Thin Client RFPs 6/29

RFP Thin Client
JPMC – RENEWAL NOTICE HP Thin Client Terminals and Accessories

Type

Bid

Entity

DoIT – Department of Innovation and Technology

Expires

Jul 14, 2020

Status

Open

Region

Illinois

Reference #

21-448DOIT-TELEC-B-16037

Issued

Jun 28, 2020

More Details

Description

Bulletin Desc: RENEWAL NOTICE – THIS IS NOT A BID SOLICITATION JPMC – The Illinois Department of Innovation and Technology desires to renew a Joint Purchase Master Contract with HP Inc. For HP Thin Client Terminals, Accessories and Support Services. The Joint Purchase Master Contract can be utilized by all governmental agencies and qualified not-for-profit agencies.


Publisher

DoIT – Department of Innovation and Technology


Qty 275

Supply Thin Client Computers (Custom Build)
Entity

School District 73 Kamloops/Thompson

Expires

Jul 10, 2020

Status

Open

Region

British Columbia

Reference #

932554418

Issued

4 hours ago

More Details

Publisher

School District 73 Kamloops/Thompson


Publisher Website

MERX

Industry


Quebec 275

T20027 Supply 275 Thin Client Computers (Custom Build)
Quebec

10ZiG® Microsoft Windows Virtual Desktop Partner

1zig Microsoft Partner

ICYMI – ’10ZiG® Technology Established as Microsoft Windows Virtual Desktop Integrated Partner Provider’ > Rean th announcement here > https://bit.ly/10ZiG-WVD #WVD #WindowsVirtualDesktop #Microsoft #Cloud #CloudComputing #10ZiG


10ZiG® Technology Established as Microsoft Windows Virtual Desktop Integrated Partner Provider

PHOENIX, ARIZONA – Microsoft Windows Virtual Desktop, a comprehensive desktop and app virtualization service running in the cloud, is now partnering with 10ZiG Technology Thin & Zero Clients. Microsoft Windows Virtual Desktop provides the only multi-session Windows 10 experience for desktop virtualization, making it a complementary fit with 10ZiG Thin & Zero Client hardware endpoints and The 10ZiG Manager™ for a seamless desktop experience in the cloud.

A longstanding partner with Microsoft around Microsoft Azure and Windows Virtual Desktop, 10ZiG Windows 10 IoT-based Thin Clients continue to be powerful, reliable, and affordable endpoints for all Windows Virtual Desktop multi-users. The 10ZiG Manager Centralized Software provides exceptional management and deployment without license limitations at no additional cost. The powerful combination of Windows Virtual Desktop and 10ZiG creates a seamless multi-user platform for cloud-based, virtual desktop environments.

Kevin Greenway, 10ZiG Technology CTO, “Windows Virtual Desktop really enhances the virtual desktop experience. If you’re in the cloud, why wouldn’t you want to manage your virtual desktop machines easily and efficiently, with automated update and deployment features, and more? Along with the right endpoints and centralized software management, 10ZiG and Windows Virtual Desktop can make a powerful combination for the best possible, Windows 10 multi-session desktops, virtualized in the cloud.”

10ZiG’s world-market leadership in Thin & Zero Client endpoint devices and management software for virtual desktops is exemplified by how they work for their customers. Thin Client hardware comes with thoughtfully constructed benefit features and options designed to ensure customers receive the right devices based on their needs. Endpoints are customized to fit into customer environments with Windows-based and Linux-based Clients to provide the best possible performance in virtual desktops, both inside and outside Cloud.

About 10ZiG® Technology

10ZiG Technology is a world-market leader in Thin Client & Zero Client endpoint devices for Virtual Desktop Infrastructure. 10ZiG provides leading Intel and AMD based Dual and Quad Core Thin Clients and Zero Clients for VMware, Citrix, Microsoft, etc., environments, and the widest range of Teradici PCoIP Zero Clients on the market. 10ZiG offers free, no-obligation demo devices, best-in-industry Technical Support teams based in the U.S. and Europe, and provides at no cost, the Cloud-enabled “10ZiG Manager” Console with unlimited user licenses.

Citrix User Group Community Active

citrix user group

#UKCUG is alive and kicking!! As well as offering FREE #Citrix Thin & Zero Client demo devices, we’re also giving away a pair of Sennheiser Wireless Headphones! You can win them here – https://lnkd.in/dcdVmkh


Since 1999, Thinclient.org has been reporting the thin client computing market as well as the ChromeBook, Zero Client, Android clients, Pi Raspberry Clients and Thick Client market. Generally the cloud computing market since it started with companies such as Citrix back in the late 80s.

thin client is a lightweight[vague] computer that has been optimized for establishing a remote connection with a server-based computing environment. The server does most of the work, which can include launching software programs, performing calculations, and storing data. This contrasts with a fat client or a conventional personal computer; the former is also intended for working in a client–server model but has significant local processing power, while the latter aims to perform its function mostly locally.

Chrome OS Running Windows Apps

Chrome OS

From SlashGear Jun2020

It may not be Google’s OS but Chrome OS is truly shaping up to be the one OS to rule them all. It can already run software from Android and Linux in addition to its own native web-based Chrome apps and soon it will add what may be the most important set of apps for users. Full Windows applications are coming to some Chromebooks but those will be running via a third-party solution and only to a very select few Chrome OS users.

That solution is Parallels’ virtualization software that has, for years, allowed Windows applications to run on Macs. Unlike the open source WINE software, virtualization pretty much creates a layer, a virtual Windows computer so to speak, between the Windows application and the underlying real operating system. It guarantees better compatibility with foreign apps, in this case, Windows apps, but at the cost of some performance.

Parallels and Google Partnership with Google Enterprise

Chromebook Thin Client News – HP x360 14c

HP Chromebook x360

Full article on The Verge June 2020 – Fast charging and a 10th Gen Core i5

HP has announced its Chromebook x360 14c, which it says is its most premium Chrome OS product yet. It starts at $499 and will be available in June.

The 3.5-pound convertible device has a 14-inch touchscreen with an 88 percent screen-to-body ratio —the largest ever for an HP-made consumer Chromebook. Take a peek at the photos below — it looks nice.

Still, the 11a has some steep competition in this price range, including the excellent $219 Samsung Chromebook 3, Acer’s $229 Chromebook 15, and Lenovo’s $279 Chromebook Duet. Keep an eye out for reviews to see how it compares.

Both Chromebooks are coming in June to HP and Best Buy.

Read Full article on The Verge June 2020

More from The Verge

 

Temperature Verification Kiosk

temperature sensing kiosk

Temperature Verification Kiosks

Temperature checks on employees and visitors is becoming commonplace for many businesses, hospitals, grocery stores, retailers and a host of others. Temperature sensing kiosks can help stem a crisis and optimize a return to business as employees and guests return to work and entertainment venues.

Olea Temperature Sensing Kiosk from Craig Keefner on Vimeo.

Reference page on Olea Kiosks Website

Benefits of Temperature Check Kiosks

The Temperature Sensing Kiosk provides a number of benefits to allow businesses to protect their most valued assets–their employees.

  • Reduce risk of access by infected persons*
  • Maintain a safe work/business environment
  • More hygienic than thermometers that require physical contact
  • Safer and more efficient than using a human resource to screen temperatures
  • Reduce stress and anxiety for employees and guests.

Prevention is the Key

There are many activities happening simultaneously to ensure a safe work environment.  The Temperature Sensing Kiosk reduces the risk of infection to your employees and costly and time-consuming contamination clean-up efforts.  Give employees and visitors the confidence to know you’re doing all you can do to protect them.

How It Works

The Temperature Sensing Kiosk is equipped with an infrared temperature sensor/detector and the system provides an alert if an individual is running a fever. The system uses an algorithm for fast detection temperature accuracy.

Protect Your Investment

Your people are your most valuable investment. To help stem the crisis and optimize a return to business, hospitals, grocery stores, and retailers and a host of other companies will look to temperature screening as employees report to work and venues open up again. This first layer of screening can curb the spread of virus as well as prevent costly and time-consuming contamination clean-up. This solution is equipped with an infrared temperature sensor/detector and the system provides an alert if an individual is running a fever.

  • Stop infection at the door
  • Maintain a safe work/business environment
  • More hygienic than thermometers that require physical contact
  • Safer and more efficient than using a human resource to screen temperatures
  • Avoid costly contamination clean-up
  • Reduce stress and anxiety for employees and guests

Specifications:

  • Uses an algorithm for object heat and fast detection temperature accuracy • +/- 0.5 degrees Celsius
  • Android Operating System and Software included
  • 1 second refresh rate
  • Scans people from 20 to 39 inches from kiosk

Olea Kiosks. Redefining Self-Service Technology.

For more information email Olea Kiosks or send contact form.

Integrating Telemedicine Kiosks in Pharmacies

telemedicine thin client

From GlobalNewsWire May 2020

Save-On-Foods is Canada’s largest Western-based grocery and pharmacy retailer with over 170 stores

Source: CloudMD Software & Services Inc.

VANCOUVER, British Columbia, May 04, 2020 (GLOBE NEWSWIRE) — CloudMD Software & Services Inc. (CSE: DOC, OTCQB: DOCRF, Frankfurt: 6PH) (the “Company” or “CloudMD”), a telemedicine company revolutionizing the delivery of healthcare to patients, is excited to announce that it has entered into a non-binding Letter of Intent (“LOI”) with Save-On-Foods and separately with Pure Integrative Pharmacy to pilot telemedicine kiosks in nine stores throughout British Columbia.

For 6 weeks starting on May 26, 2020, CloudMD’s telemedicine software and services will be offered free of charge to Save-On-Foods and Pure Integrative Pharmacy clients. Telemedicine kiosks will be installed in existing private consult rooms in participating Save-On-Foods and Pure Integrative Pharmacy locations across BC. Patients will be able to see a doctor for prescription refills and non-emergency health concerns in real time on-site, and after the virtual visit, the prescription can be submitted directly to the same pharmacy for fulfillment.  The delivery of these services will be billed under provincial medical plans.

Save-On-Foods is Canada’s largest Western-based grocery chain with over 170 stores across BC, Alberta, Saskatchewan, Manitoba and in Whitehorse, Yukon. Pure Integrative Pharmacy is one of BC’s leading independent community pharmacies and has been servicing patients with 16 locations across BC since 2008.

In addition to the corporate arrangement, CloudMD and Save-On-Foods are joining forces to help provide home based telemedicine and delivery services (where available) of medications to at risk patients who cannot, or should not, leave self-isolation. BC patients unable to travel out of their homes can advise their CloudMD doctor they require home delivery of their medication and Save-On-Food’s pharmacies will take care of fulfillment and delivery.

Dr. Essam Hamza, CEO of CloudMD commented, “One of our key growth drivers is our kiosk implementation program, and we are excited to work with Save-On-Foods and Pure Integrative Pharmacy on the first major step of the roll out.  CloudMD, Save-On-Foods, and Pure Integrative Pharmacy share a community centric vision and are all aligned in maintaining customer focused businesses.” He continued, “Our priority is providing patients with innovative, accessible healthcare when and where they need it and in doing so, integrating the pharmacist into their team-based care. The initial paid pilot program is the first phase of our kiosk implementation and will hopefully lead to long term, mutually beneficial relationship with Save-On-Foods and Pure Integrative Pharmacy.”

About Save-On-Foods

Save-On-Foods is committed to Going the Extra Mile for customers in every community served, every day. Known for its unique approach in customizing each store to best suit the needs of the neighbourhood by carrying more than 2,500 locally-made products from more than 2,000 local growers and producers, the company has been innovating and putting customers first for over 105 years. Save-On-Foods, its supplier partners, team members and generous customers have donated more than $30 million to children’s hospitals and contribute $3 million in donations to food banks across Western Canada each year.

About Pure Integrative Pharmacy

Pure Integrative Pharmacy is one of BC’s leading independent community pharmacies by integrating the conventional pharmacy model with evidence-based complementary medicines and cutting-edge products and services to improve the health and well-being of patients. Pure Pharmacies offer integrity and a personalized pharmacy experience where they listen to, inspire, and empower their clients to take control of their health and enjoy greater vitality, safely and sustainably. Their vision is to bridge the gap between conventional and complementary medicine and become an integrative and accessible hub of health for patients.

About CloudMD Software & Services

CloudMD is digitizing the delivery of healthcare by providing patients access to all points of their care from their phone, tablet or desktop computer. The Company offers SAAS based health technology solutions to medical clinics across Canada and has developed proprietary technology that delivers quality healthcare through the combination of connected primary care clinics, telemedicine, and artificial intelligence (AI). CloudMD currently provides service to a combined ecosystem of 376 clinics, over 3000 licensed practitioners and almost 3 million patient charts across its servers.

Chromebooks – HP new for enterprise workers at home

HP Mobile Thin Client

From VentureBeat May 2020  HP today unveiled three new Chromebooks and other mobile solutions for enterprise workers in lockdown. The launch demonstrates how quickly big companies are moving to target mobile products at people working from home during the coronavirus pandemic. Chromebooks, based on Google’s Chrome operatin…

HP today unveiled three new Chromebooks and other mobile solutions for enterprise workers in lockdown. The launch demonstrates how quickly big companies are moving to target mobile products at people working from home during the coronavirus pandemic.

Chromebooks, based on Google’s Chrome operating system, are designed to make people more productive online while keeping costs low. Many businesses have been adopting cloud-centric solutions and virtual desktop infrastructure (VDI) to increase security and save costs, but the recent pandemic has cast a spotlight on those who primarily work with web applications and virtual desktop tools.

Full article at From VentureBeat May 2020

More from HP

https://thinclient.org/available-today-hp-zcentral-remote-boost-connect/

https://thinclient.org/hp-310-t310-g2-aio-one-zero-client-released/

https://thinclient.org/thin-client-hp-easy-shell-for-thin-clients-announced/

No Touch Touchscreen + User Monitored Station Maintenance

No Touch Touchscreen

Two fairly cool ideas from KioWare on let users use their mobile as the touchscreen proxy controller.  And then for the workstation that presumably has been cleaned, users can see how long ago it was actually cleaned. Cool ideas.

Ed Note: Using the kiosk as the “fulcrum” or proxy is not a new idea but it is coming of age with the current situation.  These new functions allow users to use their mobile phones as the proxy touchscreen. Statistically their mobile phone is a hotbed for bacteria but this method isolates users from contaminating the usually very clean touchscreen. People without mobile phones have cleaner fingers.  Kind of an odd situation of juxtaposable factors.

As an added feature KioWare announced their new Maintenance feature which displays “Last Cleaned” date to users to add extra level of confidence. This allows users to alert store personnel if a maintenance cycle has been missed. A new characteristic of an interactive kiosk.

Establishments will have to increase maintenance cycles and no longer will it be the redheaded stepchild so to speak.

What is KioTouch?

KioTouch is a clean innovation in the kiosk industry that will help in preventing the spread of potentially contagious and harmful microbes by giving the end-user full access to the kiosk’s interface via their personal mobile device.

Across grocery and retail stores, and quick-service restaurants it is reported that of the total bacteria in these facilities 63-percent have potentially harmful consequences to humans.

How KioTouch Works

KioTouch allows the end-user of a shared device to interface without physically touching the device itself. This is accomplished by scanning a QR code via the end-user’s personal mobile device. and navigating to a landing page that gives the user full control of the kiosk while their user session is active, just as they would have had by directly interacting with the kiosk.

What is Maintenance Management?

Maintenance Management is a KioWare feature that assists in the janitorial maintenance schedule of a self-service kiosk. This is critical in preventing bacteria spread from user-to-user.

How Maintenance Management Works

Maintenance Management works on two sets of parameters that can be defined individually for each kiosk: total time between cleanings and total number of user sessions between cleanings. If either of these thresholds are passed, then the status of the kiosk changes and staff notifications occur. After cleaning, the technician resets the time and user session counter, and the cycle starts again. The KioWare toolbar has a special icon that can be displayed with the time since the last cleaning. The time will increment every 36 seconds, so the that the kiosk user can see it is working.

What Maintenance Management Looks Like

no touch touchscreen maintenance kiosk cycle
Click for full size

The screenshot shown here depicts KioPay with Maintenance Management enabled. In the upper-left hand corner of the screen is the Maintenance Management logo with a fractional timer that indicates the last time since the kiosk device was cleaned. After tapping on this icon a maintenance employee can reset the timer after cleaning by inputting a unique code.

Reference article on KI

More KioWare info

https://thinclient.org/kiosk-software-kioware-europe-uk-presence/

KMA Announces ADA Accessibility Chairpersons

https://thinclient.org/mobile-device-byod-management-vs-kiosk-software/

Temperature Check Android

temperature check kiosk

Temperature Check Stations

Lots of news around temperature check kiosks these days.  These are typically small android devices equipped with camera and thermal sensor.  The sensors come from variety of places (Germany for example has one). Example temperature check sensor is Heinmann  ISO 9001-2015 certificate1Heimann Sensor

Typically stand at a distance anywhere from 10 to 40 inches and get a positive or negative reading.

Androids, as well as Raspberry PI, are being used so these devices are relatively inexpensive.

Many people from many industry segments have talked about them from Indian Gaming to Disney Theme Parks.

Here are some excerpts

From Casino.org — The Chumash Casino Resort, owned and operated by the Santa Ynez Band of Chumash Mission Indians, has been closed since mid-March by the coronavirus. Last week, the tribal casino announced it will remain closed through the end of May.

When the casino reopens, the facility will be equipped with temperature-taking kiosks. Chumash Casino CEO John Elliott didn’t specify as to the number of kiosks being purchased, but explained people will approach the machine, stand approximately 10 inches away, and the device will reveal their body temperature within three to seven seconds.

The kiosks are FDA-cleared and are as accurate as a manual temperature reading,” said tribal chairman Kenneth Kahn. Each machine can scan one individual at a time.

People who receive a temperature reading of 100.4 degrees Fahrenheit or higher will be denied entry. “Access will be denied to employees or guests who exceed the temperature threshold recommended by the CDC or Public Health,” Kahn added.

From Kiosk Industry

Temperature checks on employees and visitors are becoming commonplace for many businesses, hospitals, grocery stores, retailers and a host of others. Temperature sensing kiosks can help stem a crisis and optimize a return to business as employees and guests return to work and entertainment venues.

Olea Temperature Sensing Kiosk from Craig Keefner on Vimeo.

Reference page on Olea Kiosks Website

Benefits of Temperature Check Kiosks

The Temperature Sensing Kiosk provides a number of benefits to allow businesses to protect their most valued assets–their employees.

  • Reduce risk of access by infected persons*
  • Maintain a safe work/business environment
  • More hygienic than thermometers that require physical contact
  • Safer and more efficient than using a human resource to screen temperatures
  • Reduce stress and anxiety for employees and guests.

Prevention is the Key

There are many activities happening simultaneously to ensure a safe work environment.  The Temperature Sensing Kiosk reduces the risk of infection to your employees and costly and time-consuming contamination clean-up efforts.  Give employees and visitors the confidence to know you’re doing all you can do to protect them.

How It Works

The Temperature Sensing Kiosk is equipped with an infrared temperature sensor/detector and the system provides an alert if an individual is running a fever. The system uses an algorithm for fast detection temperature accuracy.

Protect Your Investment

Your people are your most valuable investment. To help stem the crisis and optimize a return to business, hospitals, grocery stores, and retailers and a host of other companies will look to temperature screening as employees report to work and venues open up again. This first layer of screening can curb the spread of virus as well as prevent costly and time-consuming contamination clean-up. This solution is equipped with an infrared temperature sensor/detector and the system provides an alert if an individual is running a fever.

  • Stop infection at the door
  • Maintain a safe work/business environment
  • More hygienic than thermometers that require physical contact
  • Safer and more efficient than using a human resource to screen temperatures
  • Avoid costly contamination clean-up
  • Reduce stress and anxiety for employees and guests

Specifications:

  • Uses an algorithm for object heat and fast detection temperature accuracy • +/- 0.5 degrees Celsius
  • Android Operating System and Software included
  • 1 second refresh rate
  • Scans people from 20 to 39 inches from kiosk

Wyse ThinOS 9.0 & Wyse Management Suite 2.0

Dell Wyse ThinOS

Wyse ThinOS and Management Suite

Wyse ThinOS 9.0 is the most secure thin client operating system with Citrix Workspace app and with enhanced management capabilities from WMS 2.0 Learn More: https://bit.ly/2IP5hY3

  • 95% of breaches originate at the endpoint1

    With Wyse thin clients, data and applications are stored in a secure datacenter to ensure security and confidentiality. Our thin clients are hardened, virus and malware resistant and support role-based information delivery, this helps enable employees to work any time, any place.

  • 5 min to install and be in control2

    Whether it’s updates, patches or any other day to day operational task, Wyse Management Suite makes it easier to manage Wyse end points from the cloud and/or the datacenter and be more responsive to business requirements.

     

  • 21% boost in productivity3

    Ready to work in any VDI environment, Wyse thin clients are designed to make it easier for people to stay productive with support for multiple 4K monitors, native enablement for unified communications and rich connectivity.

VXL Software offers 6-month licences to help organisations pivot easily to homeworking

homeworking PC

Thin Client – Convert Home PC or Laptop to Secure Corporate Endpoint

VXL is helping organisations shift rapidly to homeworking, by offering a low-cost, 6-month licence for software which easily converts current desktops and laptops – including home PCs – into secure corporate endpoints.

VXL Software offers 6-month licences to help organisations pivot easily to homeworking

VXL is helping organisations shift rapidly to homeworking, by offering a low-cost, 6-month licence for software which easily converts current desktops and laptops – including home PCs – into secure corporate endpoints.

The rapid and unexpected shift to homeworking has been a challenge for many organisations. Although employees can work from home, often it’s by using unmanaged home computers – creating all kinds of security issues.

VXL Software has announced that it can help organisations, via a new 6-month licence which enables organisations to adapt rapidly, helping them to get through this unprecedented upheaval.

Using one of VXL Software’s two homeworking solutions – one for virtualised Windows environments and one for virtualised Linux environments – organisations can instantly convert a home PC into a totally secure corporate endpoint. The user can access corporate data and applications, but that access is securely ringfenced.

Frank Noon, VP Worldwide Sales at VXL Software, says that, “Simplicity is key. Our Fusion SecureDesktop Windows solution runs as an application, while our CloudDesktop On the Go Linux solution boots from a USB drive. In either case, the host device is totally untouched – and for the duration of the session, people work as they would normally via a secure, managed connection. When they quit, they are returned to their home PC. There’s no data crossover.”

Recognising the need for organisations to adopt what may be a temporary change, VXL Software has created a special 6-month licence for just $15 USD per device. “It’s the full product,” says Noon, “and includes support. It’s designed to last for the duration of the lockdown, but it can be upgraded without price penalty should customers wish.

“It’s not an understatement to say that these are challenging times,” concludes Noon, “but technology does enable many organisations to keep going. Companies such as VXL Software are at the forefront of enabling a shift to a new way of working that, for many, will be the norm for quite a while.”

Like many organisations, VXL Software has shifted to homeworking. “We’re pleased to say that VXL Software is operating almost as normal,” concludes Noon. “We’re helping customers via telephone, video calls and e-mail. Likewise, product support is fully operational.”

Temperature Sensing Kiosks

temperature sensing kiosk

Temperature Taking Kiosks

Using a digital signage kiosk to take temperature has a lot of interest recently.  It could be one strategy for re-opening business and assuring customers of safety.

Bob Iger, CEO of Walt Disney Co., is pondering what such a future would look like. Perhaps, he suggests, it would look like testing the temperatures of all of the guests before they enter the theme parks.

“One of the things that we’re discussing already is that in order to return to some semblance of normal, people will have to feel comfortable that they’re safe,” Iger said in an interview with Barron’s. “Some of that could come in the form, ultimately, of a vaccine, but in the absence of that, it could come from basically, more scrutiny, more restrictions. Just as we now do bag checks for everybody that goes into our parks, it could be that at some point we add a component that takes people’s temperatures, as a for-instance.”

Twitter reaction to the idea of testing all visitors before they are allowed inside the parks was swift and decidedly negative.  Full article

Another industry looking to reassure is the airline travel industry.

“And when international aviation does start up again, there will be a need to protect and reassure passengers. Hand sanitizer will likely need to be available throughout the airport, including at boarding gates. “And there is evidence that temperature control at airports reassures passengers, even though it is only a partial solution,” says Powell. “Likewise, routinely wearing masks is contrary to WHO advice but passengers may prefer cabin crew to wear them initially.”  See article on reassuring passengers from iata.org


 

Temperature Taking Kiosk Solutions

Here is one from 22Miles.

temperature taking kiosks

22Miles has an offering

  • Available in 22”
  • Digital Signage content distribution through 22MILES platform
  • Body Temperature testing on the screen
  • Can be used at store entrance, hospital, corporate lobby, etc
  • Can integrate with guest check-in
  • Visit our site for more information

Olea Kiosks Temperature Sensing Kiosk

There are many activities happening simultaneously to ensure a safe work environment.  The Temperature Sensing Kiosk reduces the risk of infection to your employees and costly and time-consuming contamination clean-up efforts.  Give employees and visitors the confidence to know you’re doing all you can do to protect them.

temperature kiosk

The Temperature Scanning Kiosk provides a number of benefits to allow businesses to protect their most valued assets–their employees.

  • Stop infection at the door
  • Maintain a safe work/business environment
  • More hygienic than thermometers that require physical contact
  • Safer and more efficient than using a human resource to screen temperatures
  • Reduce stress and anxiety for employees and guests.

Our Temperature Scanning Kiosk allows for efficient and accurate self-scanning of guests, patients, and employees as they enter your facility. Please contact us if you are interested in learning more.

If interested in send us a note:

New Smart City RFP Site

Smart City Design RFPs

In April we launched the Smart City Design website which features RFPs, Contracts, News, Resources and more. It is the plan to provide more focus on markets such as Smart City, Digital Signage, POS aka Point-Of-Sale markets.

These are important markets for Thin Clients which typically like to think the primary market is corporate America via Dell or HP.  Thin clients are being used all over. The corporate market focus almost acts as an inhibitor.

Smart City focus is two-part for now:

 

Definition of Smart City

Smart city is an urban area that uses different types of electronic Internet of Things (IoT) sensors to collect data and then use insights gained from that data to manage assets, resources and services efficiently. This includes data collected from citizens, devices, and assets that is processed and analyzed to monitor and manage traffic and transportation systems, power plants, utilities, water supply networks, waste management, crime detection,[1] information systems, schools, libraries, hospitals, and other community services.[2][3]

The Smart city concept integrates information and communication technology (ICT), and various physical devices connected to the IoT network to optimize the efficiency of city operations and services and connect to citizens.[4][5] Smart city technology allows city officials to interact directly with both community and city infrastructure and to monitor what is happening in the city and how the city is evolving. ICT is used to enhance quality, performance and interactivity of urban services, to reduce costs and resource consumption and to increase contact between citizens and government.[6] Smart city applications are developed to manage urban flows and allow for real-time responses.[7] A Smart city may therefore be more prepared to respond to challenges than one with a simple “transactional” relationship with its citizens.[8][9] Yet, the term itself remains unclear to its specifics and therefore, open to many interpretations.[10]

Major technological, economic and environmental changes have generated interest in smart cities, including climate changeeconomic restructuring, the move to online retail and entertainment, ageing populations, urban population growth and pressures on public finances.[11] The European Union (EU) has devoted constant efforts to devising a strategy for achieving ‘smart’ urban growth for its metropolitan city-regions.[12][13] The EU has developed a range of programmes under ‘Europe’s Digital Agenda”.[14] In 2010, it highlighted its focus on strengthening innovation and investment in ICT services for the purpose of improving public services and quality of life.[13] Arup estimates that the global market for smart urban services will be $400 billion per annum by 2020.[15] Examples of Smart city technologies and programs have been implemented in Singapore,[16] Smart cities in India,[17][18] Dubai,[19] Milton Keynes,[20] Southampton,[21] Amsterdam,[22] Barcelona,[23] Madrid,[24] Stockholm,[25] Copenhagen, China,[26] and New York.[27]

See Wikipedia Smart City

Smart City RFPs and Contracts

Here is same post from the LinkedIn Group.

See below — If you are interested in receiving the actual data behind these line items then please send an email to [email protected] — We provide RFP services to many companies. Members and sponsors of the Kiosk Manufacturer Association receive a significant discount when adding their subscription. Ala carte subscriptions to just these RFPs are available however. If a spot analysis is desired that can also be subcontracted. #smartcity #smartcities #kiosks

Apr 2020
Smart City Implementation Roadmap for Anaheim, CA. The City of Anaheim seeks to retain the services of a highly qualified consulting vendor experienced in successfully managing and completing Smart City strategies and roadmaps.

Broadband Internet Services for Lakeland County Florida — SMART CITY APPLICATIONS, DIGITAL DIVIDE SOLUTIONS, POTENTIAL REVENUE SOURCE
#
Contracts

Orlando – Smart City Master Plan – expires 11/22

Fort Lauderdale – Smart City Media – Touchscreen Information Kiosks

Smart Digital Kiosks – Harrisburg, PA – Smart City Media

Sacramento Regional Transit District – 12/20

Dallas Texas – Smart City Networks

California – San Diego Convention Center Expansion

35 others

Self-Service Healthcare Accessibility

Read full article at Paciello Group March 2020

Healthcare kiosks are, now more than ever, a valuable tool for serving more patients without the need for up close staff interaction. They can be used for checking in patients and gathering symptom information for efficient triage purposes. They can also be used to measure patient blood pressure or heart rate, temperature, and other diagnostic information. Moreover, healthcare kiosks are also helpful for educating patients, collecting health insurance information, and scheduling future services.

Making a healthcare kiosk accessible not only improves patient care, but is required by the Americans with Disabilities Act (ADA). The ADA prohibits discrimination against individuals with disabilities regarding public accommodations and the court has defined public accommodation to include (in title III) service establishments including healthcare facilities.

Creating an accessible healthcare kiosk

Disabilities, according to the ADA, can be physical (motor skills), cognitive (intellectual), low to no vision, low to no hearing, and more. But before addressing software accessibility, the first step to creating an accessible healthcare kiosk should be to make the kiosk physically accessible. The ability to access the kiosk by users in a wheelchair is required by the ADA.  It outlines specific compliance guidelines like the height of operable parts, the viewing angle, and the approach area for accessing the kiosk — which must also be accessible via a wheelchair. The approach area requires a clear path without stairs, uneven flooring, or objects to obstruct access.

Once physical accessibility has been established, turn your attention to another an equally important component: software. The kiosk application must also be accessible for use by someone who is blind or has low vision. The kiosk needs to have a screen reader, such as JAWS® for kiosk to turn text to speech. Some examples of accessible kiosks can be found in this video.

Touchscreens may be difficult for people with disabilities, so an external input/navigation device is also useful to allow users to engage with a kiosk without using a touchscreen.  The kiosk application must be developed to ensure it can be easily navigated and understood when read through a screen reader. WCAG 2.1 AA standards are application and website guidelines for accessibility. Following those guidelines with a healthcare check-in app, for instance, will make it easier for a blind or low vision user to understand and navigate the kiosk app. Learn more about selecting the right input device for your accessible kiosk.

Some things to consider when planning your accessible healthcare kiosk

  1. What application will you be using? Is it already accessible? If yes, can you improve usability for kiosk users?
  2. Is the kiosk hardware ADA compliant for height and reach specifications?
  3. Does the kiosk include an input device that has an audio jack? Oftentimes, there is no effect on audio jacks built in audio jacks when headphones are inserted. Using an input device that includes an audio jack will allow JAWS to turn off and on based on the presence of the headphones.
  4. Are you providing all information in a way that is accessible to all users, including those who are deaf or hard of hearing, and those who are blind or who have low vision? That includes any PDFs that are being read on the screen, videos in need of captioning, and document signing for HIPAA compliance.
  5. Are you protecting user privacy at every turn?

Read full article at Paciello Group March 2020

Telemedicine — Expanded Telehealth Benefits for Medicare Beneficiaries

telemedicine thin client

Telemedicine Thin Clients

Noted on CMS.Gov March 2020

The Trump Administration today announced expanded Medicare telehealth coverage that will enable beneficiaries to receive a wider range of healthcare services from their doctors without having to travel to a healthcare facility. Beginning on March 6, 2020, Medicare—administered by the Centers for Medicare & Medicaid Services (CMS)—will temporarily pay clinicians to provide telehealth services for beneficiaries residing across the entire country.

“The Trump Administration is taking swift and bold action to give patients greater access to care through telehealth during the COVID-19 outbreak,” said Administrator Seema Verma. “These changes allow seniors to communicate with their doctors without having to travel to a healthcare facility so that they can limit risk of exposure and spread of this virus. Clinicians on the frontlines will now have greater flexibility to safely treat our beneficiaries.”

On March 13, 2020, President Trump announced an emergency declaration under the Stafford Act and the National Emergencies Act. Consistent with President Trump’s emergency declaration, CMS is expanding Medicare’s telehealth benefits under the 1135 waiver authority and the Coronavirus Preparedness and Response Supplemental Appropriations Act. This guidance and other recent actions by CMS provide regulatory flexibility to ensure that all Americans—particularly high-risk individuals—are aware of easy-to-use, accessible benefits that can help keep them healthy while helping to contain the spread of coronavirus disease 2019 (COVID-19).

Prior to this announcement, Medicare was only allowed to pay clinicians for telehealth services such as routine visits in certain circumstances. For example, the beneficiary receiving the services must live in a rural area and travel to a local medical facility to get telehealth services from a doctor in a remote location. In addition, the beneficiary would generally not be allowed to receive telehealth services in their home.

The Trump Administration previously expanded telehealth benefits. Over the last two years, Medicare expanded the ability for clinicians to have brief check-ins with their patients through phone, video chat and online patient portals, referred to as “virtual check-ins”. These services are already available to beneficiaries and their physicians, providing a great deal of flexibility, and an easy way for patients who are concerned about illness to remain in their home avoiding exposure to others.

 A range of healthcare providers, such as doctors, nurse practitioners, clinical psychologists, and licensed clinical social workers, will be able to offer telehealth to Medicare beneficiaries. Beneficiaries will be able to receive telehealth services in any healthcare facility including a physician’s office, hospital, nursing home or rural health clinic, as well as from their homes.

Medicare beneficiaries will be able to receive various services through telehealth including common office visits, mental health counseling, and preventive health screenings. This will help ensure Medicare beneficiaries, who are at a higher risk for COVID-19, are able to visit with their doctor from their home, without having to go to a doctor’s office or hospital which puts themselves or others at risk. This change broadens telehealth flexibility without regard to the diagnosis of the beneficiary, because at this critical point it is important to ensure beneficiaries are following guidance from the CDC including practicing social distancing to reduce the risk of COVID-19 transmission. This change will help prevent vulnerable beneficiaries from unnecessarily entering a healthcare facility when their needs can be met remotely.

President Trump’s announcement comes at a critical time as these flexibilities will help healthcare institutions across the nation offer some medical services to patients remotely, so that healthcare facilities like emergency departments and doctor’s offices are available to deal with the most urgent cases and reduce the risk of additional infections. For example, a Medicare beneficiary can visit with a doctor about their diabetes management or refilling a prescription using telehealth without having to travel to the doctor’s office. As a result, the doctor’s office is available to treat more people who need to be seen in-person and it mitigates the spread of the virus.

As part of this announcement, patients will now be able to access their doctors using a wider range of communication tools including telephones that have audio and video capabilities, making it easier for beneficiaries and doctors to connect.

Clinicians can bill immediately for dates of service starting March 6, 2020. Telehealth services are paid under the Physician Fee Schedule at the same amount as in-person services. Medicare coinsurance and deductible still apply for these services. Additionally, the HHS Office of Inspector General (OIG) is providing flexibility for healthcare providers to reduce or waive cost-sharing for telehealth visits paid by federal healthcare programs.

Medicaid already provides a great deal of flexibility to states that wish to use telehealth services in their programs. States can cover telehealth using various methods of communication such as telephonic, video technology commonly available on smart phones and other devices. No federal approval is needed for state Medicaid programs to reimburse providers for telehealth services in the same manner or at the same rate that states pay for face-to-face services.

This guidance follows on President Trump’s call for all insurance companies to expand and clarify their policies around telehealth.

To read the Fact Sheet on this announcement visit: https://www.cms.gov/newsroom/fact-sheets/medicare-telemedicine-health-care-provider-fact-sheet

To read the Frequently Asked Questions on this announcement visit: https://www.cms.gov/files/document/medicare-telehealth-frequently-asked-questions-faqs-31720.pdf

This guidance, and earlier CMS actions in response to the COVID-19 virus, are part of the ongoing White House Task Force efforts. To keep up with the important work the Task Force is doing in response to COVID-19 click here www.coronavirus.gov. For information specific to CMS, please visit the Current Emergencies Website.

###

Get CMS news at cms.gov/newsroom, sign up for CMS news via email and follow CMS on Twitter CMS Administrator @SeemaCMS@CMSgov, and @CMSgovPress.

 

Available Today: HP ZCentral Remote Boost & Connect

HP ZCentral Remote

To Thinclient from HP

As you know, in November, HP announced ZCentral, a solution powering the next-gen of computing with the world’s first single-sourced remote workstation solution. Starting today, customers can access the new generation of ZCentral Remote Boost here, and the proprietary ZCentral Connect software here. In tandem, HP is extending the ZCentral Remote Boost software free trial to 3 months for anyone who may need it, on any workstation (it’s always included with Z by HP devices).

By centralizing high-compute performance, companies are able to free power users to tackle complex, graphics-intensive projects, with ISV certifications, from anywhere.

ZCentral also adds an extra layer of security for IT departments with remote workers. By keeping the workstation secure and centralized next to the data storage, with ZCentral Connect and ZCentral Remote Boost, only encrypted pixels are sent over the network, so company data remains highly secure at the source.

Please see links below to more information:

If you have any questions, let me know and I’ll get you connected with one of our product managers.

Touch Screen Safe AntiMicrobial Wipes

Antimicrobial Wipes

Visit Kiosk Industry for latest updates on AntiMicrobial Wipes, Sprays, film, UV-C, Copper, Coatings and more.

Last Updated on 

Disinfectant Wipes for Touch Screen

By now we have all seen and read countless articles on how best to protect ourselves and others from bacterial infection. Before we begin we want to list some recommended resources right off the bat that can help educate your point of view on antibacterial, antimicrobial and of course, the coronavirus. See our full portal page on AntiBacterial for more information.

Our current recommendations:

  1. Clean surfaces with warm soapy water. That breaks down the viruses and removes it.
  2. Another option — wipe down with bleach wipes and after several passes of that wipe down with Easy Screen.
  3. Bleach – figure 1/3 cup bleach per gallon of water for mix ratio
  4. Avoid highly concentrated solutions of alcohol based.
  5. If you want to “double-clean” then consider getting handheld UVC product like the Blade below for localized and safe UVC cleaning (after surfaces have been wiped down). Oily fingers are one of the complicating factors to consider.

Disinfectant Wipes For Touch Screen

 

 

PDI Update

PDI has been monitoring the COVID-19 epidemic (SARS-CoV-2 virus), previously identified as 2019 Novel Coronavirus (2019-nCoV), to provide you the most current information to help manage this outbreak. The CDC has recently issued additional recommendations for surface disinfection, including recommendations for the use of an EPA-approved disinfectant with emerging viral pathogens claims. This letter supersedes previous letter issued on January 30, 2020.

Super Sani-Cloth ® Wipes, Sani-Cloth ® AF3 Wipes, and Sani-Cloth ® Bleach Wipes meet the criteria for the EPA emerging viral pathogens claim. PDI has submitted the addition of the required language for this claim on these master labels to the EPA and is awaiting expedited approval. Recently launched products, including Sani-Cloth ® Prime Wipes, Sani-Prime ® Spray, Sani-24 ® Spray, and Sani-HyPerCideTM Spray already have the EPA emerging viral pathogens claim on their master labels.

Recommended Wipe

Super Sani-Cloth is what we would recommend. It is the most equipment friendly wipe that is on the list.

The SARS-CoV-2 virus still has not been made readily available by the CDC for testing. The CDC states: “If there are no available EPA-registered products that have an approved emerging viral pathogens claim for COVID-19, products with label claims against human coronaviruses should be used according to label instructions.” The following PDI products have label claims against human coronaviruses:

Click for full size

Handheld cleaning would include after-hours with handheld UV device (example here is Blade). $700

UV-C Handheld Blade FAQ
  1. How does one use it?

With the Blade unit, all you need to do is get it as close to the surface as possible and pass it over the surface. Being one inch away, a few seconds exposure kills all bacteria and virus.

  1. How long does it take?

Some take a little longer than normal but a few seconds is plenty if 1 inch away

  1. What is the wrong way to use them?

You don’t shine the light up or at anyone and the operator should wear safety glasses which we include with every unit

  1. How does it handle oily fingerprints and smudges?

The surface should be wiped down for the best application

  1. These should be used in off-hours when no customers or patients around? Example: the front lobby of VA where check-in’s are taking place.

They can be used 24 hours a day, you just need to have people stand back while you run the unit over the surface

See our full portal page on AntiBacterial for more information.

 

KMA Announces ADA Accessibility Chairpersons

Kiosk Manufacturer Association

From Kiosk Industry March 2020

From PRNewswire March 2020

WESTMINSTER, Colo.March 4, 2020 /PRNewswire/ — The Kiosk Manufacturer Association aka KMA announces our new ADA and Accessibility Chairpersons.  Serving as co-chairpersons for our committee is Randy Amundson of Frank Mayer and Associates, Inc. and Mr. Peter Jarvis of Storm Interface.  Randy is one of our founding chairpersons and is continuing in his support of KMA and ADA. Peter is a charter sponsor of the Accessibility Committee and now helps lead the way for the KMA.

From Randy Amundson, “Peter Jarvis and I continue to work closely in finalizing the Kiosk Accessibility Code of Practice (CoP). We feel that the CoP will be a useful tool that kiosk manufacturers and their clients can use to ensure that their kiosks are accessible to the widest population of people with some form of disability possible. Peter and I are also working on developing an independent standard that can be used by nationally recognized testing labs in order to certify a kiosk as being ADA compliant”.

Peter Jarvis adds, “First, let me thank the committee’s previous Co-Chair Laura Miller for her work in raising awareness of accessibility issues within the kiosk industry. Laura continues to make an outstanding contribution to the work of the KMA Accessibility Committee but has now stepped into a role dedicated to kiosk accessibility at Vispero. Her commitment, to ensure equality in access to information, services and products, continues to influence the committee’s objectives. As the new Co-Chair (serving the KMA’s European members) I hope to continue the initiatives of the committee and look forward to working with the committee’s US resident Chairperson Randy Amundson.”

We very much thank Laura Boniello Miller with Vispero our founding co-chairperson for her contributions, support and effort over the last two years.

Visit with the KMA at the upcoming CSUN conference as well as at MURTEC. In May we will be exhibiting at the National Restaurant Show.

Current KMA News

KMA member news

If your company, organization, association, local, city, state or federal agency would like to participate at some level with the KMA either with ADA or with EMV, please contact [email protected] or call 720-324-1837

Thanks for the generous financial support of our GOLD sponsors Olea Kiosks | KioWare | Nanonation | Pyramid | Frank Mayer | Vispero | Zebra  | ZIVELO

SOURCE Kiosk Manufacturer Association

CSUN 2020 Assistive Technology

CSUN Assistive Technology Conference

From Kiosk Industry

assistive technology Come to the 2020 Exhibit Hall and experience first-hand the cutting-edge assistive technology offered in over 100 booths. For 34 years, thousands have attended the CSUN Conference’s free Exhibit Hall to have the opportunity to directly interact with the providers who develop the technology, products and services designed to promote inclusion for people with disabilities.

The Exhibit Hall is located in the Grand Ballroom and Marquis Ballroom on the lobby level of the hotel.  Be one of the first to explore the latest innovative technology when doors open on Wednesday, March 11 at 12:00 pm.  We also welcome you to attend the Exhibit Hall Opening Reception at 12:30 pm.

This March 11th-13th, Vispero will be leading multiple presentations on kiosk accessibility at CSUN’s Annual Accessibility Conference being held in Anaheim, CA. Vispero’s Vice President and subject matter expert Matt Ater, will lead a panel of kiosk accessibility experts on “Lessons Learned from Developing Accessible Kiosks”. The panel will include KMA Accessibility Board co-chair Peter Jarvis, Senior Executive VP at Storm Interface, among others. Kiosk accessibility and usability will be discussed in a presentation called “Kiosk Accessibility: Understanding the Kiosk User Experience”, kiosk industry veteran Laura Boniello Miller and usability expert Rachael Bradley Montgomery will discuss the perspective of the kiosk user and how deployers can best accommodate users with disabilities.  Vispero’s Ryan Jones will lead a session, “JAWS Kiosk: What Is It and When Would I Use It” to assist in using the JAWS screen reader in accessible kiosk deployments. Along with the presentations you can visit the Vispero booths  in the Marquis Ballroom, #503, #603, and #703 to see accessible kiosks in action, including kiosks from OleaPyramid and SeePoint.  Vispero will also be hosting an accessible Escape Room, and on-site registration will be available using an accessible kiosk powered by JAWS, located in the Vispero Showcase Suite.

Vispero has added support for the new Storm Assistive Technology device, the new Extended Functionality AudioNav. JAWS will continue to support the Storm AudioNav and other assistive technology devices by Storm as they are added.

Kiosk Research – 2020 Mercator Self-Service QSR Kiosk Market Report

From Kiosk Industry Feb 2020

Self-Service QSR Kiosks Gaining Popularity

Editors Note: Short and concise report on QSR Kiosk market. Nothing on drive-thru kiosks. Quite a few players not included (maybe next time). Example would be reference to McDonalds Times Square Flagship project (see CNBC writeup we published back in May 2019). That is Pyramid Computer out of Germany making those. No mention of Evoke or Coates for that matter. Recent news of Glory $225M investment in Acrelec is worth considering. Deployers like Appetize nada. Canada, Europe, Asia and South America are not covered. Still it is a recommended report for those who are looking to get educated on the QSR Kiosk Market.

Summary: Self-Service Kiosks Gaining QSRs’ and Consumers’ Adoption. Mercator Advisory Group research report assesses the 2019 U.S. QSR kiosk market and its future growth prospects.

Market: Self-Service Kiosks Gaining Popularity, provides insight and market analysis on the fast-growing QSR kiosk market in the United States, where ordering via self-service kiosks in quick service restaurants is gaining popularity among consumers and QSRs are adopting the technology in various configurations.

Thin Client RFPs – Application Containment & Endpoint Detection

Thin Client RFP RFPs we see. Both of these on SAM as of Feb 2020

=================================

SOURCES SOUGHT ANNOUNCEMENT

PL84110008

The Defense Information Systems Agency (DISA) is seeking sources for Application Containment

CONTRACTING OFFICE ADDRESS:

IT CONTRACTING DIVISION

BUILDING 3600

2300 EAST DRIVE

Scott AFB IL 62225-5406 US

For the purposes of this Sources Sought, endpoints are described as follows: t * Thick Client Network clients running on fully-capable systems – Local storage and processing capability; can operate independently if not connected to a network. t * Thin Client Network client running on minimally-capable system – Minimal local storage and processing capability. t * Zero Client Client with no capability outside of network context. t * Server Respond to client requests; provide enterprise services (typically in data centers). Users are System Administrators. t * Virtual Client Client running virtually on a host platform; no physical resources. The target is an endpoint (excluding devices like phones and tablets) security and management solution that mitigates prevalent adversary attack vectors, tactics, and techniques used to compromise a system. The proposed solution must automatically isolate the execution of high risk applications interacting with untrusted content from more trusted portions of the endpoint (e.g. host operating system); and/or the solution must facilitate incident detection, investigation, response and threat hunting. Any proposed solution must continue to be effective in disconnected, virtual, intermittent, and low bandwidth network conditions without a dependence upon regularly recurring (e.g. daily, weekly, monthly) content updates. The proposed solution must be capable of scaling to millions of endpoints and provide information in near real-time. Any proposed solution must be ready for testing and subsequent deployment. In order for the Government to evaluate the technical merits of the vendors solution(s), the solution(s) shall be capable of meeting the following technical requirements: Application Containment t 1. The solution shall automatically isolate applications interacting with untrusted content (e.g., internet web pages, email, removable media, and office documents) from more trusted portions of the device outside the container. t 2. The solution shall automatically detect potentially malicious code behavior executing within the isolation container. t 3. The solution shall automatically capture necessary details (e.g., ports and protocols in use, running executables and services, browser plugins in use, etc.) of events (e.g., malicious activity) occurring within the isolation container to support retrospective post-event analysis, threat analysis, and situational awareness. t 4. The solution shall automatically constrain potentially malicious activity to within the isolation container. t 5. The solution shall be configurable to control the ability of applications running within the isolation container to access only specified system resources (e.g., storage devices, network resources, human interface devices, etc.). t 6. The solution shall automatically eliminate and report all isolation container artifacts of compromise and intrusion remnants to the common management server in support of rapid remediation and investigation. t 7. The solution shall automatically restore access to a potentially compromised application within 60 seconds post-compromise, unless configured to allow malware to run for the purpose of analysis. t 8. All components shall be protected against unauthorized/malicious access and modification. This applies to executable code, data, and component settings. t 9. The solution shall provide continual verification of the integrity of the isolation container to ensure there is no unauthorized/malicious access or persistent modification. t 10. Solution components shall not impair authorized system operations (e.g., patching, scanning, business software usage, information assurance tools/initiatives (Secure Host Baseline, Assured Compliance Assessment Solution, etc.) nor shall they degrade managed system performance in any way, which may adversely impact a system s primary business/mission functions. t 11. The solution shall provide automatic time stamping of all collected data and events based on a single time standard (e.g., Coordinated Universal Time). t 12. The solution shall support the Department’s currently mandated means of authentication (e.g., Public Key Infrastructure (PKI)). t 13. The solution shall securely store and transmit data in a manner that ensures the confidentiality, integrity, availability, and source authenticity of the data. t 14. The solution shall automatically report operating status and configuration to its common management system, based on a pre-defined schedule, to ensure the capability is operating and configured as expected. t 15. The solution shall interoperate with event monitoring and correlation systems (e.g. SIEMs) to facilitate aggregated situational awareness. t 16. The solution shall allow for patching and update of containerized applications through a means of automated verification (e.g., integration with automated patch management infrastructure/processes). t 17. The solution shall encrypt all data in transit or data at rest with Federal Information Processing Standards (FIPS) 140-2 compliant cryptographic modules. t 18. The solution shall support open standards for automated threat information sharing. t 19. The solution shall protect managed endpoints operating in Connected, Disconnected, Intermittent, and Limited (DIL) bandwidth networked and standalone environments. t 20. The solution shall report to the Common Management Server all potentially malicious events encountered while the managed endpoint was without network connectivity. t 21. The solution shall provide configurable alerting based upon administrator defined criteria. t 22. The solution shall send alerts at administrator-definable intervals. t 23. The solution shall, at a minimum, operate on the most common vendor supported operating systems approved for use in the DoD environment (e.g., Microsoft Windows 8.1, Windows 10 (including Secure Host Baseline), and Exchange Server 2016, Linux). t 24. The solution shall provide the ability for designated administrators, authenticated according to DoD standards, to configure the solution in accordance with applicable DoD policies. t 25. The solution shall automatically report potentially malicious events detected within the isolation container to a common management server and provide actionable information in a non-proprietary, standard format (e.g. Structured Threat Information expression (STIX)). t 26. The isolation container shall ensure that destructive malware within the container is unable to negatively impact user data or the integrity of the host system. t 27. The solution shall, where possible, inspect and/or sanitize active or potentially malicious untrusted content passing out of the container to the underlying more-trusted host. Examples include copy-paste, printing, file saving, and synchronization of configuration, and user data such as cookies and bookmarks. Sanitization should re-encode content in such a way as to minimize the likelihood of malicious exploitation when content is processed. t 28. The solution should be capable of containing operating system kernel-level vulnerability exploitation. t 29. The solution shall have the capability to be tuned/configured to reduce alerts resulting from false positives. t 30. The solution’s uninstall capability shall ensure no artifacts are left behind following execution of the uninstall processes. t 31. All solution components shall have the ability to be automatically deployed and configured based on predefined configurations. SPECIAL REQUIREMENTS Must have Secret Facility Clearance. Please provide your current Facility Clearance level. SOURCES SOUGHT: The North American Industry Classification System Code (NAICS) for this requirement is 511210, with the corresponding size standard of $41.5 million. To assist DISA in making a determination regarding the level of participation by small business in any subsequent procurement that may result from this Sources Sought, you are also encouraged to provide information regarding your plans to use joint venturing (JV) or partnering. Please outline how you would envision your company’s areas of expertise and those of any proposed JV/partner would be combined to meet the specific requirements contained in this announcement. In order to make a determination for a small business set-aside, two or more qualified and capable small businesses must submit responses that demonstrate their qualifications. Responses must demonstrate the company s ability to perform in accordance with the Limitations on Subcontracting clause (FAR 52.219-14). SUBMISSION DETAILS: Responses should include: t 1. Business name and address; t 2. Name of company representative and their business title; t 3. Type of Small Business; t 4. CAGE Code; t 5. Your contract vehicles that would be available to the Government for the procurement of the product and/or service, to include ENCORE III, SETI, NIH, NASA SEWP, General Service Administration (GSA): OASIS, ALLIANT II, VETS, STARS II, Federal Supply Schedules (FSS) (including applicable SIN(s)), or any other Government Agency contract vehicle that allows for decentralized ordering. (This information is for market research only and does not preclude your company from responding to this notice.) t tVendors who wish to respond to this should send responses via email NLT 4:00 PM Eastern Daylight Time (EDT) on February 17, 2020 to Taylor Rakers, [email protected] and Cody Seelhoefer, [email protected] If you feel your company has a solution that meets the requirements above, submit a brief capabilities package (no more than ten pages) demonstrating that ability. t tProprietary information and trade secrets, if any, must be clearly marked on all materials. All information received that is marked Proprietary will be handled accordingly. Please be advised that all submissions become Government property and will not be returned. All government and contractor personnel reviewing submitted responses will have signed non-disclosure agreements and understand their responsibility for proper use and protection from unauthorized disclosure of proprietary information as described 41 USC 423. The Government shall not be held liable for any damages incurred if proprietary information is not properly identified. SCOTT AFB, IL 62225


The Defense Information Systems Agency (DISA) is seeking sources for Endpoint Detection and Response (EDR)

CONTRACTING OFFICE ADDRESS:

IT CONTRACTING DIVISION

BUILDING 3600

2300 EAST DRIVE

Scott AFB IL 62225-5406 US

INTRODUCTION:

This is a SOURCES SOUGHT ANNOUNCEMENT to determine the availability and technical capability of small businesses (including the following subsets, Small Disadvantaged Businesses, Certified 8(a), Service-Disabled Veteran-Owned Small Businesses, HUBZone Small Businesses and Woman Owned Small Businesses) to provide the required products and/or services.

The Endpoint Security Portfolio is seeking information for potential sources for Endpoint Detection and Response (EDR) capability allowing cyber defenders to quickly detect and investigate security incidents and automatically detect malicious system activities and behaviors. EDR capabilities continuously record significant events occurring on managed systems for the purpose of identifying, reporting, and investigating malicious activity; thereby reducing and adversary s dwell time on DoD networks. Recorded data accessible through a management console query interface. The EDR capability complements other endpoint security measures and capabilities; the ability to restrict execution of high-risk applications and computer processing.

DISCLAIMER:

THIS SOURCES SOUGHT ANNOUNCEMENT IS FOR INFORMATIONAL PURPOSES ONLY. THIS IS NOT A REQUEST FOR PROPOSAL. IT DOES NOT CONSTITUTE A SOLICITATION AND SHALL NOT BE CONSTRUED AS A COMMITMENT BY THE GOVERNMENT. RESPONSES IN ANY FORM ARE NOT OFFERS AND THE GOVERNMENT IS UNDER NO OBLIGATION TO AWARD A CONTRACT AS A RESULT OF THIS ANNOUNCEMENT. NO FUNDS ARE AVAILABLE TO PAY FOR PREPARATION OF RESPONSES TO THIS ANNOUNCEMENT. ANY INFORMATION SUBMITTED BY RESPONDENTS TO THIS SOURCES SOUGHT ANNOUNCEMENT IS STRICTLY VOLUNTARY.

REQUIRED CAPABILITIES:

For the purposes of this Sources Sought, endpoints are described as follows:

  • t
  • Thick Client Network clients running on fully-capable systems – Local storage and processing capability; can operate independently if not connected to a network.
  • t
  • Thin Client Network client running on minimally-capable system – Minimal local storage and processing capability.
  • t
  • Zero Client Client with no capability outside of network context.
  • t
  • Server Respond to client requests; provide enterprise services (typically in data centers). Users are System Administrators.
  • t
  • Virtual Client Client running virtually on a host platform; no physical resources.

The target is an endpoint (excluding devices like phones and tablets) security and management solution that mitigates prevalent adversary attack vectors, tactics, and techniques used to compromise a system. The proposed solution must automatically isolate the execution of high risk applications interacting with untrusted content from more trusted portions of the endpoint (e.g. host operating system); and/or the solution must facilitate incident detection, investigation, response and threat hunting. Any proposed solution must continue to be effective in disconnected, virtual, intermittent, and low bandwidth network conditions without a dependence upon regularly recurring (e.g. daily, weekly, monthly) content updates. The proposed solution must be capable of scaling to millions of endpoints and provide information in near real-time. Any proposed solution must be ready for testing and subsequent deployment.

In order for the Government to evaluate the technical merits of the vendors solution(s), the solution(s) shall be capable of meeting the following technical requirements:

EDR

  1. t
  2. The solution shall provide the ability to automatically capture, record and analyze a user-selectable range of endpoint parameters and events in order to assess system operations, support risk management and enable hunt and forensic activities. Examples of data the solution shall be capable of capturing include: – Windows Registry – Changes to Keys (and their associated processes; including auto-run keys), Access Control Lists (ACLs), license keys, ownership, and administrative rights.
    t
    t- User Activity – Authentication and privileged user activities.
    t- Network Activity – File transfers, connections opened and closed, destination (Uniform Resource Locator, Internet Protocols, type of traffic and encryption method (e.g., File Transfer Protocol, Secure File Transfer Protocol, Server Message Block, Transport Layer Security, and Secure Sockets Layer.
    t – Processes and Services – Automatic and manual starts and stops. Process parent and child relationships. Loaded and unloaded Dynamic Link Libraries, and record of their associated processes and files on the file system.
    t – Software Changes Operating System, driver and program installation, uninstall, patching, and modification information (e.g., software versions, software identification tags, patch information and mutex data).
    t – Peripheral Connections – Wired and wireless connections to peripheral devices.
    t – Other File Activity – Files created, opened, closed, saved, modified, moved, or deleted.
    t – In-memory Activities – In-memory activities associated with potentially malicious activity; including mutexes and named pipes associated with processes.
    t – Hardware Changes – Peripheral device detection, removal, or modification.
    t
  3. t
  4. The solution shall not impair authorized system operations (e.g., patching, scanning, business software usage, information assurance tools/initiatives (secure host baseline, assured compliance assessment solution, etc.) nor shall it degrade managed system performance in any way, which may adversely impact a system s primary business/mission functions.
  5. t
  6. The solution shall encrypt all data in transit or data at rest with FIPS 140-2 compliant cryptographic modules.
  7. t
  8. The solution shall, at a minimum, operate on the most common vendor supported operating systems approved for use in the DoD environment (e.g., Microsoft Windows 8.1, Windows 10 (including secure host baseline) and Exchange Server 2016).
  9. t
  10. The solution shall support automated/scheduled transfer of endpoint data to Government approved data archives (e.g., commercial cloud, DoD-owned, federal data center, etc.)
  11. t
  12. The solution shall provide time stamping of all collected data and events based on a single time standard (e.g., coordinated universal time).
  13. t
  14. The solution shall securely store and transmit data in a manner that ensures the confidentiality, integrity, availability, and source authenticity of the data.
  15. t
  16. The solution shall provide the ability to automatically discover and alert on previously unknown external and/or internal hardware/peripheral devices (such as storage) connected to endpoints for the purpose of retrospective/post-event analysis.
  17. t
  18. The solution shall provide integrated and customizable search with, at minimum, the ability to, from the central management server or other authorized consoles, search data from all systems for information relevant to an incident investigation or risk analysis.
  19. t
  20. The solution shall have the ability to execute manual and scheduled scans of specified systems for indicators derived from threat intelligence or other sources.
  21. t
  22. The solution shall provide integrated analytics (including visualization) and support the creation of custom analytics, in order to identify anomalous endpoint behaviors, support incident investigation, and perform event analysis.
  23. t
  24. The solution shall have the ability to pull locally stored data from specified endpoints in near real time to support high priority hunt and forensic operations.
  25. t
  26. The solution shall provide automatic hardware-level, operating system-level, and application-level monitoring.
  27. t
  28. The solution shall allow administrative functions to be delegated to users based on roles/permissions and or groupings of endpoints they are responsible for managing.
  29. t
  30. The solution shall provide automated analysis and visualization of an attack; including production of an event timeline and initial assessment of severity/impact.
  31. t
  32. The solution shall support delegation (i.e., user-specified) of who can access/view collected endpoint data.
  33. t
  34. The management and analytic components of the solution shall scale to support an endpoint client load of at least 500,000 endpoints.
  35. t
  36. The solution shall support the Department’s currently mandated means of authentication (e.g., PKI).
  37. t
  38. The solution shall automatically report detection of potentially malicious events to a common management server and provide actionable information in non-proprietary, standard formats (e.g. STIX).
  39. t
  40. The solution shall generate reports based on pre-saved user-defined formats and datasets to facilitate rapid analysis, decision making, and follow-up actions following events.
  41. t
  42. The solution shall, through a central management server, provide options for configurable automated or manual remediation actions in response to detected potentially malicious events.
  43. t
  44. The solution’s uninstall capability shall ensure no artifacts are left behind following execution of the uninstall processes.
  45. t
  46. The solution shall support the rapid push (objective: within 30 seconds) of configuration changes from the management server to all installed agents.
  47. t
  48. The solution shall protect managed endpoints operating in Connected, DIL bandwidth networked, and standalone environments.
  49. t
  50. All solution components shall have the ability to be automatically deployed and configured based on predefined configurations.
  51. t
  52. The solution shall report to the common management server all potentially malicious events encountered while the managed endpoint was without network connectivity.
  53. t
  54. All components shall be protected against unauthorized/malicious access and modification. This applies to executable code, data, and component settings.

SPECIAL REQUIREMENTS

Must have Secret Facility Clearance. Please provide your current Facility Clearance level.

SOURCES SOUGHT:

The North American Industry Classification System Code (NAICS) for this requirement is 511210, with the corresponding size standard of $41.5 million.

To assist DISA in making a determination regarding the level of participation by small business in any subsequent procurement that may result from this Sources Sought, you are also encouraged to provide information regarding your plans to use joint venturing (JV) or partnering. Please outline how you would envision your company’s areas of expertise and those of any proposed JV/partner would be combined to meet the specific requirements contained in this announcement.

In order to make a determination for a small business set-aside, two or more qualified and capable small businesses must submit responses that demonstrate their qualifications. Responses must demonstrate the company s ability to perform in accordance with the Limitations on Subcontracting clause (FAR 52.219-14).

SUBMISSION DETAILS:

Responses should include:

Business name and address;

  1. t
  2. Name of company representative and their business title;
  3. t
  4. Type of Small Business;
  5. t
  6. CAGE Code;
  7. t
  8. Your contract vehicles that would be available to the Government for the procurement of the product and/or service, to include ENCORE III, SETI, NIH, NASA SEWP, General Service Administration (GSA): OASIS, ALLIANT II, VETS, STARS II, Federal Supply Schedules (FSS) (including applicable SIN(s)), or any other Government Agency contract vehicle that allows for decentralized ordering. (This information is for market research only and does not preclude your company from responding to this notice.)
    t
    tVendors who wish to respond to this should send responses via email NLT 4:00 PM Eastern Daylight Time (EDT) on February 17, 2020 to Taylor Rakers, [email protected] and Cody Seelhoefer, [email protected] If you feel your company has a solution that meets the requirements above, submit a brief capabilities package (no more than ten pages) demonstrating that ability.
    t
    tProprietary information and trade secrets, if any, must be clearly marked on all materials. All information received that is marked Proprietary will be handled accordingly. Please be advised that all submissions become Government property and will not be returned. All government and contractor personnel reviewing submitted responses will have signed non-disclosure agreements and understand their responsibility for proper use and protection from unauthorized disclosure of proprietary information as described 41 USC 423. The Government shall not be held liable for any damages incurred if proprietary information is not properly identified.

Thin Client News – IGEL Heiko Gloge Passes CEO Torch To Jed Ayres

Excerpt From CRN

Thin Client News – IGEL Founding Father Heiko Gloge Passes CEO Torch To Jed Ayres

‘This is a once-in-a-lifetime opportunity focused on how the world is going to consume applications and Windows desktops,’ says new IGEL CEO Jed Ayres. ‘It’s a Cinderella moment in my career. It’s a great honor, but it’s also a huge responsibility because of the heritage, tradition and stability that Heiko brought to this company.’

 

IGEL Founding Father Heiko Gloge

Heiko Gloge, the founding father and driving force behind IGEL’s rise over the past two decades from an upstart German thin-client manufacturer to a global next-generation edge operating system powerhouse, is stepping aside and handing the global CEO post to Jed Ayres.Ayres, the hard-charging marketing maestro who Gloge recruited as U.S. CEO four years ago to take IGEL into Silicon Valley and lead the global software offensive, is pledging to take the company from $150 million in sales to more than $1 billion.

The $1 billion goal comes as the 20-year-old company moves to capture the exploding cloud workspaces opportunity with a blockbuster partnership with software giant Microsoft. As the first Linux client for Microsoft’s fast-growing Windows Virtual Desktop, IGEL is in a unique position to capture significant edge operating system market share.

[RELATED: IGEL Founding Father Heiko Gloge’s Legacy: A German Force In A U.S. Dominated Technology Market]

 

Thin Client vs. Thick Client vs. Zero Client

Finding the best client for security, performance, virtualization, mobility and the cloud.

How thin can you go? New clients continue to be introduced, like HP’s unveiling of the t310 G2 All-in-One Zero Client in January. With client types on the market ranging from traditional thick desktop computers to PC over IP zero clients and everything in between, IT decision-makers are left with tough questions as they try to parse out the differences and best uses of various client types.

By considering the particular strengths of thick clients vs. thin clients vs. zero clients around several key attributes, IT teams can implement the right solutions to meet the need of their businesses.

VIDEO: See what technologies are driving the evolution of the data center!

What Is a Zero Client: The Security Benefits and Beyond

One of the signature strengths of zero clients is security. Because a zero client has no local operating system, the avenues of attack are radically reduced.

But, says David Johnson, a principal analyst at Forrester, even a zero client carries some degree of vulnerability.

“Zero clients have at least some firmware,” says Johnson. “Firmware is vulnerable to attack, or can be. But in general, it should be easier to secure a zero client. With an entire PC there are a lot of attack surfaces.”

Chromebook Thin Client – Intel’s Project Athena & Chromebooks

Intel’s at CES

  • newest stab at UltraBook.
  • Setting standards.
  • Mostly Windows.
  • Partnering with Google
  • Announced Chromebook.
intel took the stage at CES 2020 to deliver their keynote like they do kind of year after year and right in the middle of it they took a few minutes to talk about the progress that they’ve made on project Athena and then they made a surprising announcement to a lot of us and that is a partnership with Google surrounding this whole idea of project Athena laptops and then they went further and debuted a couple new Chromebooks the Samsung Galaxy  Chromebook in the Asus Chromebook as project Athena Chromebooks and all of this is very important and if you’re hearing all of that and going I don’t know what any of that means we kind of didn’t really either and so we did some research and I’d like to tell you about it

10ZiG to Demo BCR via Experimental CER Feature in Citrix Workspace App on Linux-Based Thin Client at Citrix Summit

10ZiG to Demo BCR via Experimental CER Feature in Citrix Workspace App on Linux-Based Thin Client at Citrix Summit

10ZiG Technology is demonstrating improved Browser Content Redirection using the Chromium Embedded Framework feature via the Citrix Workspace App on 10ZiG Linux-Based Thin Clients today at Citrix Summit 2020.

 

ORLANDO, FLORIDA – 10ZiG Technology® is conducting live demonstrations of the Citrix Workspace App’s Browser Content Redirection (BCR) using Chromium Embedded Framework (CEF), displaying its performance improvements, on 10ZiG Linux-Based Thin Clients at Citrix Summit booth #502. In the recent release of Citrix Workspace App for Linux Version 1912, Citrix added support to BCR utilizing the experimental CEF-based engine. This enriches the experience on Thin Clients, as it helps to offload network usage, client-side processing, and graphics rendering directly to the endpoint.

BCR redirects contents of a web browser to a Client device/endpoint, creating a corresponding browser that embeds within the Citrix Workspace App itself. Up until Version 1912, performance on lower powered devices such as Thin Clients were problematic, but with the advances of CEF-based overlay, there are good signs of progress. 10ZiG quickly adapted to this recent release until compatibility and support was achieved and is demoing those good signs of progress on 10ZiG Linux-based Thin Clients, which did not take too long to accomplish.

Says 10ZiG CTO Kevin Greenway, “10ZiG is incredibly Citrix-responsive and Citrix-ready. Because we’re only consumed in Thin & Zero Client development, we were once again able to jump in and finetune Version 1912 advances through swift configuration and testing. We’re excited to be able to demonstrate this today and tomorrow at Citrix Summit, as we are publicly known as “first-responders” to Citrix updates. The enhanced BCR experience is just one more thing that our Thin Client Partners and customers are happy about and we know that they are anxious to see it in action. Stop by booth #502!”

About 10ZiG Technology®

10ZiG Technology is a world-market leader in Thin Client & Zero Client endpoint devices for Virtual Desktop Infrastructure. 10ZiG provides leading Intel and AMD based Dual and Quad Core Thin Clients and Zero Clients for VMware Blast Extreme & PCoIP, Citrix (HDX, HDX Premium, HDX 3D Pro), and Microsoft environments, in addition to the widest range of Teradici PCoIP Zero Clients on the market. 10ZiG offers free, no-obligation demo devices, best-in-industry Technical Support teams based in the U.S. and Europe, and provides at no cost, the Cloud-enabled “10ZiG Manager” Console with unlimited user licenses.

###

About Citrix Summit

For more information on Citrix Summit, please see www.citrixsummit.com (10ZiG Technology will be exhibiting at Booth #502.)

Contact Us

To learn more about cutting-edge VDI technology from 10ZiG, or to arrange for a FREE Thin or Zero Client demonstration device, please contact 10ZiG below.

Corporate Headquarters, US

10ZiG Technology Inc.

23309 N. 17th Drive #100

Phoenix, AZ 85027, USA

  1. +1 (866) 865-5250 | Email:[email protected]| Web: www.10ZiG.com

EMEA Headquarters

10ZiG Technology Ltd.

7 Highcliffe Road

Leicester LE5 1TY, UK

  1. +44 (0) 116 2148650 | Email:[email protected]| Web: www.10ZiG.com

Contact: Tom Dodds

10ZiG Technology Ltd.

www.10ZiG.com

+44 (0) 116 214 8650

—————

Thin Client Review 2020 Thinclient.org

HP Thin Client Overview

Thinclient Review

We start the year with a listing and review of thin client models from multiple manufacturers. Thin client computing has seen a big increase in RFPs being issued from local, city, state and federal agencies over 2019.  We monitor RFPs for this market. You can see list of them on our RFP page.

Sorry Dell/Wyse but we have to begin with HP, from what we have seen over the last year they are “still” the leader and the one to catch. The main HP Thin Client website is here.

HP Thin Client Brochure (pdf).

HP Thin Client Overview

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Highlights

    • HP Easy Shell – HP Easy Shell provides a streamlined experience for your HP Thin Client Windows embedded environment that’s completely customizable to fit your needs. Precisely tailor your unique security needs so you can make the most of your cloud infrastructure, VDI, and kiosk environments.
    • HP Thin Update — Download the latest images and add-ons from HP and use the tool to pre-configure the image, capture the golden image using USB key, and deploy it using either the USB key or HPDM.
    • HP True Graphics — Experience breakthrough video playback, smooth graphics rendering, and impressive high-speed performance with less lag time when you access rich graphical applications and multimedia content from the cloud. Available for Windows® and Linux®-based HP Thin Clients.
    • HP Device Manager — Make it easy for your IT admins to remotely deploy, update, and manage thousands of HP Thin Clients from anywhere1 through a single console.
    • Products
      • t430
      • 530
      • 640
      • 740
      • mt21
      • mt45
      • 310 G2 Zero Client (starts at $309)

HP Thin Client Overview

 

Next time we are going to do Dell…

Chromebook 2019 of the year

From AboutChromeBooks

My pick for 2019 Chromebook of the year

It’s been an exciting 2019 in the world of Chromebooks, which comes to an end today. And about two weeks ago on a podcast, I shared what my Chromebook of the year is. But I put off writing about it, mainly because I was finding it difficult to explain why I chose what I did. After much reflection and quiet time during the holiday season, I figured it out.

But first, let me share my pick, which is certainly arguable: I think the best Chromebook for most people, and launched in 2019, is the Google Pixelbook Go.

Here are my reasons why:

  • Lighter and thinner than any similarly sized Chromebook.
  • Better design and materials than most Chromebooks
  • Speakers that are on par with, if not better than, those found in the Pixel Slate, which easily produce the best sound from any Chromebook.
  • Improved hush-keys that are now what I consider the gold standard of Chromebook keyboards.
  • Outstanding battery life in such a thin package

Yes, there are some “downgrades” from the Pixelbook when it comes to the Go. You lose the 2-in-1 form factor and stylus support as previously mentioned. The display resolution is lower and the screen aspect ratio is now 16:9. But in every other meaningful way, this is an upgrade from the Pixelbook and it comes at a lower cost.

Putting aside the reviews and my own personal opinion, what do actual customers who bought the Pixelbook Go think of it? Here’s how it fares from Best Buy reviewers for the $649 model:

Read full article at From AboutChromeBooks

JAWS Kiosk Software ADA Accessibility

New JAWS Kiosk software released from Vispero and Paciello Group. Enables ADA and Accessibility on Windows-based workstation and are a great tool for corporate networks looking to provide accessibility options for their employees.

JAWS Kiosk by Vispero

JAWS kiosk Vispero ADA LogoVispero®, the world’s leading assistive technology provider for the visually impaired, is excited to announce an addition to the Vispero family: JAWS Kiosk. A collaboration between The Paciello Group (TPG) and the Freedom Scientific brand (owned by Vispero), JAWS Kiosk is focused on delivering accessible kiosk solutions whether it’s through the incorporation of Freedom Scientific’s industry-leading screen reading software, JAWS®, or by utilizing TPG’s accessible design and technical implementation services. Beginning with the June 2019 release of JAWS, JAWS software will revolutionize self-service kiosk accessibility.


Use Cases

  • Self-Checkout
  • Waiver Signing
  • Point of Sale
  • Hotel Check-In
  • Endless Aisle Shopping
  • Tech Support Help Desk
  • Virtual Receptionist
  • HR Employee Paperwork/Forms
  • Meeting Room Management
  • Job Application Center
  • Self-Service Bill Pay
  • Voting Kiosks
  • Smart City Applications
  • ..and many more!

Kiosk Accessibility Consulting Services

TPG Consulting Services that can be applied to kiosk projects:

  • Accessibility Design Review
  • Usability Testing
  • User Research
  • JAWS Implementation and JAWS Scripting
  • Integration with Storm Assistive Technology Products
  • VPATs
  • JAWS Scripting
  • Closed Environment & Onsite Testing
  • Kiosk Accessibility Retrofit

TPG’s services include customizing pronunciation, instructions, and the user experience to support the kiosk application and input devices for users who are blind or have low vision.

JAWS Kiosk

JAWS screen reader software offers features that work specifically with Storm Assistive Technology Products and other alternative input solutions such as touch screens, keyboards, etc.

New kiosk-specific features of JAWS include:

  • Thinner version of JAWS for closed environments
  • Locked down features for use in closed environments
  • Support for Storm Assistive Technology Products (NavPad™, NavBar™ and AudioNav™)
  • Multi-language/Multi-voice JAWS support
  • User session management
  • Auto start JAWS upon insertion of audio device
  • Auto stop/session end automatic upon withdraw of audio input
  • Compatible with kiosk system software
  • Fully customizable through JAWS scripting
  • Does not require an internet connection for full functionality

Additional resources on kiosk accessibility

If accessibility is not a consideration in your kiosk deployment from the start, there are a wide range of options for making kiosks more accessible post-deployment.

Speak with someone from TPG to learn about your options.

HP ZCentral Thin Client Computing – Office of the Future

Thin Client Computing Next Generation ZCentral

New accelerated speeds with reduced latency and high security for remote workplace.  Empowering remote locations is very important in todays environment of increased competition for specialized talent. And reduced IT budgets.

Zcentral HP Thin Cleitn

LAS VEGAS, Nov. 18, 2019 — Today at Autodesk University, HP Inc. announced HP ZCentral, a solution powering the next-gen of computing with the world’s first single sourced remote workstation solution. ZCentral centralizes high-end computer power in a single location, liberating power-users who work on graphics-intensive applications, and enabling remote, mobile and fluid workstyles. ZCentral combines Z by HP racked high performance workstations, a new generation ZCentral Remote Boost software – formerly known as Remote Graphics Software (RGS) – and new proprietary ZCentral Connect software to accelerate high compute workflows to the next level.

“As the office of the future continues to evolve, HP is equipping today’s mobile workforce with the world’s only single-source remote workstation solution, accelerating high-performance, complex workflows from any location,” said Jim Nottingham, general manager and global head of workstations, HP Inc. “HP ZCentral is reinventing the way businesses meet the demands of today’s global workforce with flexibility by accelerating IT deployment and management, reducing costs, and providing world-class data security.”

ZCentral equips IT departments with predictable and dedicated remote performance, independent of the end point device, and a simple way to manage those connections with ultimate data security. The financial impacts of a data breach can be significant to a company with the average cost of $3.6 million in 2018. ZCentral can reduce the challenges and costs associated with managing various platforms and devices while offering secure remote access to users. ZCentral offers 16%-33% higher performance, at 59%-72% of the cost of today’s virtualized workstations 2 . With ZCentral, IT managers can manage, monitor, and assign dedicated remote workstation performance on a secure private network with one console.

HP will deliver the full end-to-end ZCentral solutions to partners across various industries, including AEC, Data Science, Media and Entertainment, and Oil and Gas, among others. The updated ZCentral Remote Boost and new ZCentral Connect software will be available in early 2020, with beta versions available for current customers.

Fluid IT Transforms Workflows for Power Users

In today’s remote office environments, creators, animators, researchers and product developers, among other professionals, are working in various locations more frequently to increase collaboration, creativity, productivity and efficiency. However, power users accessing large files for these complex workflows, while syncing over the network, is costly and time-intensive. HP is innovating in two key areas to deliver enterprise-ready remote computing solutions in the right way: predictable and dedicated remote workstation performance independent of the OS (MacOS, Windows, Linux) and the shift to ultra-flexible IT.

ZCentral delivers dedicated performance via a secure and stable remote workstation connection, with the new ZCentral Remote Boost software delivering high-performance on VFX, simulation and 3D, bringing a new way to manage those connections collectively. ZCentral Remote Boost works with Windows, Linux or MacOS devices, providing flexibility for the end-user to create or design on almost any end-point device, anywhere.

The ZCentral Connect software enables company IT departments to easily assign workstations, monitor connections and logins all through one simple interface. ZCentral Connect also makes is simple and easy for power users to connect to dedicated, centralized compute or access the next available workstation within an assigned pool of centralized workstations. By keeping the workstation secure and centralized next to the data storage, with the ZCentral Connect and ZCentral Remote Boost connection, only encrypted pixels are sent over the network, so company data remains highly secure at the source.

With the world’s most secure workstations, packed with professional graphics highly tuned to deliver ultimate performance with complex, multi-application workflows, ZCentral is innovating how compute power is managed. ZCentral delivers:

• Efficiency gains with fast load times for large projects in remote locations (co-located data and compute for security and faster load times), protecting company data on the world’s most secure workstations – racked Z by HP workstations.
• IT departments can share a pool of workstations to each user in a new flexible way by managing connections remotely on one simple interface with ZCentral Connect Software Power users can tap into Z Workstation performance and work as if they are local even with a thin and light device via ZCentral Remote Boost Software

IT departments can equip workforces with a variety of end-point devices from Thin Clients to Notebooks and Convertibles and regardless of the device, power users can upgrade to dedicated workstation performance for the ISV applications they use, when they need them.

ZCentral Availability

• Z by HP Desktop workstations with rack mounting are available today.
• HP ZCentral Remote Boost software will be available in early 2020, pricing to be announced at a later date and the beta for current customers is available now. For more information or to contact HP, please visit hp.com/ZCentral.
• HP ZCentral Connect software will be available in early 2020, pricing to be announced at a later date and the beta for current customers is available now. For more information or to contact HP, please visit hp.com/ZCentral.
• HP RGS is available today, visit hp.com/ZCentralRemoteBoost for more information.

HP ZCentral Announcement_11.16.19

Bonus Coverage HP Rack Whitepaper

Whether it is an IT technician servicing a single rack, or a team of professionals managing multiple data centers–with HP Rack Mounting Solutions, everyday tasks are made easy. HP Rack Mounting kits are engineered with the same customer-centric design philosophies that have made the Z Workstation product line a continuing success. To maximize rack density, HP engineers have designed a low-profile fixed-rail solution that can be customized on-the-spot to fit the HP Z2 Mini G4, HP Z2 Tower G4, HP Z4 G4 or HP Z6 G4 Workstations. The system-tray features captive fasteners, allowing for quick and easy tool-free access to the Workstation. For the HP Z8 G4 Workstation, HP continues to offer an enterprise-class rail solution that fully extends–allowing for in-rack configuration of the Workstation. Gaining access to the interior components of a rack-mounted HP Z8 G4 Workstation is a tool-free operation.

HP-Rack Mounting and the HP Workstation Whitepaper