level video wall controller will allow users to plug in their media player with one simple input and instantly start playing content on the screens.

So if you want to join the technological revolution, now’s the time. Don’t be afraid to use AV technology to put your company or brand above the pack because if you look in the right places, you can find a solution that’s not only powerful, but also easy to use.

SmartAVI is an American manufacturer that offers video wall controller solutions at aggressive prices. SmartAVI offers a range of solutions, from basic hardware-based plug and play systems to highly customizable PC-based systems with integrated software.


The Importance of Protecting Personally Identifiable Information (PII)

download (7)The effects of a data breach can be devastating to any company and can have far reaching effects. Target estimated the credit card data breach costs, after insurance reimbursement at $105 Million. In addition, 40 million payment cards and 70 million other records, including customers email addresses and phone numbers were stolen. This breach was severe enough for the CEO to resign.

The Ponemon Institute released a report in September 2014 indicating that 43% of companies had experienced a data breach in the past year and that was an increase in 10% over the prior year. It’s not a matter of if your company will be attacked, it’s when it will happen. According to the report, the magnitude of the breaches is increasing and more than 80% of the breaches were caused by employee negligence.

I do believe that we will see a flood of lawsuits pertaining to PHI data breaches and with the stringent HIPAA laws in place, medical practices and the associated industry can expect to pay exorbitant penalties.

Companies need to protect PII, PHI and PCI from both internal and external threats and should retain only information that is crucial to the operation of the business and what is legally required if their data is breached.

Personally Identifiable Information (PII) is information that can be used to identify on its own or in conjunction with other information a single person. The National Institute of Standards and Technology (NIST) Special Publication 800-122 defines PII as “any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual’s identity, such as name, social security number, date and place of birth, mother’s maiden name, or biometric records, and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information.” So, for example, a user’s IP address as used in a communication exchange is classified as PII regardless of whether it may or may not on its own be able to uniquely identify a person.

Protected Health Information (as defined by HIPAA.COM) means any information, whether oral or recorded in any form or medium, that –

· is created or received by a healthcare provider, health plan, public health authority, employer, life insurer, school or university, or health care clearinghouse; and

· relates to the past, present, or future physical or mental health or condition of any individual, the provision of health care to an individual, or the past, present, or future payment for the provision of health care to an individual; and

1. Is created or received by a health care provider, health plan, employer, or health care clearinghouse; and

2. Relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment foe the provision of health care to an individual; and

(I) That identifies the individual; or

(ii) With respect to which there is a reasonable basis to believe the information can be used to identify the individual

Payment Card Industry (PCI) Compliance is adherence to a set of specific security standards that were developed to protect card information during and after a financial transaction. According to TechTarget, PCI compliance is required by all card brands and per the PCI Security Standards Council there are six main requirements for maintaining compliance.

1. Build and maintain a secure network

· Install and maintain a firewall configuration to protect cardholder data

· Not use vendor-supplied defaults for system passwords and other security parameters

2. Protect cardholder data

· Protect stored cardholder data

· Encrypt transmission of cardholder data across open, public networks

3. Maintain a vulnerability management program

· Use and regularly update anti-virus software

· Develop and maintain secure systems and applications

4. Implement strong access control measures

· Restrict access to cardholder data by business need-to-know

· Assign a unique ID to each person with computer access

· Restrict physical access to cardholder data

5. Regularly monitor and test networks

· Track and monitor all access to network resources and cardholder data

· Regularly test security systems and processes

6. Maintain an information security policy

· Maintain a policy that addresses information security

The costs associated with a data breach and subsequent loss of PII, PHI and or PCI can be devastating to any organization, no matter their size. These costs come in the form of financial penalties and loss of reputation and in some cases result in criminal prosecution.

Reputation is one of an organization’s most important and valuable assets and is intrinsically linked with brand image. According to research done by the Ponemon Institute, respondents said that their brand would diminish by 21% in the event of 100, 000 confidential consumer records being lost due to a data breach and that it would take on average about a year to restore the organization’s reputation. Data breaches involving employee confidential information and also records containing confidential business information can also be extremely harmful to an organization.

Forty-seven states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands have enacted legislation requiring private or government entities to notify individuals of security breaches of information involving PII. Some states have passed legislation requiring businesses to proactively implement security measures to protect PII before a data breach occurs.

Protecting PII, PHI and PCI within an Enterprise Content Management System

It goes without saying that all data in databases, files and applications and data being transmitted needs to be secure and encrypted. Just as important is to purge files and data no longer required to be kept in accordance with any laws and regulations and to redact all PII, PHI and PCI.

PII collected by businesses and government is stored in various formats either digitally or hard copy paper. At least 32 states and Puerto Rico have enacted laws that require entities to destroy, dispose, or otherwise make PII unreadable or undecipherable.

There has been an increasing awareness to protect data at the source and not just at the perimeter

Redacting documents, especially unstructured documents, can be a very challenging exercise and should be entrusted to an enterprise content management software and development company that is competent and experienced in developing and integrating redaction software and workflow to automate the redaction processes.

The passage of the HITECH Act increased penalties for information security negligence pertaining to PHI. The basis for the act requires organizations that handle PHI meet a baseline criteria for protection of data in transit, in use, at rest and when disposed. The HITECH Act is noteworthy because it provides definition around the protection of PHI and puts an emphasis on the encryption of PHI.

The penalties for HIPAA violations and data breaches of PII, PCI and PHI can be devastating to any organization and companies should not spare any expenses with regards to HIPAA compliance training and the securing of networks and data.


Importance of Computers!

download (5)A computer can be defined as a general purpose device that is programmed in a way that it can carry out a set of logical as well as arithmetic operations in an automatic manner. As a sequence of operations can be changed readily, the computer is capable of solving more than one problem. Conventionally, a particular computer consists of at least one element for processing which is typically called the CPU and there is also some form of memory. This processing element carries out various arithmetic as well as logical operations and also sequencing and a control unit.

The computer system is not at all a simple machine. It is just like a very modern and a very highly complex calculator. It is capable of doing or performing almost all the functions at a very speedy rate which helps us a lot to progress and search in our businesses and homes. A computer can therefore be called as a calculator that includes a twist as it not only performs very fast calculations, but it is also capable of having various other special characteristics. The computer has changed the manner in which man is witnessing things.

These computers have transformed in such a manner that they have become an unavoidable part of our life. They are involved in the success and development of each and every individual. They are no longer owned only by rich and wealthy people. Computers have the capability of transforming the country in the coming years and days. The accurate knowledge of a computer which be helpful in bringing a change in a very astonishing manner. It will lead to optimism and the demolition of illiteracy as well.

Computers have been allotted a very integral role to play these days. They are used in every office, home or shop because of their ever increasing utility. Computers are gradually and slowly penetrating through the modern society as people are getting more and more optimistic about the promises made by this invention. They are also used in businesses, industry and government sectors. Computers help the users to save so much of manual power, time and cost which is a great thing for us at this point of time. Instead of spending countless hours of manual work, it is a great thing that we can finish the same work in a few minutes by using a computer. It is one of the important points.


Benefits of LED Technology and the TIR Lens Manufacturing Process

download (4)Benefits of LED technology

LED or Light Emitting Diodes have potentially replaced the traditional lighting source for its cost and size advantages. It was initially used as indicator lamps in a number of electronic devices. However, continuous development in LED technology had led to embrace this technology in all types of general lighting.

LEDs are extremely energy-efficient and can consume up to 90% less power than conventional fluorescent bulbs. As such they help to massively cut power costs. Because of low power usage, LEDs are becoming popular light sources in remote areas that use solar panels. LEDs also have long life of up to 60,000 hours compared to 1,500 hours for luminous bulbs. Moreover, they are durable and can withstand shock, vibration and extreme temperature. You can also improve safety by using LED since they produce 3.4 btu’s per hour compared to 85 for incandescent bulbs.

People are using LEDs in a variety of applications, including residential lighting, aerospace, architectural lighting, automotive, aviation, broadcasting, electronic instrumentation, entertainment and gaming, and more.

Especially in the micro-projection system, use of LED optics will increase over the years. It is because lighting uniformity and efficiency on spatial light modulators or SLM are two most important factors to gauge performance of micro-projection system. People often use tapered light pipe (TLP) and square compound parabolic concentrator (SCPC) as a beam shaper in LED-based micro projection system. By this, you will get SLM with uniform and efficient illumination.

However, TLP or SCPC has some disadvantages the primary one been insufficient compactness induced by the working length of TLP or SCPC for the illumination system. To overcome this problem, one can use TIR or Total Internal Reflection lenses.

Definition of TIR lens

TIR or Total Internal Reflection lenses are cone-like lenses that usually have rotationally symmetrical designs to distribute light in a rounded pattern. You can use TIR lens to collimated light or to generate a preferred uniform illumination.

TIR lens manufacturing process

During TIR lens manufacturing, often the designers do not pay attention to color uniformity, which also limits their application. You can however address this problem through effective color mixing, and use a phosphor-converted white LED module integrated with a compact modified free form to get compact size and high angular color uniformity (ACU).

Manufacturers design total internal reflection lens with an optimization method to combine and transfer most of the light emitted from LED optics into a rectangular target plane or RTP representing SLM. Typically, TIR lens has six surfaces controlled by seventeen dimensional parameters. Design takes place optimizing dimensional parameters with general algorithms. In order to keep RTP in immovable position with pleasing illumination uniformity and efficiency, designers consider illumination uniformity and efficiency on RTP during the optimization process.

In the Tracepro program, the simulation result of LED illumination system with the optimized TIR lens shows that the illumination efficiency and uniformity has achieved 61.9%, 76% with considering the limitation angle of light (15 degrees).

You can manufacture these lenses for multiple LED applications. Manufacturing of different sizes of TIR lenses depends on its optical performance, so one cannot specify FWHM angles, etc.

Vikash Rock has many years of experience in LED optics industry and discuss the benefits of LED over traditional lighting sources. People design and optimize TIR or total internal reflection lenses to combine and transfer most of the light emitted from LED optics into a rectangular target plane or RTP representing SLM.