Memorial Day 2016

memorial day

Memorial Day History

Memorial Day was originally called Decoration Day and was initiated to honor the soldiers for the Union and Confederate armies who died during the American Civil War.

Celebrations honoring Civil War heroes started the year after the war ended. The establishment of a public holiday was meant to unify the celebration as a national day of remembrance instead of a holiday celebrated separately by the Union and Confederate states. By the late 19th century, the holiday became known as Memorial Day and was expanded to include the deceased veterans of all the wars fought by American forces. In 1971, Memorial Day became a federal holiday.

The original national celebration of Decoration Day took place on 30 May 1868. When Memorial Day became a federal holiday, it was given the floating date of the last Monday in May. Since many companies close for the holiday, Memorial Day weekend is three days long for most people. It is the unofficial beginning of the summer vacation season that lasts until the first Monday in September, which is Labor Day.


Some of the most common Memorial Day traditions that are still practiced in the United States today include:

  • Every Memorial Day, the U.S. flag is quickly raised to the tops of flagpoles, slowly lowered to half-mast, and then raised again to full height at noon. The time at half-mast is meant to honor the million-plus fallen U.S. soldiers who have died for their country over the years. Re-raising the flag is meant to symbolize the resolve of the living to carry on the fight for freedom so that the nation’s heroes will not have died in vain.
  • It is very common to visit cemeteries, particularly military cemeteries, at this time of year to decorate the graves. Small American flags, flowers, and wreaths are commonly placed by the tombstones.
  • On the U.S. Capitol Building’s West Lawn, a Memorial Day concert is held annually. The musical performances are broadcast live around the country on PBS t.v. and NPR radio. Attendance is free, but most watch or listen from at home.
  • There are literally thousands of Memorial Day parades all across the country in cities small and large. Typically, you will see marching bands, National Guardsmen, other Armed Forces members, and military vehicles from past U.S. wars.
  • Many will wear or put on display red poppies on this day as a symbol of fallen soldiers. This tradition grew out of the famous poem by Canadian John McCrae who was known as In Flander’s Fields, which he was inspired to write upon seeing red poppies growing over the graves of World War I soldiers. You may well hear this poem’s opening lines quoted on Memorial Day:

    “In Flanders fields the poppies blow
    Between the crosses, row on row”



Many families go on vacation on Memorial Day weekend, and many others who are off work or out of school stay home and enjoy family picnics and get-togethers. Most people open their swimming pools for the first time of the year as Memorial Day also ushers in those lazy, hazy, crazy days of summer. If you do get out for the holiday, five events you may wish to attend are listed below. However, you can also view many of these events on the television if you remain at home.

  • Numerous Memorial Day events are held at Arlington National Cemetery every year. If you visit, you can see a quarter-million miniature flags decorating the graves in the cemetery, witness the changing of the guard ceremony at the Tomb of the Unknowns, attend the official Memorial Day service in the amphitheater, and much more.
  • You may wish to visit Washington D.C.’s National Mall, which is a two-mile stretch of land along the Potomac River that lies between the Washington Monument and the U.S. Capital Building. In it, you will find the Lincoln Memorial, the Franklin Delano Roosevelt Memorial, the National World War II Memorial, the Vietnam Veterans Memorial, the Korean War Veterans Memorial, the National Museum of American History, and numerous other important places of historic interest.
  • The oldest Memorial Day parade in the nation still takes place annually in Gettysburg, Pennsylvania, and tens of thousands attend. Nearby, you can also visit the Gettysburg Soldiers National Monument and Cemetery, and tour the battlefield.
  • The National Memorial Day Parade on Constitution Avenue has been the nation’s largest since 2005, with over a quarter-million typically attending. There are whole military units that march by as well as floats and bands, and it is an unforgettable experience.
  • If you want some sports entertainment around Memorial Day, the Indianapolis 500 auto race has been held on the Sunday just before Memorial Day since 1911. The NASCAR Coca-Cola 600 and the Memorial Tournament golfing event are also held at this time of year.

There is much patriotic significance attached to Memorial Day, and there are many events, both public and private, going on. If you travel for the weekend, be sure to plan ahead, book early, and drive safely on roads and airports will be very busy at this time of year.

Article Provided By: PUBLIC HOLIDAYS

If you would like to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at

Aging at Home: Home May Be Where the Technology Is

Aging at Home


New Technologies Help Aging Baby Boomers with Health and Safety Monitoring

Medicare started off the year putting into action a program to encourage more doctors to discuss end-of-life and advance care plans with patients. While the details tend to focus on the hard choices on the far side of those arrangements, new and near-future technologies could preserve life’s simple pleasures on their front end.

End-of-life conversations are meant to cover more than the final days or weeks when many, or even all, of an individual’s needs, have to be fulfilled by others, often in an institutional setting.

There’s a growing movement to include in those discussions options for the elderly and infirm to “age in place.” For those looking to spend as much time as possible in their familiar home surroundings, technology has been playing an increasingly important role.

Daily Monitoring

While companies like Bask work out front with elderly on hardware and software, there are massive investments being poured into technology in the field of home health and the healthcare industry at large, noted Jim McGregor, a principal analyst at Tirias Research.

“We can pretty much monitor people in real time these days, which is great,” he told TechNewsWorld. “It helps not only understand what going on with them — but provides a lot of early warning analysis.”

If there are irregularities with heart rate or worrying drops in blood sugar, for example, monitoring systems can notify the individual as well as family members and healthcare professionals.

“The biggest challenge, though, is overcoming the daily activities — the food preparation, the house maintenance,” McGregor said. “It’s all of that. Sometimes the manual stuff is really the most difficult part of it.”

Big Data

However, a lot of traditional developers of medical systems, such as GE, have been putting boatloads into other approaches to using technology to transform healthcare, McGregor noted.

“One, it offsets a lot of health costs,” he said. “And two, this is a huge growth industry, especially as populations age in the U.S., and in Japan and other industrialized nations. There’s a tremendous amount of money being put into this.”

Efforts to improve home healthcare with technology and breakthroughs in artificial intelligence will transform society, according to McGregor.

“When you think about it — if you could take every PET scan, every X-Ray, every MRI, and the diagnosis of whether they were correct or incorrect — you can create platforms that can actually do analysis of all these scans better than any radiologist on the planet — and they’re working on this.”

Portal Presence

Many adult children feel that “their parents were there for them,” and are willing to step up when the tables are turned and mom or dad are in need of resources to maintain a high quality of life, noted Jeff Kruger, CEO Safe Homecare.

“Technology is making it possible for more seniors to remain in their homes longer, and for their children who worry about them to take comfort in knowing that their family members are being cared for and watched over,” he told TechNewsWorld.

Safe Homecare’s Family Room portal is one entrant in a field of digital eldercare solutions that has been growing as quickly as the aging populations in industrialized countries such as the U.S.

“In our Family Room, our clients and their loved ones are able to access a secure online portal where they can view caregiver notes of the day’s activities, caregiver daily schedules, add appointments caregivers need to be made aware of, update and review medications, and add task reminders,” Krueger said. “This feature enables the family to stay informed regardless of where they may live.”

Meanwhile, the folks over at AthenaGTX have been iterating on a platform they call “Wi-Med.”

Its focus is on enabling caregivers to customize patient monitoring as the need arises, according to Lyn Darrah, vice president of business development.




The platform stores vital patient data on secure servers that caregivers can access from anywhere, Darrah noted.

“This is beneficial in that it allows doctors to view patient data and assess treatment and medication success and adjust accordingly,” she told TechNewsWorld.

The feedback has been more than encouraging. Wi-Med was credited with completely eradicating hospital readmissions in a study of one nursing home.

The company currently is conducting beta testing of home monitoring for the elderly and infirm.

“With our current trials, we hope to prove that patients will be able to stay in their homes and reduce the need for emergency care or hospitalization, and delay or remove the need for a care facility,” Darrah said. “Thus far we are seeing some very encouraging results.”

Personal Emergency Response Systems

Along with patient portals for family and physicians, health monitoring and alerting systems have been mainstays in homes refitted to keep elderly family members in place, observed Rob Enderle, a principal analyst at the Enderle Group.

PERS, or personal emergency response systems, such as GreatCall’s collection of mobile devices and the company’s 5Star Urgent Response Service, are expected to enjoy compounded annual growth of 40 percent from 2015 to 2021 — in a market that’s projected to grow from about 450,000 devices to one that ships 3.4 million each year, according to Berg Insight.


greatcall devices


“One of the big problems with folks as they age is that their life partners die or have to be moved to a hospital, leaving them alone,” Enderle told TechNewsWorld. “They are still very likely to have an accident, and even a small fall could become deadly.”

On top of the risk of physical accidents, the elderly may forget to take their medication or take the wrong dosage, he noted. In the absence of monitoring, such mistakes could result in serious health issues.

If any of this sounds familiar, it’s because many of the current aging-in-place solutions reflect old ideas, suggested Charles King, principal analyst at Pund-IT. Most people, for example, are familiar with the marketing catchphrase, “I’ve fallen and I can’t get up!”

“That company is now called ‘LifeAlert,’ and it continues to offer a variety of medical and home monitoring services for the elderly,” King told TechNewsWorld.


AC Nielsen Life Alert


However, “the development of increasingly powerful solutions leveraging mobile and WiFi networks has crowded the market with similar offerings,” King pointed out.

PERS, which have begun to shapeshift from pendants to more discreet form factors, like wristbands and watches, increasingly are complemented by remote-monitoring systems.

A View From Afar

Remote monitoring systems that incorporate wearables and sensors have a growing presence in home healthcare, noted Revation Systems CEO Perry Price.

“This type of monitoring, combined with the ability to do virtual consultations on a wide variety of platforms, will further enhance our aging population’s ability to stay with in their homes,” he told TechNewsWorld. “These technologies can even be deployed by entertainment or gaming platforms within the home.”

BeClose’s suite of sensors and software tools, for example, can relay to remote caregivers an individual’s daily routine and any disruptions to it.

Another example is GrandCare Systems, with its house-wide sensors and bedside kiosk at the center of it all.

The number of remotely monitored patients last year doubled to 4.9 million, and the market reached $6.7 billion. That figure is projected to hit $27 billion by 2020.

“Even security cameras placed inside their home can help their loved ones or remote health monitoring to check in if they aren’t answering their phones,” Remote monitoring — even security cameras placed inside the home — can help family members check on their loved ones if they aren’t answering their phone, noted Enderle.

“Telemedicine continues to advance, and now it isn’t unusual for someone that might have needed to be hospitalized before to be monitored effectively from their home,” he said, “though generally, they’ll still need someone staying with them.”

As artificial intelligence continues to improve, the cost of home monitoring will fall, and its efficacy will climb, Enderle predicted. “Simply watching someone move around the house can tell an AI if there is a problem, and increasingly advanced sensors can catch health problems far sooner.”

Article Provided By: TECHNEWSWORLD

If you would like to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at

Mobile Access Control from HID

Mobile Access

Are you ready to embrace the sweeping change mobile technologies have brought to access control? HID Global’s award-winning HID Mobile Access ® solutions allow organizations to tailor access control solutions to meet the growing demands of a mobile-first world.

mobile access

HID Mobile Access ® introduces a new era of convenience and functionality to access control. Breakthrough technologies meet the growing demands of a smarter, mobile-first world — while instilling confidence that identity data is secure and privacy is protected.

  • More Choice – Mobile technology is being leveraged at a rapid pace. The freedom to move access control to phones, tablets, wristbands, watches and other wearables is a matter of end-user preference. HID Mobile Access supports the widest variety of mobile devices in the industry today, or it can be used in addition to traditional card access.
  • More Applications – Managing identity in the organization is changing; IT departments, Security and Facility Management are working toward the development of consolidated access programs. HID Mobile Access enables more than one secure identity to reside in a smart device –creating a single device solution for physical and logical access control.
  • More Confidence – HID Mobile Access, powered by breakthrough credential technologies, is based on ISO standards used by the U.S. government and other organizations globally to encrypt classified or sensitive data, providing unprecedented security and privacy protection of identity data.

Mobile has become the go-to technology of the new millennium, offering convenience and portability. In light of these developments, leveraging mobile technology to access doors, parking facilities and gates – not to mention networks and other enterprise applications and much more – is a logical step in the evolution of access control.

HID Global is extending access control functionality to a mobile device allows end-users to securely and conveniently access the workplace using their smart device that is almost always on-hand. From the parking gate, to the door, to the network and more, HID Mobile Access can help organizations meet the growing demand for convenience in a mobile-first world.

Article Provided By: HID Global

If you would like to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at

High-speed PTZ cameras — DALLMEIER


Cameras In The News

With the DDZ4220HD and DDZ4230HD Dallmeier launches new PTZ cameras with a resolution of up to two megapixels.
The cameras of the series DDZ42xxHD are high-speed HD PTZ dome network cameras. They are equipped with a high-performance Pan-Tilt-Zoom mechanism and provide real-time high-definition video with up to 30fps at a resolution of 2MP. The most advanced sensor and encoder technology and the sophisticated image processing provide recordings with excellent contrast, brilliant clarity as well as highest detail resolution and colour fidelity.
The DDZ4220HD features 20x optical zoom and the DDZ4230HD 30x optical zoom with auto-focus. The high zoom factor allows for the easy and discreet surveillance even of faraway objects. Functions like “Digital WDR (Wide Dynamic Range)“ and “3D DNR (3D digital noise reduction)“ guarantee good image quality. The very good light sensitivity of the sensor and the sophisticated image processing ensure crisp colour images even in low lighting. In night mode, the cameras also provide outstanding results due to the very good infrared sensitivity. The PTZ cameras are equipped with a removable IR cut filter, and can automatically switch between day and night mode. In addition, different day and night presets for the exposure settings can be defined and adjusted.
Up to 128 preset positions and 32 tours can be programmed. Particularly useful in that regard are the adjustable alarm actions with contact closure: If a certain contact is closed i.e. triggered, for example by opening an entrance door, the camera automatically moves to the programmed preset position of the relevant scene.
The DDZ4220HD and DDZ4230HD are equipped with a RAM memory that is used by the EdgeStorage function for storing the video stream in case of a network failure. When the network is restored, the SmartBackfill function ensures a fast transmission to the SMAVIA recording system. This stores the video stream with high speed and then continues the recording of the live stream seamlessly.
The PTZ dome cameras are available in an in-ceiling, surface or weatherproof housing. The in-ceiling variant of the camera is tested according to the stringent requirements of the UL 2043 relating to flame retardancy and low smoke emission. Thus, it is approved for installation in air-conducting space, for example in air shafts or false ceilings dissipating the air to a central air conditioning.
The PTZ cameras can be conventionally supplied with 24 V AC or conveniently with Power over Ethernet (PoE+).
Article Provided By: Casino Joural

If you would like to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at

Cybersecurity Needs a Moonshot!


“We choose to go to the moon. We choose to go to the moon in this decade and do the other things, not because they are easy, but because they are hard, because that goal will serve to organize and measure the best of our energies and skills, because that challenge is one that we are willing to accept, one we are unwilling to postpone, and one which we intend to win, and the others, too.”

~ President John F. Kennedy, September 12, 1962

Coming out of the 2016 RSA Conference, it is clear we have hit a watershed moment in the history of the IT industry. After several years of hundreds of billions of dollars invested across a range of security technologies, it is self-evident that cyber presents a huge paradox to organizations of all types. The growth of cloud, mobile, and agile computing capabilities has delivered a golden renaissance of innovation.

• The iPhone is the digital equivalent of Hitchhikers Guide to the Galaxy

• Amazon Web Services is eating the infrastructure world like a black hole

• Today is a software company, embracing agile development to support business initiatives

In the cybersecurity space, though, we have nearly conceded defeat. People are going around saying: “assume not that you will not be hacked, but that you will be hacked.” How uplifting!

Cybersecurity – It is time for things to change.

Forty-three years ago, when President Kennedy called for a man on the moon, many were skeptical. Today, people are equally skeptical about our ability to re-establish control of our own computing systems.

What happens if this was the time when things changed? What happens if we committed to leveling the playing field between attackers and defenders? What happens if we take a clean piece of paper to how we think about restoring trust to our computing—where cybersecurity enables innovation rather than stifles it?

What happens if we acknowledge that no one vendor has the entire solution?

The vendor part of the cybersecurity industry—yes, I am calling myself out—has failed its customers. Einstein allegedly defined insanity as “doing the same thing over and over again and expecting different results.”

Companies claim to innovate, but all they do is present different versions of old models. A firewall that runs on a software platform is still a firewall. If your cybersecurity is tied to infrastructure, you are leashed to a world where you have to own the infrastructure—sorry AWS, Azure—and more onerously, need to upgrade the infrastructure to upgrade your security.

I would never claim that my company has the answer for cybersecurity. But we represent a movement that unshackles security from the past to make it responsive to the dynamic, distributed, heterogeneous, and hybrid world into which we are moving.

Here are my 7 points to a cybersecurity moonshot program:

1. Turn everything inside out.  We take back our computing from the inside out, from the applications out and not the infrastructure in.  In the cyber world, the perimeter attacker only has to be right once and the defender has to slip once. Why not shift the logic so the attacker only has to make one mistake and the defender will catch it?

2. Trust nothing. Start with the premise that everything is untrusted and establish trusted relationships between users and applications in a granular and controlled way. This is the heart of a whitelist model.

3. Build tighter and tighter segmentation around smaller and smaller attack surfaces.The biggest challenge to granular segmentation has been complex and fragile networks, firewall rules, and outdated application-entitlement strategies. The smaller the surface, the less damage. The tighter the segmentation, the fewer false positives.

4. Make security part of the application life cycle. Today security is most frequently added after applications are built.  What happens if developers are equal participants in cybersecurity? Eliminate the false boundaries among application, infrastructure, and security teams. From a security perspective, all three groups must work hand in glove.

5. Decouple and automate. Infrastructure security has enormous benefits in most cybersecurity approaches but it comes with two distinct disadvantages: what happens when you don’t own the infrastructure (e.g., AWS), and what happens when you do not want to upgrade your infrastructure to keep up with your security needs. Moreover, security that requires detailed oversight and management of every command by human middleware is bound to fail. Computers (and a lot of math) were instrumental to the moonshot program. Algorithms and machine learning will play a role in our cyber future.

6. Manage both sides of the equation: applications and clients. Today people see end-point and infrastructure security as two separate issues. Through Adaptive User Segmentation, it is possible to fuse these two areas and make data center computing more secure.  Do not create gaps in protection.

7. Make security part of the business, not just IT. A lot of pundits talk about Board of Director oversight of IT security. Having been a board member several times in my career, I agree it is a key area of risk that boards must monitor. But long before Board oversight of cyber needs to occur, management teams must make it a priority.  Where is it baked into the reward system of an executive team? Which of the CEO’s direct reports owns cyber end-to-end for a business?

Regaining control of the cyber landscape will not be easy. There is no magic bullet. But a steady plan that both builds on the best practices of today and anticipates and takes action for the world we are moving into presents the last best hope for creating trust again in IT.

Article Provided By: Security Week

If you would like to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at