« June 2009 | Main | August 2009 »

July 31, 2009

Will 'Thin Clients' Replace Office PCs?

Article on BusinessWeek posing question on thinclients replacing PCs. This focuses on the Redfly. No CPU, or anything else. TCO 1/10th of laptop.Extends your smartphone into a the desktop with keyboard. $200. Blackberry and Android in the works. Pretty cool!

The stripped-down "thin client" devices, such as Celio's Redfly C8N, offer companies big savings on hardware costs and software support

By Cliff Edwards

As we head into the fourth decade of the personal-computer revolution, there's a growing class of technophiles who rarely hunker down in front of a PC. Millions of Internet-savvy users now manage a lot of their multimedia hobbies, social networking, and even business tasks on smartphones from Apple (AAPL), Samsung, and other companies.

For a long time, consumers were driving this trend, but corporations are now starting to think about trading PCs for smartphones or other kinds of hybrid wireless devices known as thin clients. These look like notebook computers, but some are designed to connect with a smartphone and share its operating system and software applications. As a result, the thin client doesn't require its own internal processing or storage capability.

Companies are attracted to this approach for two reasons: Thin clients are cheaper to purchase than full-service laptops, and the corporate buyer can exert much stricter control over the software they run. Unlike laptops, both smartphones and thin clients can be tightly controlled by companies, so they don't get cluttered up with thousands of programs and media files downloaded from the Net. That makes them less vulnerable to viruses, hackers, and other security threats—saving companies money on tech support.

For the past few weeks, I've been looking at one of the first entries in a new class of mobile thin clients. Celio's Redfly C8N has an 8-inch screen and is designed to pair wirelessly with a smartphone running the Windows Mobile operating system. That means you can use the C8N to work on Word and Excel documents, e-mail colleagues using Microsoft (MSFT) Exchange Server, and do most other things you do at the office. Measuring 6 in. by 9 in. and 1 in. thick, the device is too big to cram in a pocket—unlike an iPhone or most other handsets—but I found it a lot more comfortable for business uses.

The Redfly is lighter than most netbooks, and at $299 it is far cheaper than ultrathin laptops. When the Bluetooth connection is on, the battery lasts about nine hours, nearly double what you get on most energy-efficient laptops. And if you need data or programs that are only on your office network or your desktop, there's remote-access software that will let you log in safely.

All of this makes Redfly very appealing, but there are some trade-offs: not least, an extremely cramped keyboard. During my tests, my typing accuracy rate dropped below 50% as I surfed the Web and took notes using Microsoft Word. Asus, Acer, and other netbook makers offered similarly tiny keyboards in early products, and shoppers returned them in droves.

Rest of article on BusinessWeek

Posted by Staff at 08:00 PM | Comments (0)

July 30, 2009

Thin Client and Digital In-Store Signage at Jessops

Thin Client installation at Jessops for providing in-store digital signage. For broadcast content which is constantly changing thin client media controller/players can play a big role.

Jessops focuses on labelling

Jessops, the largest photographic retailer in the UK, has implemented Episys’ Retail Enterprise Suite signage solution across all of its stores to enable the business to make immediate price changes in the store environment and improve the customer experience.

The retailer needed to introduce a solution to replace its current standard ticketing control, maintenance and production systems, as well as being able to handle more specialist tickets and miscellaneous signage requirements.

The retailer wanted in-store printers that could produce eye-catching signage that gives full details of the products on display as well as being able to respond quickly in a competitive market with new products, attractive merchandising and compelling prices. Jessops was also keen to communicate with its customers more effectively.

Previously, the business printed its signage weekly from head office. Brendan Marris, Brand Design and Merchandising Manager, said, “The stores didn’t have the ability to make immediate changes to labels, and this was impacting upon the customer experience within the store, as the latest product information was often unavailable. Also, it meant the business had to be very specific with the timing of special offers due to the weekly update of labels. We wanted to keep our customers better informed regarding both product information and pricing.”

Marris continued, “We wanted to provide customers with more accurate information about products. We also needed to ensure that in a fast changing, electrical environment, it was possible to change ticket prices in a regular, consistent audited fashion so customers got the service they deserved.”

Key to the selection of the new system was its ability to integrate with the other systems used by Jessops to give flexibility and reduced costs for in-store signage. The retailer wanted a system that could operate through thin client technology and integrate with the retailer’s existing EPOS technology. The retailer also wanted a user-friendly solution that staff could update easily in store.

Jessops selected Episys’ Retail Enterprise Suite because it provided flexibility without any constraints in terms of data structure, which meant the system could be adapted to meet the company’s requirements.

Jessops can now implement price changes immediately. Marris said, “The instore printing of ticketing has also empowered our store teams to resolve any pricing requirements in store as required, with consistent pricing and product information being displayed.”

The technology is also saving the business lots of time compared to the old system. Marris added, “Store managers can dip into the system and print tickets where there are any gaps on the shelves and as tickets can be printed in store, updates don’t have to take place en masse.”

Marris added, “The flexibility of the Episys solution is key to us being able to present the product information in a way which complements the high technology merchandise on display. Using the new solution we will be able to increase sales, by being more responsive to market conditions, as well as reducing the costs of our signage.”

The technology will form an important part of the business for years to come. Marris concluded, “Going forward there will be a process of continual improvement. We are currently considering electronic signage as a natural progression from printed signs for some of our flagship stores.”

Posted by Staff at 02:36 PM | Comments (0)

July 28, 2009

DT Research Deploys Digital Signage at Beijing International Airport

DT Research wins installation in Beijing airport for digital signage running on thin clients. 82 and 108 inch displays. Picture included.

SAN JOSE, Calif., - July 28, 2009 - DT Research™, Inc., an industry leader in the development of information appliances for vertical markets, today announced the installation of the WebDT SA3000 based on the Intel® Core™ 2 Duo processor, the latest in their line of signage appliances, at the Beijing International Airport. In a press conference today in Beijing, top executives from DT Research, Intel Corporation, and AirMedia will announce the deployment and showcase their digital signage technology.

As the busiest airport in Asia, based on scheduled seat capacity, the Beijing airport hosts a highly desirable target audience. AirMedia will deploy 600 of the SA3000 signage appliances to deliver dynamic, quickly updatable advertising content shown on 82” and 108” displays to the over-150,000 travelers who pass through the airport every day.

Dr. Daw Tsai, president of DT Research, noted, “As one of the busiest airports in the world, it is imperative to provide this technologically savvy audience with the best possible performance. Intel’s Core platform enabled us to deliver a state-of-the-art signage appliance for the AirMedia network. Not only does the WebDT SA3000 offer enhanced processing performance, but it has low power consumption and runs cooler than comparable systems.”
WebDT_Beijing_airport.jpg

“Low power Intel Core 2 Duo processors are ideal for high-performance signage appliances,” said Joe Jensen, Intel’s General Manager of the Embedded Computing Division. “Integrating Intel® architecture into digital signage application designs, such as the WebDT SA3000, enables a top-quality, optimal visual experience for a sophisticated market.”

With the WebDT Content Manager software system, available with the WebDT Signage Appliances, AirMedia is able to remotely manage the content displayed in the airport. Administrators at AirMedia offices off-site can schedule playlists, set up content layouts, update last minute changes, and provide proof-of-play for their customers.

AirMedia’s newest digital signage network will be installed in Beijing Airport’s recently built Terminal 3, with the first installment in the baggage claim area, and the second phase at the entrance gates for the domestic and international departure halls.

The WebDT SA3000 by DT Research features the Intel Core 2 Duo processor, Microsoft® Windows® XP Embedded operating system, and full high-definition resolution, up to 1920x1080. With options for wireless networking, the SA3000 supports major media file formats, real-time or scheduled content playback, flexible screen layouts with multiple zones and layers, and automatic content download recovery. When connected to a display, the WebDT Signage Appliance is ready to deliver timely, targeted communications to capture an audience’s attention at key decision-making locations.

About DT Research

DT Research™ develops and manufactures web-enabled information appliances for vertical applications. The WebDT family of products is based on thin computing platforms for secure, reliable, and cost-effective computing. WebDT products include digital signage solutions, wireless tablets, point-of-service handhelds, compact modular systems, and display-integrated information systems. These systems emphasize mobility, wireless connectivity and touch displays. Powered by Windows® Embedded and Windows XP operating systems, WebDT devices offer durability and ease in integration, leading to solutions that can be remotely managed with the comprehensive WebDT Device Manager software. For more information, visit http://signage.dtri.com / www.dtresearch.com.

DT Research and WebDT are trademarks of DT Research, Inc. All other brands and product names may be trademarks and/or registered trademarks of their respective owners.

Intel and Intel Core are trademarks of Intel Corporation in the U.S. and other countries.

 

Julia Lin

Marketing Manager

DT Research Inc. Taiwan Branch

Tel: 02-2351-4101 ext. 121

Fax: 02-2351-4102

Cell Phone: 0932070806

Skype: julia529

Visit us:

http://www.dtresearch.com

http://signage.dtri.com

Posted by Staff at 03:07 PM | Comments (0)

July 27, 2009

Internet Connectivity and Security Primer

Article goes begins with explanation of types of VPN networks, moves next to understanding IPsec, then finishes with Encryption.


source link

Understanding IPsec

Excerpt:

I’ve mentioned the IPsec protocol a few times, so let’s now take a moment to discuss the role it plays. First, the name IPsec is short for IP Security, which is a suite of subprotocols (much in the same way that TCP/IP is a suite of subprotocols) that is used to protect data crossing a network. Because IPsec operates at the network layer of the OSI model, it can protect data from the transport layer and above. This means that IPsec can protect any type of TCP- or UDP-based communication. This gives IPsec a large advantage over other encryption protocols, such as SSH and SSL. These encryption protocols work at the transport layer and are restricted to specific ports. For example, SSH encrypts only TCP port 22 by default, and SSL encrypts only TCP port 443 by default. You might be wondering, “Why is IPsec a suite of protocols? Isn’t it just supposed to encrypt the data?” Excellent question. There are a couple ways to answer this. First, the makers of IPsec realized that there was far more to protecting data than just performing encryption. Encrypted packets can still be captured and used maliciously. For example, say you send some data encrypted using IPsec that transfers $1,000 to a bank account. An attacker could capture the data and resend it many times to cause multiple transfers to go through, even though the attacker cannot see the actual data in the packet. The second answer to the question is a little more complex. IPsec is considered a suite of protocols, but it is unable to provide any direct security features in and of itself. Now, if that doesn’t blow your mind, nothing will! Here’s the idea: IPsec is better described as a framework of protocols, as shown in Picture-4

Picture-4

Each of the categories shown in Picture-4 (IPsec Protocol, Encryption, Authentication, and DH) is an open hole to be filled with a standard. Think of these holes as being like an audio CD player. The CD player doesn’t choose what type of music to play; that’s the job of the CD. When you put in a jazz CD, the CD player reads the data and outputs jazz sounds to the speakers. In the same way, the IPsec protocol acts as a “player” for whatever type of security you want to add. This is extremely powerful, because it allows the IPsec protocol to continue to be used regardless of advances in cryptography. For example, 20 years from now, many of the encryption methods we use today will probably be obsolete or considered extremely weak.

With the IPsec protocol framework, we can remove those older encryption standards and plug in new ones. The IPsec protocol itself does not change! Now that we’ve discussed the IPsec protocol framework, let’s get a basic understanding of the function of each of those holes.

Encryption

Encryption is officially called data confidentiality. Its function is to make any data that you send unreadable to unauthorized devices and yet understandable to authorized devices. To fully understand how this is possible, you would need to read a book on data cryptography. (Warning: These books typically weigh more than a small car and are guaranteed to put most people to sleep within minutes.) Rather than get into advanced cryptography, let me give you the basic premise. Each device that wants to encrypt or decrypt data needs the appropriate key. A key is an extremely advanced mathematical formula that is designed to scramble data when it is sent between devices.Picture-5 illustrates this process.


Picture-5
Based on the figure, the encryption steps are as follows:

Clear-text (unencrypted) data is sent to the encryption algorithm (key). The key runs the data through a sophisticated mathematical formula that renders the data unreadable.
The encrypted data is transmitted across the potentially unsecured network and is received by the destination device.
The destination device uses the same key to decrypt the scrambled data, returning it to its original, clear-text form.
This process is technically called symmetric encryption. In this type of encryption, the same key is used to encrypt and decrypt data. It is a faster, more efficient style of encryption. Asymmetric encryption uses two keys: one to encrypt and another to decrypt. We’ll talk about asymmetric encryption in a moment. Although many symmetric encryption algorithms are available, three types of symmetric encryption commonly are used to secure data. Each one offers varying levels of encryption strength:

Data Encryption Standard (DES) algorithm: DES was one of the first encryption algorithms to be used. It was originally developed by IBM to support a 56-bit key (the longer the key, the more secure the algorithm). By today’s standards, DES is considered a relatively weak encryption method.

Triple DES (3DES) algorithm: To address the weaknesses of DES, the 3DES algorithm was produced. This algorithm did not reinvent the wheel of encryption. Instead, it ran the DES algorithm three times with different encryption keys (thus the name 3DES). This significantly improved the strength of the original DES algorithm.
Advanced Encryption Standard (AES): AES is one of the newer encryption algorithms. It was created by Rijndael (a group of two Belgian cryptographers) in response to a competition created by the National Institute of Standards and Technology (NIST)—a division of the U.S. government. It was designed to increase encryption strength beyond the DES and 3DES standards and yet be more efficient on the device’s processor. As it stands today, AES offers 128-, 192-, and 256-bit encryption.
Diffie-Hellman:

The Diffie-Hellman (DH) key exchange algorithm addresses a gigantic missing piece of the symmetric encryption systems we just talked about. Again, the symmetric encryption algorithms (including DES, 3DES, and AES) use a “shared key” approach in which the same key can encrypt and decrypt data. This is very efficient on processing cycles, but it raises a question. If the same key encrypts and decrypts data, how do both of the devices get the key? Simple! The devices just send the key to each other over the network. So, next question: If they just send the key to each other over the network, couldn’t someone intercept the key and use it to decode all the transmissions? Ah, now that is the problem, and this is where the DH key exchange algorithm comes in.

The goal of the DH algorithm is to give devices a way to securely exchange the shared key over a public network. To accomplish this, it uses an advanced process in which both endpoints exchange results to a mathematical formula over a clear network. Using these results, each VPN endpoint can determine a shared secret value that is used to generate symmetrical encryption keys (which are much easier for the devices to process) to use for the VPN session.

The DH key exchange algorithm uses monstrously huge numbers (some more than 300 digits long) to accomplish its mathematical cryptographic process. Although DH is much more secure than symmetric encryption, it is much harder on the device’s processor. This is why DH cryptography is used only briefly at the start of the session to generate symmetric encryption keys.

Secure Socket Layer (SSL):

Although the Diffie-Hellman algorithm has long been used to secure symmetric encryption key exchange over a public network, SSL is a cryptographic protocol that provides secure communications over the Internet for things such as web browsing, instant messaging, and email. It is discussed here because SSL VPNs are continuing to increase in popularity.

As with Diffie-Hellman, the goal of SSL is to provide secure communications over a public network. To accomplish this, SSL uses a dual-key approach. Each device uses a public and private key system. These keys are reverse mathematical formulas to each other. In other words, anything that the public key encrypts, the private key can decrypt. Anything that the private key encrypts, the public key can decrypt. The public and private keys use mathematical algorithms that are so complex that it is impossible for someone who has one key to generate the opposite. For example, if you have a public key, it is feasibly impossible to figure out what the private key is, and vice versa. With this in mind, look at Figure 24.6, which illustrates the key exchange process.


Picture-6
The SSL key exchange goes through the following steps:

PC1 and PC2 send each other their respective public key encryption formula.

One of the devices (PC1 in this example) generates a shared-secret key (symmetric encryption) that will be used to encrypt and decrypt data for the session.

PC1 encrypts the shared-secret key using the public key of PC2 and transmits the key to PC2.

PC2 decrypts the shared-secret key using its private key. Now that both PC1 and PC2 have the same shared-secret key, it can and will be used to encrypt and decrypt all communication for the secured session.
SSL uses asymmetric encryption (public and private keys) at the start of the conversation to provide a secure exchange of a shared secret key. As soon as the devices have the shared secret key, the SSL session converts to using symmetric encryption because it is much more efficient on the device’s processors.

Authentication/Data Integrity:

When many IT people think of authentication, they equate it to entering a username and password to log on to a PC. This form of authentication is designed to verify that the person using the computer is who he says he is. Authentication as it applies to IPsec performs a similar, but not identical, job. When sending data over an unsecured network, you must ensure that the data received is exactly the same as the data sent and that the data is received from a trusted source. If the data changed somewhere between the sending and receiving devices, the security protocol should detect the change and reject the data.

Authentication is often used synonymously with the terms data integrity and hashing in the IPsec world. Technically speaking, authentication verifies that the device sending the data is the “true” device (not a fake). Data integrity ensures that the data does not change from one end to the other.

The process to accomplish data integrity is similar to encryption, but with a slightly different angle. As with encryption, hashing passes all the data contained in the packet (above Layer 3) through a mathematical algorithm. However, the job of this mathematical algorithm is not to scramble the data, but rather to come up with a result, which is known as the hash. As an example, the mathematical algorithm might say something like “Add up all the vowels in this data packet,” and the result might be 96. This result (known as the hash) is then appended to the end of the data and is sent to the receiver, as shown in Picture7.

The step-by-step hashing process goes like this:

The sending device passes the data to be transferred through a hashing algorithm and comes up with a result (the hash).

The hash is appended to the data and is sent to the receiving device.

The receiving device receives the data and runs it through the same hashing algorithm to generate a result. The result is then compared to the result that was originally appended to the data. If the hashed values are the same, the receiving device is assured that the data did not change during transmission. If the values are different, the data did change, and the receiving device discards it.

Picture-7
The hashing algorithm is obviously much more complex than simply adding up all the vowels in the data. Currently, two widely supported hashing algorithms are used:

Message Digest 5 (MD5) was created in 1991 by Ronald Rivest, an MIT professor. Uses a 128-bit hashing algorithm.

Secure Hash Algorithm 1 (SHA-1) was published in 1995 by the NIST to increase the strength of the original MD5 algorithm. Generally uses a 160-bit hashing algorithm.

As with encryption, the more bits that are used in the hashing algorithm, the stronger it becomes. You should use the strongest hashing algorithm that your VPN platform supports.

IPsec Protocols

The final “piece” of the IPsec framework is the IPsec protocol itself. As I mentioned, the individuals who created IPsec wanted it to be a protocol that would last through the ages. To make this happen, they even granted the flexibility to change the entire protocol engine! Today we use blocks such as Diffie-Hellman, encryption, and authentication, but maybe in 10 years some new security method will be added to the bundle. Perhaps biometric VPN security will be an option. Users would be required to complete a retinal scan to authenticate to the VPN (I can feel my sci-fi movie self emerging). We might need to add a “retinal block” to the IPsec protocol framework that is required for VPN establishment.

Okay, my example is a little out there, but the concept is sound. The IPsec protocol framework can be extended to support future security methods. Currently, you can use two “engines” for IPsec:

Authentication Header (AH): The AH protocol was the first IPsec engine to be released. It supported only authentication (verifying the sending and receiving devices) and data integrity (ensuring that data does not change in transmission). AH does not support any encryption.
Encapsulating Security Payload (ESP): The ESP protocol was the second IPsec engine to be released. It filled in the massive missing piece of AH: encryption. The ESP protocol supports all three pieces of the IPsec framework: authentication, data integrity, and encryption. Because of this, it is by far the more popular of the two IPsec engines.

source link

Posted by Staff at 08:30 PM | Comments (0)

July 23, 2009

Energy Consumption - Low Power LCDs

NEC LCD Technologies to Expand Lineup of LCD Modules Featuring White LED Backlight Systems for Industrial Applications. 15" LCDs as low as 11W is pretty cool stuff.

TOKYO, SANTA CLARA, California, U.S.A., DÜSSELDORF, Germany, May 11, 2009 ---NEC LCD Technologies, together with its sales and marketing channels in the Americas and Europe, NEC Electronics America, Inc. and NEC Electronics (Europe) GmbH, today introduced four new amorphous-silicon thin-film-transistor (TFT) liquid crystal display (LCD) modules incorporating a newly designed LED light source unit into the backlight system. These units offer long operating life: 70,000 hours at room temperature (25 degrees Celsius) and 60,000 hours at high temperature (70 degrees Celsius).

The new products expand NEC LCD Technologies’ already extensive line-up of TFT LCD modules with white LED backlight systems. The new part numbers, screen sizes and resolution are as follows.

Part Number Screen Size Screen Resolution
NL10276BC30-34D 15.0-inch (38 cm diagonal) XGA (1024 x 768 pixels)
NL10276BC20-18 10.4-inch (26 cm diagonal) XGA (1024 x 768 pixels)
NL8048BC24-09D 9.0-inch (23cm diagonal) WVGA (800 x 480 pixels)
NL8048BC19-11D 7.0-inch (18cm diagonal) WVGA (800 x 480 pixels)

The main characteristics of the new models are:

• NL10276BC30-34D - 15.0-inch XGA LCD module:
- Largest display size in the company’s lineup of white LED backlight products.
- Maintains mounting and signal compatibility with the company’s lineup of conventional cold cathode fluorescent lamp (CCFL) LCD modules.
- Features a wide operating temperature range from -20 to +70 degrees Celsius.

• NL10276BC20-18 - 10.4-inch XGA LCD module:
- High-resolution display for 10.4-inch screen size.
- Achieves approximately 30 percent reduction in weight and approximately 40 percent reduction in frame area compared to the company’s CCFL modules.
- Maintains signal compatibility with the company’s current line of conventional products.
- Features wide operating temperature range from -30 to +80 degrees Celsius.

• NL8048BC24-09D 9.0-inch WVGA LCD module and NL8048BC19-11D 7.0-inch WVGA LCD module
- Ultra-wide viewing angles of 176 degrees both horizontally and vertically, using NEC LCD Technologies’ proprietary SFT technology.
- Maintains mounting and signal compatibility with the company’s lineup of conventional CCFL LCD modules.
- Features a wide operating temperature range from -20 to +70 degrees Celsius.

Increasing demand for LCD modules featuring low power consumption, smaller dimensions, lighter-weight and higher resistance to shock and vibration has prompted the development of LCD modules equipped with white LED backlight systems. White LED backlight systems offer superior performance in power consumption, compact designs as well as greater resistance to shock and vibration as compared to CCFL LCD modules. In addition, white LEDs do not require inverter circuits, which generate high-frequency noise and harmonic currents that may cause malfunctions in peripheral devices and hinder precise testing results. White LEDs are completely mercury-free and pose fewer hazards to the environment than CCFLs, which contain trace amounts of mercury.

In response to the growing demand for white LED LCD modules, NEC LCD Technologies has aggressively developed a product lineup featuring white LED backlights beginning with the launch of a 6.5-inch LED LCD module (part number NL10276BC13-01C) in May 2007. In September 2008, the company introduced five new white LED LCD modules designed specifically for industrial applications and featuring NEC’s newly designed long-life (up to 70,000 hours) white LED light source unit. The four new white LED products introduced today further expand NEC’s long-life white LED LCD product offerings.

NEC LCD Technologies will continue to enhance its lineup of LCD modules featuring white LED backlight systems to address the needs of various industrial applications. The company also seeks to broaden the range of environments in which LCD modules can be used and to develop new fields of application.

Two of the new LED LCD modules (part numbers NL10276BC30-34D and NL10276BC20-18) will be showcased at the NEC Group booth at the 12th Embedded System Expo (ESEC) at Tokyo Big Sight in Tokyo, Japan, May 13-15, and in the NEC Electronics America booth (#459) at the Society of Information Display (SID) Display Week 2009 at the Henry B. Gonzalez Convention Center in San Antonio, Texas, June 2-4.


Main specifications of the new LCD modules can be found in the attachment.
- Main specifications of the new 15.0-inch model NL10276BC30-34D (XGA)
- Main specifications of the new 10.4-inch model NL10276BC20-18 (XGA)
- Main specifications of the new 9.0-inch model NL8048BC24-09D (WVGA)
- Main specifications of the new 7.0-inch model NL8048BC19-11D (WVGA)

About NEC LCD Technologies, Ltd.
NEC LCD Technologies, Ltd. is one of the world's leading providers of high-quality, innovative, active-matrix liquid crystal display (AM-LCDs) modules for the industrial and high-end monitor markets. The company focuses its development on four core technology areas: 1) ultra-wide viewing angle SFT technology with high luminance, wide color gamut and fast response; 2) NLT technology for high visibility in any kind of ambient light environment; 3) VIT technology to add extra value to LCD modules; and 4) adaptive design technology, which together meet a variety of specialized needs for the flat panel display markets. NEC LCD Technologies' worldwide support includes sales and marketing affiliates NEC Electronics America, Inc. (www.am.necel.com) and NEC Electronics Europe (www.eu.necel.com) that offer specialized display solutions to their respective markets. NEC LCD Technologies employs approximately 1,200 people worldwide and offers one of the broadest product portfolios for the medical, factory automation, test and measurement, entertainment, kiosk, POS and ATM markets. Additional information can be found at http://www.nec-lcd.com/en/index.html.

http://www.nec-lcd.com/en/release/release_090511.html

Posted by Staff at 08:10 PM | Comments (0)

July 17, 2009

VIA's Eden CPU In Fujitsu FUTRO S100 Thin Client

futro-s100.jpgHotHardware calls out new Futro from Fujitsu thin client. Low power consumption of 11 watts called out. VIA VX800 cpu. Completely solid-state. Linux eLux, VMware, Citrix and Windows CE.

From HotHardware

Friday, July 17, 2009 - by Shawn Oliver

We can remember a time when VIA was rarely mentioned when talking CPUs, but now the company has made a ferocious comeback that has its processors slipping into netbooks, small form factor PCs and now, Fujitsu thin clients.

Starting today, Fujitsu will utilize VIA's Eden ULV (Ultra Low Voltage) processor for its next generation FUTRO thin client series. Said chip will provide 500MHz of power with a low TDP of just one watt. The first FUTRO to featur ethe chip will be the S100, a completely fanless and silent thin client and virtual workplace solution.

VIA's angle is that more and more companies are selecting its low-power CPUs due to the benefits of going green, and in fact, the entire S100 system under full load will only eat up 11 watts. Richard Brown, Vice President of Marketing, VIA Technologies, didn't hesitate to brag about the occasion:

"Our VIA Eden ULV processors allow the creation of a new class of fanless and silent devices that are today seeing significant growth in the enterprise. The FUTRO thin client series from Fujitsu represents the leading edge of energy-efficient client computing, something we are proud to be a part of."


The Fujitsu FUTRO S100 thin client is designed for server-based computing and virtual workplace solutions and contains no moving parts, and aside from the 500MHz CPU, you'll also find a VIA VX800 media system processor, two USB 2.0 sockets, a VGA port, fast Ethernet and flash-based storage. There's also VIA's own Chrome9 HC3 graphics set and compatibility with a range of server client infrastructures including Linux-based eLux RL and eLux Lite, VMware, Citrix and Windows CE 6.0. Pricing has yet to be revealed, but it's available now for consumers who inquire.

Fujitsu thin client catalog

Posted by Staff at 02:43 PM | Comments (0)

July 16, 2009

VDA by Wyse catching lots of press

Wyse is proud to announce our newest software innovation, Virtual Desktop Accelerator (VDA). Wyse VDA is a software-based solution for Wyse thin clients and supported PCs. Wyse VDA delivers the best user experience for the network bandwidth allocated to users, neutralizes the effects of network delays (latencies) and errors (packet loss) for thin computing, making it suitable for more remote-site, branch, or field-based users. Wyse VDA is one more reason to choose Wyse thin-computing solutions over the competition. Our commitment and investment in making thin computing better for users of Wyse thin clients and PCs is a testament to our total solution focus and approach.

Wyse eases traffic jams for thin clients
EE Times, by Rick Merritt

Thin-client maker Wyse launches software to shrink data centers
VentureBeat, by Camille Ricketts

Wyse VDA Accelerates Cloud Computing over Long Haul
Channel Insider, by Jessica Davis

Wyse Launches Virtual Desktop AcceleratorWyse Launches Virtual Desktop
Accelerator
ecoINSITE

Wyse: Continent-Spanning Virtualization Saves Data Center Costs
Greentech Media, by Jeff St. John

A purpose-built-for-remote-display-protocols, software-only WAN
accelerator from... Wyse
Brian Madden

VDI for the Long Haul
ITBusinessEdge, by Arthur Cole


Virtual Strategy Magazine Podcast

Wyse VDA software can be purchased for both Applications (MS Terminal
Services/ Citrix XenApp) or Desktop (Citrix XenDesktop/ VMware View)
Virtualization. It is also built in to the Wyse ThinOS 6.4 devices.
For more information on Wyse VDA or to download a trial version, see

http://www.wyse.com/products/software/vda

Posted by Staff at 08:43 PM | Comments (0)

Case Study PR: Symbio Technologies Helps Save Technology in Bankrupt California Schools

NEW ROCHELLE, NY, July 16, 2009--Symbio Technologies (www.symbio-technologies.com), the leader in stateless thin client computing, has put its skills to work to help bankrupt schools in California bring new life to old computers. Using its expertise in LTSP (Linux Terminal Server Project), Symbio has helped schools re-use their existing workstations and finally find a use for the many outdated machines they receive as donations. The Linux Terminal Server Project is a free, open source add-on to Linux that allows people to access applications and data on a central server. Members of Symbio's team have been core developers of LTSP.

The situation in California has reached dire proportions. As the Contra Costa Times reported, the state's school chief Jack O'Connell declared recently that "unless drastic budget cuts come at the local level, many California school districts may be unable to pay the bills in the next two years."

"While drastic cuts to public education may be necessary," noted Symbio's CTO, Gideon Romm, "cutting out technology in schools in the twenty-first century is like depriving students of pencils and paper."

Pained by California's plight, Symbio offered its expertise in LTSP as a solution to the school districts' problems.

Over the course of one week, Symbio was able to set up an environment that would convert hundreds of old computers into fully functional, high speed desktops with access to all of the Microsoft applications the school needed, as well as a host of free Linux offerings that provide teachers with additional instructional tools.

"We are gratified to be able to play a role in helping the school children of California," said Romm. "Using LTSP here is an example of open source technology at its finest."

About Symbio Technologies

Symbio Technologies reduces the cloud computing revolution to a plug-and-play, appliance-based solution. Certified and accredited by the US Department of Energy, the security-hardened Symbiont Boot Appliance makes network deployments simple, consistent, reliable, and secure. With this technology, organizations can reuse existing equipment, connect to the cloud through numerous protocols, and meet their security objectives. Symbio's products are available worldwide through a network of distributors, value-added resellers and integrators in Australia, Canada, Chile, Egypt, Mexico, Pakistan, South Africa, and the U.K., as well as throughout the U.S.

###

Posted by Staff at 06:39 PM | Comments (0)

Wyse Attacks Latency with proxies, new protocol

Wyse manages to speed up RDP and ICA by factor of 3. Ditches TCP layer for custom transport protocol. Writeup by Ars Technica and Jon Stokes.


source link

Last Wednesday, terminal vendor Wyse Technology unveiled its latest salvo in the "thin" vs. "fat" client wars, the Virtual Desktop Accelerator. While Wyse still makes terminals, it has also gotten into the virtualization-based thin client game, but of course the main weakness in the thin client model is the connection—specifically, connection latency. For real-time interactive applications, latency is a much bigger problem than throughput, because high latencies degrade the user experience.

Wyse's engineers have worked on a solution to the latency problem, which can be acute for a thin client where the datacenter is located across the country or across the ocean. They came up with a hybrid approach that involves proxies, tunneling, error correction, and ditching the TCP layer for a custom transport protocol that runs on top of IP. All of this goes into VDA, which accelerates Remote Desktop Protocol (RDP) and Independent Computing Architecture (ICA) in order to speed up connections to Citrix XenApp, Citrix XenDesktop, VMware View, Microsoft Terminal Server, and Microsoft Hyper-V VDI.

We spent some time talking to some Wyse engineers this past Friday, and they were understandably reluctant to get too explicit about how VDA achieves what Wyse claims is up to a 3x speedup on RDP and ICA. But they did share the general outlines of what they're doing.

On the client side, ICA and RDP traffic is redirected to the VDA proxy, which then communicates directly with a server-side proxy. This use of proxies means that the software at each end of the connection doesn't know that anything different is going on with the connection itself.

The two VDA proxies then use a custom transport layer that's optimized for interactive communication by using error correction to minimize the number of packet resends. The Wyse folks told me that their transport can drop whole packets, but there's often enough error correction there to reconstruct the lost packet without requesting a resend.

Rest of article

Posted by Staff at 02:28 PM | Comments (0)

Google and Microsoft Announcements Suggest a Thin Client Future

Opinion piece on thin client and latest Google and MS announcements. The major MS announcement being that somehow they are going to make Office available for free via the web. Somehow I think that won't include Exchange but then who knows.

by Chris Howard Jul 15, 2009

Source Link

On June 14, 2005, I wrote an article proposing over a future filled with thin client technology. Reader response was negative, generally suggesting thin-client would come to nothing and that people wouldn't trust their personal files to the internet. But recent announcements by Google and Microsoft have renewed my expectation of a thin-client future, a future where you won't need a powerful computer, as the applications will be delivered over the web to your browser (like Google Docs) and all the processing is done on the host server.

Also, recently I had an interview with a manufacturing come and was pleasantly surprised to find it ran thin-client technology. And a few weeks before that I eavesdropped a conversation in my local cafe of three executive types, and one of them pulled out a thin-client terminal and told his peers it was the way of the future.

In the enterprise, thin client is still alive and kicking, and still growing.

Google Chrome OS will kick off the push to get thin-client into the home and Microsoft wasted no time announcing it was getting on that train too.

I am still a netbook skeptic but Google's approach undermines my resolve a little. The big problem with netbook marketing of the last 12 months has been its portrayal as a desktop (and/or laptop) computer. This is why demand has grown for larger and larger screens on netbooks. Initially netbooks were 7", now they are as large as 12", which is defeating the whole philosophy of netbooks.

Conversely, the iPhone has seen massive success as an internet device - despite its tiny screen - which suggests people would be quit happy with small screens on their internet device. So a 7" netbook screen was a good size. They just needed a different interface.

Google's entry into netbooks reclaims the netbook as an internet device. Being essentially a thin-client device, it by its nature defines expectations. There can't be any confusion about what it can and can't run. Salesmen won't be able to mislead you into thinking it can replace your laptop or desktop needs.

I still wouldn't get one because I'm exceptionally happy with my iPhone. It does for me most of what I would use a netbook for. And for those tasks the iPhone can't perform, I have the MacBook.

But iPhones are only 20% of the smartphone market, and therefore a small part of the entire mobile phone market. Therefore, many of the non-smartphoners could well take to the Google netbook when looking for an internet device.

And this would be the beginning of the move of the thin-client concept into the consumer market.

It's only been four years since my article but things have changed so much. Online storage has boomed (eg DropBox), Google has entered the web-app space (which again store your docs online), social networking has taken off, and people are trusting the internet more than ever.

That article makes interesting reading now. Mostly I think I was getting it right. However, I did predict Microsoft would be the greatest beneficiary of thin-client. But it seems Google is trying to overtake it. Which might explain Microsoft's announcement "that Office Web applications will be available ... through Windows Live, where more than 400 million consumers will have access to Office Web applications at no cost". Not that I'm suggesting it was an announcement in reaction to Google's Chrome OS.

Apple has also dabbled a bit in a future of thin clients delivering web based apps. It has iWork.com that currently only allows you to share your iWork files online and have others annotate them. It's not hard to imagine Apple working on online version of iWork that allows editing.

It also stuck its toe in the water with the first iPhone, which ran web-based apps. But without any serious apps from Apple itself to support the concept, web-based apps on the iPhone floundered and sunk. Thereafter Apple brought out the iPhone SDK and the app store and things went a little nuts.

Thin-client won't be for everyone immediately. Netbooks will be the beginning as they are ideally suited, being firstly web devices. But as the internet evolves, you'll see more and more desktop functionality migrated to web based apps, until one day you'll realise it's the way you mostly work.

Google and Microsoft's announcements serve to confirm thin-client is coming to a consumer near you.

Posted by Staff at 02:24 PM | Comments (0)

PR: 2X Software Named a CRN Emerging Technology Vendor

2X Software Named a CRN Emerging Technology Vendor -- Strong Virtual Computing Product Line and Clear-Cut Licensing Draws Praise from CRN Editorial Panel

Dallas, TX, July 8, 2009 – 2X Software, the global developer of server-based computing software, announced today it has been selected by Everything Channel as a CRN Emerging Technology Vendor. The company was added to the list due to its robust product line, which includes the 2X ApplicationServer for Windows Terminal Services, 2X LoadBalancer for Terminal Services/Citrix, 2X ThinClientServer and the 2X VirtualDesktopServer. 2X products drew praise for offering easily scalable, installable and manageable solutions with straightforward licensing, resulting in product prices far below those of their competitors. CRN's Emerging Technology Vendor list captures companies that are delivering high margins for solution providers with innovative and easy-to-use technology that undercuts industry giants.

Of special interest to the panel was 2X Software’s latest product, the 2X VirtualDesktopServer. The VirtualDesktopServer improves virtual desktop manageability, security and performance, helping companies experience the full benefit of desktop and application virtualization. The product is hosted on a variety of virtualization platforms, and helps to lower companies’ operating costs by delivering secure, centrally managed access to virtual desktops and applications. Specific features of the VirtualDesktopServer include the following:

Publishing of virtual desktops and applications, rather than local installation
Use of the same client to connect to virtual desktops and terminal server applications
Automatic suspension of inactive virtual desktops for maximum server efficiency
Publishing of Windows applications and virtual desktops to Linux and Mac
Publishing of applications to a terminal server farm
Universal printing
Supports a variety of virtualization platforms, including VMware, Sun VirtualBox, Microsoft Virtual Server, Microsoft Hyper-V, Virtual Iron and Parallels
Integration with 2X LoadBalancer
Windows 2008 and 64-bit ready
2X Software’s reseller program has grown significantly in recent months. 40% of 2X’s 1,200 resellers have joined within the past 12 months, highlighting the growing public attraction to the 2X brand. 2X plans to continue to grow its reseller ranks through significant discounts, the 2Xpert Certification Program, cooperative marketing opportunities and Tier-2 technical support. 2X is especially focused on growing its business with channel partners, particularly SMB and enterprise-focused solution providers.

"Solution Providers seek out innovative vendors that create new and innovative ideas to help them build revenue and customer loyalty. Our Emerging Tech list is where Solution Providers go to find these vendors. We congratulate all of the vendors for their innovation and creativity and their commitment to the technology sales channel," said Robert C. DeMarzo, senior vice president and editorial director, Everything Channel.

The vendors who make the CRN Emerging Technology Vendor list were founded in 2001 or later, have revenue under $1 billion and have an active U.S. channel strategy. Final selection to the Emerging Technology Vendor list was made by the CRN editorial team after a review of submitted information.

Nikolaos Makris, CEO of 2X Software, stated that "2X Software is pleased join the ranks of CRN’s Emerging Vendors for 2009, and we welcome the recognition the addition brings to our robust product line. We look forward to benefitting from future publicity opportunities to highlight the advantages of 2X products to CRN vendors and subscribers alike."

About 2X
2X Software Ltd - 2X - is a company developing software for the booming server-based computing market. Thin client computing controls spiraling PC management costs, centralizes application and desktop management, improves security and performance and allows users to work remotely. The company’s product line includes: 2X ThinClientServer, 2X LoadBalancer for Terminal Services/Citrix, 2X ApplicationServer for Windows Terminal Services and 2X VirtualDesktopServer. 2X is a privately held company with offices in the USA, Germany, UK, Cyprus and Malta. Its management team is backed by years of experience in developing and selling network infrastructure software. 2X is a Microsoft, IBM and VMware partner. For more information visit: http://www.2x.com/.

About Everything Channel
Everything Channel is the one-stop shop for accessing, enabling, managing and accelerating technology sales channels. From branding and recruiting to marketing and sales, Everything Channel offers technology marketers the unmatched breadth and depth of global brands and market intelligence combined with unparalleled audience loyalty and credibility serving all technology sales channels through an extensive database. Everything Channel provides innovative sales and marketing solutions to arm the sellers of technology with the resources they need to achieve measurable and significant results. For more information, visit: http://www.everythingchannel.com/.

About United Business Media Limited
UBM (UBM.L) focuses on two principal activities: worldwide information distribution, targeting and monitoring; and, the development and monetization of B2B communities and markets. UBM’s businesses inform markets and serve professional commercial communities - from doctors to game developers, from journalists to jewelry traders, from farmers to pharmacists – with integrated events, online, print and business information products. Our 6,500 staff in more than 30 countries are organized into specialist teams that serve these communities, bringing buyers and sellers together, helping them to do business and their markets to work effectively and efficiently. For more information, visit: http://www.unitedbusinessmedia.com/.

For more information:
Please email Ryan Pope on [email protected]
URL: http://www.2x.com

Posted by Staff at 02:17 PM | Comments (0)

Open Source Software - Government Agencies Starting to Use

Article on how the US Postal Service and others in government are beginning to embrace less costly open source software alternatives in an effort to trim costs. In one case it also involves migrating from Solaris to SUSE so not just the mainframes impacted.

Agencies open up to open-source software

By GCN Staff
Jul 15, 2009

The U.S. Postal Service is the latest government agency to embrace open-source software in an attempt to lower its information technology operating costs by standardizing its mainframe-based tracking system on the open-source — and less expensive — Linux operating system.

The Postal Service is moving 1,300 Sun Solaris midrange servers to a Hewlett-Packard Linux environment, using Novell’s SUSE Linux on the mainframe and distributed computing platforms to forge greater interoperability between the two environments.

Other agencies that are using open-source software include:

The Homeland Security Department, which is funding a program that will help federal, state and local agencies better understand their options for using open-source software.

The Defense Information Systems Agency, which is planning to open source a suite of programs that it developed for administrative tasks. The agency has signed a Cooperative Research and Development Agreement with the Open Source Software Institute to help release the source code of the programs.

The Defense Department, which launched the Forge.mil Web site earlier this year for developers to work on open-source software projects specifically for DOD.

NASA's Goddard Space Flight Center, which has established a Web site for open-source projects developed by center personnel for mission needs.

source link

Posted by Staff at 01:55 PM | Comments (0)

July 14, 2009

Cisco Chooses Wyse Technology to Demonstrate Optimum User Experience

Wyse gets boost from Cisco as demo platform for Ciscos UCS (Unified Computing Solution) during conference July 1.

SAN FRANCISCO, July 13 /PRNewswire/ -- Wyse Technology, the global leader in thin computing and client virtualization, today announced that Padmasree Warrior, Chief Technology Officer of Cisco Systems, chose the Wyse V10L thin client to demonstrate Cisco's unified computing solution (UCS) during her keynote at the Cisco Live conference in San Francisco on July 1.

(Photo: http://www.newscom.com/cgi-bin/prnh/20090713/SF45108)

In front of thousands of Cisco customers and partners, Warrior demonstrated how to provision and access a virtual desktop through a Wyse thin client. The demonstration used Cisco technology and the most secure operating system, Wyse ThinOS, found in the Wyse V10L, providing a flawless experience - without using any PCs.

As Chief Technology Officer, Warrior helps drive Cisco's technological innovations and strategy, and leads its cross-company initiatives on Cloud Computing, Desktop Virtualization, and cross-functional team that helps drive the company's growth priorities.

"Choosing Wyse to help Cisco demonstrate their technology vision during Cisco Live definitely communicates Wyse's leadership in the thin computing market," said Ricardo Antuna, Senior Vice President of Product Management and Business Development and Alliances for Wyse Technology. "This is the second time in about two months that a major keynote speaker has used our solutions to deliver their technology announcement, the first being Citrix CEO Mark Templeton at Citrix Synergy in May."

The versatile and high-performing Wyse V10L thin client is unique in the industry. Its powerful energy saving design uses only 10% of the energy used by a PC, its ultra-thin operating system boots in seconds, automatically updates itself, and delivers the administrative simplicity IT needs. The Wyse V10L delivers rich voice, data, and video better than competing devices, and is truly virus and malware proof.

The Wyse V10L is available now and can be found at: http://www.wyse.com/products/hardware/thinclients/V10L/index.asp

See the Wyse V10L in action during Warrior's keynote:

http://www.cisco-live.com/attendees/keynotes#warrior

Posted by staff at 02:15 PM | Comments (0)

July 08, 2009

Google Plans a PC Operating System - Windows is just an OS2 now...

No surprise here except sooner than expected. Google is after netbooks which can qualify as thin terminals. Already has Android for mobile. Would you rather develop an app for the net, or for Windows is the question that seals the fate of MS. Windows it seems has been ironically transformed into an OS/2 it seems :-)

Google Plans a PC Operating System

By MIGUEL HELFT and ASHLEE VANCE
Published: July 8, 2009

SAN FRANCISCO — In a direct challenge to Microsoft, Google announced late Tuesday that it is developing an operating system for PCs that is tied to its Chrome Web browser.

The software, called the Google Chrome Operating System, is initially intended for use in the tiny, low-cost portable computers known as netbooks, which have been selling quickly even as demand for other PCs has plummeted. Google said it believed the software would also be able to power full-size PCs.

The move is likely to sharpen the already intense competition between Google and Microsoft, whose Windows operating system controls the basic functions of the vast majority of personal computers.

“Speed, simplicity and security are the key aspects of Google Chrome OS,” said Sundar Pichai, vice president of product management, and Linus Upson, engineering director, in a post on a company blog. “We’re designing the OS to be fast and lightweight, to start up and get you onto the Web in a few seconds.”

Mr. Pichai and Mr. Upson said that the software would be released online later this year under an open-source license, which would allow outside programmers to modify it. Netbooks running the software will go on sale in the second half of 2010.

The company likely saw netbooks as a unique opportunity to challenge Microsoft, said Larry Augustin, a prominent Silicon Valley investor who serves on the board of a number of open-source software companies.

“Market changes happen at points of discontinuity,” Mr. Augustin said. “And that’s what you have with netbooks and a market that has moved to mobile devices.”

Rest of article on NY Times - recommended

Posted by Staff at 02:49 PM | Comments (0)

July 01, 2009

WebDT SA3000 Powers Digital Signage with Dynamic Full HD Video

InfoComm – Orlando, FL – June 18, 2009 - DT Research™, Inc., an industry leader in the development of information appliances for vertical markets, today announced the release of the SA3000, a new signage appliance in the WebDT Signage System line, with full HD 1080p video quality performance. The SA3000 enables superior content delivery for a digital signage network.

The SA3000 features a powerful and energy-efficient Intel® Core™ 2 Duo processor in a compact and robust package. Based on 45nm transistor technology, the SA3000 provides huge gains in video processing speed, improving content playback quality for smooth streaming. With low heat generation and reduced power consumption, the SA3000 is an energy-saving “green” appliance.

“Intel has enabled DT Research to deliver the latest in digital signage technology with WebDT” said Joe Jensen, general manager, Embedded Computing Division, Intel, “By utilizing Intel® architecture DT Research is able to offer remote management via Intel® Advanced Management Technology and a powerful energy efficient system multi core for many markets.”
SA3000_keyimage_250x200.jpg

With the Microsoft® Windows® XP Embedded operating system, the SA3000 is easy to integrate with other applications. Full high-definition graphics provide 1920x1080 resolution for all media content, and all major media files are supported. The fanless SA3000 has no moving parts, adding to reliability, reducing total cost of ownership while maintaining green operation with reduced energy consumption. Options for the SA3000 include wireless networking and hard-disk or solid state drives for storage.

“We are pleased to work with Intel to deliver the highest-quality, leading edge appliances to set the standard for performance and energy savings in the digital signage market.” said Dr. Daw Tsai, president of DT Research. “As the digital signage market evolves, and customers become savvier, the need for better performance and green operation will become stronger.”

The SA3000, along with all signage appliances in the WebDT line, can be remotely managed with the WebDT Content Manager software, which is bundled with the appliance and offers an intuitive interface for organizing, scheduling, and deploying content. The WebDT Content Manager provides multiple zone support and planning for each display, so that a screen can be divided into up to eight areas with different content in each zone.

About DT Research
DT Research™ develops and manufactures web-enabled information appliances for vertical applications. The WebDT family of products is based on thin computing platforms for secure, reliable, and cost-effective computing. WebDT products include digital signage solutions, wireless tablets, point-of-service handhelds, compact modular systems, and display-integrated information systems. These systems emphasize mobility, wireless connectivity and touch displays. Powered by Windows® Embedded and Windows XP operating systems, WebDT devices offer durability and ease in integration, leading to solutions that can be remotely managed with the comprehensive WebDT Device Manager software. For more information, visit http://signage.dtri.com / www.dtresearch.com.

DT Research and WebDT are trademarks of DT Research, Inc. All other brands and product names may be trademarks and/or registered trademarks of their respective owners.

###

 
Julia Lin
Marketing Manager
DT Research Inc. Taiwan Branch
Tel: 02-2351-4101 ext. 121
Fax: 02-2351-4102
Cell Phone: 0932070806
Skype: julia529

Posted by Staff at 06:35 PM | Comments (0)

Thin client digital signage controller released

Pretty cool from DTR. WebDT Multi Screen Appliance Powers up to 16 Displays and Provides Multi-Zone Management for Each Screen, Fully Integrated from One Manufacturer. [picture included in article]

InfoComm – Orlando, FL – June 18, 2009 - DT Research™, Inc., an industry leader in the development of information appliances for vertical markets, today announced the release of the MS1600, a new signage appliance in the WebDT Signage System line, capable of powering content over up to 16 screens. The MS1600, or WebDT Multi Screen Appliance, enables powerful content streaming on anywhere from 2 to 16 displays, and offers content blending, or tiling, across screens. The MS1600, along with WebDT Content Manager, provide the industry’s first fully integrated system with 1080p over up to 16 screens and multi-zone management for up to 16 zones.

The MS1600 is powered by the IntelÒ Quad-Core i7 processor, and provides full HD (1080p) video quality to every screen. Running MicrosoftÒ WindowsÒ operating systems, the WebDT Multi Screen Appliance displays content files in native resolution, so images are sharp and true to original properties, even when presented on multiple displays or large screens, maintaining optimal picture quality.
MS1600Keyimage.jpg
“DT Research’s strong engineering ability allows cutting edge signage devices to be presented to the digital signage market, taking it to the next level and further expanding the market share for out-of-home advertising,” stated Joe Jensen, general manager, Embedded Computing Division, Intel.

The MS1600 is ideal for applications that require high-resolution on multiple screens including menu boards, flight/transportation information, and creative display arrangements. The energy efficient MS1600 enables dynamic digital signage deployments in spaces where multiple screens are indoors and viewed by audiences at close range, such as shopping malls, entertainment venues, and airports.

“With the latest technology from Intel, we are able to design and create the next generation of durable signage appliances.” said Dr. Daw Tsai, president of DT Research. “The ability to run multiple displays from a single signage appliance allows customers who require this configuration to deploy digital signage networks with the highest quality video experience efficiently and cost-effectively.”

Each of the screens powered by the MS1600 can be remotely managed with the WebDT Content Manager software, which is bundled with the appliance. This intuitive interface software is used for organizing, scheduling, and deploying content to the digital signage network. The WebDT Content Manager provides multiple zone support and planning for each display, so that a screen can be divided into up to 16 zones with different content in each zone. With WebDT Content Manager, all screens can show the same content, each screen can play different content, or content can be blended over several screens. The user-friendly WebDT Content Manager also allows users to create many combinations across multiple screens, such as four zones on two screens, two zones on five screens, and hundreds of other possible screen layouts.

The WebDT Multi Screen Appliance brings top quality performance in a compelling design, and is available beginning June 18th, 2009.


About DT Research
DT Research™ develops and manufactures web-enabled information appliances for vertical applications. The WebDT family of products is based on thin computing platforms for secure, reliable, and cost-effective computing. WebDT products include digital signage solutions, wireless tablets, point-of-service handhelds, compact modular systems, and display-integrated information systems. These systems emphasize mobility, wireless connectivity and touch displays. Powered by Windows® Embedded and Windows XP operating systems, WebDT devices offer durability and ease in integration, leading to solutions that can be remotely managed with the comprehensive WebDT Device Manager software. For more information, visit http://signage.dtri.com / www.dtresearch.com.

DT Research and WebDT are trademarks of DT Research, Inc. All other brands and product names may be trademarks and/or registered trademarks of their respective owners.

###

 
Julia Lin
Marketing Manager
DT Research Inc. Taiwan Branch
Tel: 02-2351-4101 ext. 121
Fax: 02-2351-4102
Cell Phone: 0932070806
Skype: julia529

Visit us:
http://www.dtresearch.com
http://signage.dtri.com

Posted by Staff at 06:30 PM | Comments (0)