See BusinessWire for KMA release — the COVID19 situation has advanced to where the KMA has found it necessary and useful to have separate product listings for software and hardware solutions in the COVID space. This includes the ultimate thin clients which enable touchless operation of computer stations. The mobile becomes the remote control proxy.
Excerpt:
WESTMINSTER, Colo.–(BUSINESS WIRE)–The Kiosk Manufacturer Association announces specific product listings for coronavirus-related self-service assistance. Tailored specifically for coronavirus product offerings are the following:
Temperature kiosks for screening and fever detection. Over 20 solutions to choose from and they range from less than a $1000 to more than $25K depending on regulatory approval and accuracy.
Kiosk Software such as Protection As A Service, non-touch touchless software and more.
Touchless Solutions – range from modified IR, foot pedal, gesture, voice-nav and more.
Free and Discounted Covid-related hardware and software solutions. Includes portable digital signage, hand sanitizer kiosks, Sani-holders for sanitizer (designed and used by Panera e.g.).
Cashless – Cash-2-Card self-service kiosks create a frictionless interaction between customer and cashier.
From Craig Keefner, manager of the Kiosk Manufacturer Association, ”Now is the time to provide maximum confidence and access to customers AND employees. Without customers, all the financial subsidies are only a temporary solution, and not a very profitable one. Customers and employees deserve the confidence to return to stores and workplaces. Testing and screening is key to that objective. We can include students, teachers and military personnel for that matter.”
There are many webinars on self-service our members hold. Zebra is holding a series of webinars on Innovating In A Time of Change.
From Storage Review Jul 2020 and Tom Fenton — In this article, we will give an in-depth overview of the t640 VDI client’s specifications, design and build quality, and a summary of the testing that we carried out on it. We will then lay out the key findings from those tests and provide our thoughts about the device and briefly discuss who would benefit from using this product.
HP t640 Thin Client Specifications
Below are the specifications of the t640 VDI Client we used in this review. Other configurations of the t640 are available.
Model: HP t640
Part Num: M5R76AA
MSRP: $561 USD – Street price $651 USD
Client type: Desktop thin client
Form factor: Small desktop
OS: Windows 10 IoT LTSC 2019 (HP ThinPro optional)
Supported remote display protocols: Microsoft RDP; HP RGS; VMware Horizon RDP/PCoIP, Blast Extreme; Citrix ICA/HDX (not all OS support all protocols), TTWin, TTerm and others
CPU: AMD Ryzen R1505G with Radeon Vega 3 Graphics
Memory: Hynix 8 GB DDR4L-2400 SODIMM (2 x 4 GB)
Storage: Phison 128 GB Flash memory
Speaker: Internal amplified speaker system for basic audio playback.
Display: Three displays at up to UHD/4K (3840 x 2160 @ 60 Hz) resolution
Power: 19.5V, 4.62A external power adapter
Ports:
1 x USB Type-C 3.1 Gen 2
3 x USB-A 3.1 Gen 1
1 x USB-A 3.1 Gen 2
2 x USB-A 2.0
1 x RJ45
6 x full size DisplayPort 1.2
1 x 3.5 mm headphone/microphone Combo
1 x AC power
Network connectivity:
RJ45 – Realtek RTL8111HSH Gigabit Ethernet (GbE) Controller with support for DASH out-of-band remote management
Intel Wireless-AC 9260 Wi-Fi/Bluetooth combo; 2×2 802.11ac Wi-Fi and Bluetooth
Bluetooth 5
Physical size: 3.5 x 19.6 x 19.6 mm
Physical weight: 1 Kg
Color: black
Keyboard: HP USB Slim Business Keyboard with built-in smart card reader (TPC-S001K)
Mouse: HP USB Optical Mouse (MOFYUO)
Compliant standards: UL, CSA, FCC, Energy Star, EPEAT 2019, and many others
Package Contents: t640, Power Adapter, HP mouse and keyboard, base stand, warranty and setup guide
From VirtualDesktop Jul2020 — IT has the responsibility to provide virtual desktop endpoints that maximize UX based on the use cases, so admins should learn the different sides of the thin client vs. PC debate.
End-user requirements for thin clients vs. PC endpoints
Even the best ticket system will result in some delays for users, and these problems can get even worse for remote workers. Remote employees don’t have the same access to in-person IT support. Therefore, organizations should put an emphasis on ease of use for the user when they choose an endpoint.
Corporate devices provide more ease of use than personal devices because they are pre-configured for work purposes and centrally maintained — there is nothing the users need to install and nothing for them to maintain. Thin client devices get some bonus points regarding ease of use because if there’s a problem that a reboot won’t fix, IT can ship a new unit overnight. With a PC, it’s not so easy.
Security is a major concern for any virtual desktop deployment, and this is especially the case when users access corporate resources from personal devices such as PCs. If IT does not apply the appropriate protections against malware to the personal device, the end user device is vulnerable to file transfers, keyloggers and other security threats. IT professionals must lock down the virtual desktop endpoints, and they can accomplish this by disallowing or scanning file transfers, for example.
The world of telemedicine and telehealth is expanding and much of the base infrastructure, on both sides of the aisle, is thin client computing. Especially given the HIPAA regulations the handling of patient data is extremely important. Generally most telemedicine telehealth client stations are “cloud clients”.
Here are some from today for reference
Program Name
Organization Level 1
Organization Level 2
Status
Telehealth Platform and Platform Software Support Service
From the Verge July 2020 — Microsoft and Citrix have been working together closely for decades, but that partnership is going a step further today. Microsoft is partnering with Citrix to use the company’s Citrix Workspace portal as its “preferred digital workspace solution,” and Citrix is using Microsoft Azure as its preferred cloud platform.
Microsoft and Citrix have been working together closely for decades, but that partnership is going a step further today. Microsoft is partnering with Citrix to use the company’s Citrix Workspace portal as its “preferred digital workspace solution,” and Citrix is using Microsoft Azure as its preferred cloud platform. It’s a deal designed to speed up Citrix customers to move to the cloud and virtual desktops.
Microsoft has been investing heavily in Windows Virtual Desktops recently, ever since the pandemic forced many businesses to shift to working from home. Windows Virtual Desktop usage has grown more than three times in recent months, and Microsoft CEO Satya Nadella has prioritized work on both Microsoft Teams and Windows Virtual Desktops recently. Microsoft is even working on improving Windows app development for running apps in the cloud.
The multi-year agreement builds upon and expands one of the industry’s longest strategic partnerships. Under the terms of the deal, Microsoft will select Citrix® Workspace as a preferred digital workspace solution, and Citrix will select Microsoft Azure as a preferred cloud platform, moving existing on-premises Citrix customers to Microsoft Azure to enable people to work anywhere across devices.
Citrix and Microsoft will provide joint tools and services to simplify and speed the transition of on-premises Citrix customers to Microsoft Azure. The companies will also devise a connected roadmap to enable a consistent and optimal flexible work experience that will include joint offerings comprised of Citrix Workspace, Citrix SD-WAN, Microsoft Azure and Microsoft 365 sold through their direct sales forces via the Azure Marketplace and a robust community of channel partners. Microsoft will lead sales with Citrix Cloud to move existing on-premises Citrix customers to Azure.
Both Citrix and Microsoft will maintain their long-standing policies of supporting choice for those customers who request alternatives to meet their business requirements.
Since 1999, Thinclient.org has been reporting the thin client computing market as well as the ChromeBook, Zero Client, Android clients, Pi Raspberry Clients and Thick Client market. Generally the cloud computing market since it started with companies such as Citrix back in the late 80s.
A thin client is a lightweight[vague]computer that has been optimized for establishing a remote connection with a server-based computing environment. The server does most of the work, which can include launching software programs, performing calculations, and storing data. This contrasts with a fat client or a conventional personal computer; the former is also intended for working in a client–server model but has significant local processing power, while the latter aims to perform its function mostly locally.
Thin client hardware generally supports a keyboard, mouse, monitor, jacks for sound peripherals, and open ports for USB devices (e.g., printer, flash drive, webcam). Some thin clients include legacy serial or parallel ports to support older devices such as receipt printers, scales or time clocks. Thin client software typically consists of a graphical user interface (GUI), cloud access agents (e.g., RDP, ICA, PCoIP), a local web browser, terminal emulators (in some cases), and a basic set of local utilities.
New hardware interfaces includes socket-based enabled devices eliminating the need for a physical USB connection. Bluetooth wireless connectivity is also a big factor for devices.
July Thin Client RFPs and Contracts we’ve seen and looked at:
Here is overall status today for pre RFP. 57 opps for 27M
Click for full size
From one service –
Here is is another. This is Forecast Pre-RFP. There are 57 opps worth 27M
Here is a look at Active Contracts:
458 found
total spending 1B
Average spending 7M
If we filter than down to those contracts expiring in the next 12 months:
87 contracts
104M
Average 13M
MTA in NY is big one for Wyse
Since 1999, Thinclient.org has been reporting the thin client computing market as well as the ChromeBook, Zero Client, Android clients, Pi Raspberry Clients and Thick Client market. Generally the cloud computing market since it started with companies such as Citrix back in the late 80s.
A thin client is a lightweight[vague]computer that has been optimized for establishing a remote connection with a server-based computing environment. The server does most of the work, which can include launching software programs, performing calculations, and storing data. This contrasts with a fat client or a conventional personal computer; the former is also intended for working in a client–server model but has significant local processing power, while the latter aims to perform its function mostly locally.
Thin client hardware generally supports a keyboard, mouse, monitor, jacks for sound peripherals, and open ports for USB devices (e.g., printer, flash drive, webcam). Some thin clients include legacy serial or parallel ports to support older devices such as receipt printers, scales or time clocks. Thin client software typically consists of a graphical user interface (GUI), cloud access agents (e.g., RDP, ICA, PCoIP), a local web browser, terminal emulators (in some cases), and a basic set of local utilities.
New hardware interfaces includes socket-based enabled devices eliminating the need for a physical USB connection. Bluetooth wireless connectivity is also a big factor for devices.
Wyse ThinOS 9.0 is the most secure thin client operating system with Citrix Workspace app and with enhanced management capabilities from WMS 2.0
One tool does it all. Wyse Management Suite is a flexible cloud management solution that allows to centrally configure, monitor, manage and optimize Wyse thin clients, zero clients and software thin clients (with Wyse Converter for PCs), anytime, anywhere. Wyse Management Suite is ideal for businesses small, large and in-between. With multiple version offerings our solution meets all levels of deployment.
From zero to productivity instantly with Wyse Management Suite Pro on Public Cloud2
. Manage from anywhere and view critical alerts, notifications on the dashboard and send real time commands with one tap with the mobile app for real-time endpoint modern management of all Wyse endpoints and software. In addition, the management console is localized in 7 different languages making it convenient for our international teams to deploy it in
their regional languages Manage all your Wyse cloud clients from the cloud and/or the datacenter with this hybrid cloud management solution with floating license allocation for greater control and agility. The cloud-first, multitenant model supports your growing business requirements. Automated processes and intelligent insights with powerful dynamic device-grouping and rules-based automation deliver a flexible and proactive management approach.
Future proof your business with support for high availability. Work confidently with Active Directory authentication for role-based administration, advanced security through two-factor authentication, HTTPS-based imaging and compliance policy alerts.
Wyse Management Suite Pro comes with Dell ProSupport5 for Software – a 24×7 comprehensive support for software delivered by highly qualified Dell EMC experts as a single point of contact.
JPMC – RENEWAL NOTICE HP Thin Client Terminals and Accessories
Type
Bid
Entity
DoIT – Department of Innovation and Technology
Expires
Jul 14, 2020
Status
Open
Region
Illinois
Reference #
21-448DOIT-TELEC-B-16037
Issued
Jun 28, 2020
More Details
Description
Bulletin Desc: RENEWAL NOTICE – THIS IS NOT A BID SOLICITATION JPMC – The Illinois Department of Innovation and Technology desires to renew a Joint Purchase Master Contract with HP Inc. For HP Thin Client Terminals, Accessories and Support Services. The Joint Purchase Master Contract can be utilized by all governmental agencies and qualified not-for-profit agencies.
10ZiG® Technology Established as Microsoft Windows Virtual Desktop Integrated Partner Provider
PHOENIX, ARIZONA – Microsoft Windows Virtual Desktop, a comprehensive desktop and app virtualization service running in the cloud, is now partnering with 10ZiG Technology Thin & Zero Clients. Microsoft Windows Virtual Desktop provides the only multi-session Windows 10 experience for desktop virtualization, making it a complementary fit with 10ZiG Thin & Zero Client hardware endpoints and The 10ZiG Manager™ for a seamless desktop experience in the cloud.
A longstanding partner with Microsoft around Microsoft Azure and Windows Virtual Desktop, 10ZiG Windows 10 IoT-based Thin Clients continue to be powerful, reliable, and affordable endpoints for all Windows Virtual Desktop multi-users. The 10ZiG Manager Centralized Software provides exceptional management and deployment without license limitations at no additional cost. The powerful combination of Windows Virtual Desktop and 10ZiG creates a seamless multi-user platform for cloud-based, virtual desktop environments.
Kevin Greenway, 10ZiG Technology CTO, “Windows Virtual Desktop really enhances the virtual desktop experience. If you’re in the cloud, why wouldn’t you want to manage your virtual desktop machines easily and efficiently, with automated update and deployment features, and more? Along with the right endpoints and centralized software management, 10ZiG and Windows Virtual Desktop can make a powerful combination for the best possible, Windows 10 multi-session desktops, virtualized in the cloud.”
10ZiG’s world-market leadership in Thin & Zero Client endpoint devices and management software for virtual desktops is exemplified by how they work for their customers. Thin Client hardware comes with thoughtfully constructed benefit features and options designed to ensure customers receive the right devices based on their needs. Endpoints are customized to fit into customer environments with Windows-based and Linux-based Clients to provide the best possible performance in virtual desktops, both inside and outside Cloud.
About 10ZiG® Technology
10ZiG Technology is a world-market leader in Thin Client & Zero Client endpoint devices for Virtual Desktop Infrastructure. 10ZiG provides leading Intel and AMD based Dual and Quad Core Thin Clients and Zero Clients for VMware, Citrix, Microsoft, etc., environments, and the widest range of Teradici PCoIP Zero Clients on the market. 10ZiG offers free, no-obligation demo devices, best-in-industry Technical Support teams based in the U.S. and Europe, and provides at no cost, the Cloud-enabled “10ZiG Manager” Console with unlimited user licenses.
#UKCUG is alive and kicking!! As well as offering FREE #Citrix Thin & Zero Client demo devices, we’re also giving away a pair of Sennheiser Wireless Headphones! You can win them here – https://lnkd.in/dcdVmkh
Since 1999, Thinclient.org has been reporting the thin client computing market as well as the ChromeBook, Zero Client, Android clients, Pi Raspberry Clients and Thick Client market. Generally the cloud computing market since it started with companies such as Citrix back in the late 80s.
A thin client is a lightweight[vague]computer that has been optimized for establishing a remote connection with a server-based computing environment. The server does most of the work, which can include launching software programs, performing calculations, and storing data. This contrasts with a fat client or a conventional personal computer; the former is also intended for working in a client–server model but has significant local processing power, while the latter aims to perform its function mostly locally.
It may not be Google’s OS but Chrome OS is truly shaping up to be the one OS to rule them all. It can already run software from Android and Linux in addition to its own native web-based Chrome apps and soon it will add what may be the most important set of apps for users. Full Windows applications are coming to some Chromebooks but those will be running via a third-party solution and only to a very select few Chrome OS users.
That solution is Parallels’ virtualization software that has, for years, allowed Windows applications to run on Macs. Unlike the open source WINE software, virtualization pretty much creates a layer, a virtual Windows computer so to speak, between the Windows application and the underlying real operating system. It guarantees better compatibility with foreign apps, in this case, Windows apps, but at the cost of some performance.
Full article on The Verge June 2020 – Fast charging and a 10th Gen Core i5 — HP makes the nicest Chromebooks (along with Asus and others).
HP has announced its Chromebook x360 14c, which it says is its most premium Chrome OS product yet. It starts at $499 and will be available in June.
The 3.5-pound convertible device has a 14-inch touchscreen with an 88 percent screen-to-body ratio —the largest ever for an HP-made consumer Chromebook. Take a peek at the photos below — it looks nice.
Still, the 11a has some steep competition in this price range, including the excellent $219 Samsung Chromebook 3, Acer’s $229 Chromebook 15, and Lenovo’s $279 Chromebook Duet. Keep an eye out for reviews to see how it compares.
Both Chromebooks are coming in June to HP and Best Buy.
Temperature checks on employees and visitors is becoming commonplace for many businesses, hospitals, grocery stores, retailers and a host of others. Temperature sensing kiosks can help stem a crisis and optimize a return to business as employees and guests return to work and entertainment venues.
The Temperature Sensing Kiosk provides a number of benefits to allow businesses to protect their most valued assets–their employees.
Reduce risk of access by infected persons*
Maintain a safe work/business environment
More hygienic than thermometers that require physical contact
Safer and more efficient than using a human resource to screen temperatures
Reduce stress and anxiety for employees and guests.
Prevention is the Key
There are many activities happening simultaneously to ensure a safe work environment. The Temperature Sensing Kiosk reduces the risk of infection to your employees and costly and time-consuming contamination clean-up efforts. Give employees and visitors the confidence to know you’re doing all you can do to protect them.
How It Works
The Temperature Sensing Kiosk is equipped with an infrared temperature sensor/detector and the system provides an alert if an individual is running a fever. The system uses an algorithm for fast detection temperature accuracy.
Protect Your Investment
Your people are your most valuable investment. To help stem the crisis and optimize a return to business, hospitals, grocery stores, and retailers and a host of other companies will look to temperature screening as employees report to work and venues open up again. This first layer of screening can curb the spread of virus as well as prevent costly and time-consuming contamination clean-up. This solution is equipped with an infrared temperature sensor/detector and the system provides an alert if an individual is running a fever.
Stop infection at the door
Maintain a safe work/business environment
More hygienic than thermometers that require physical contact
Safer and more efficient than using a human resource to screen temperatures
Avoid costly contamination clean-up
Reduce stress and anxiety for employees and guests
Specifications:
Uses an algorithm for object heat and fast detection temperature accuracy • +/- 0.5 degrees Celsius
Telemedicine Kiosks Come To Canada’s largest Western-based grocery and pharmacy retailer with over 170 stores
| Source: CloudMD Software & Services Inc.
VANCOUVER, British Columbia, May 04, 2020 (GLOBE NEWSWIRE) — CloudMD Software & Services Inc. (CSE: DOC, OTCQB: DOCRF, Frankfurt: 6PH) (the “Company” or “CloudMD”), a telemedicine company revolutionizing the delivery of healthcare to patients, is excited to announce that it has entered into a non-binding Letter of Intent (“LOI”) with Save-On-Foods and separately with Pure Integrative Pharmacy to pilot telemedicine kiosks in nine stores throughout British Columbia.
For 6 weeks starting on May 26, 2020, CloudMD’s telemedicine software and services will be offered free of charge to Save-On-Foods and Pure Integrative Pharmacy clients. Telemedicine kiosks will be installed in existing private consult rooms in participating Save-On-Foods and Pure Integrative Pharmacy locations across BC. Patients will be able to see a doctor for prescription refills and non-emergency health concerns in real time on-site, and after the virtual visit, the prescription can be submitted directly to the same pharmacy for fulfillment. The delivery of these services will be billed under provincial medical plans.
Save-On-Foods is Canada’s largest Western-based grocery chain with over 170 stores across BC, Alberta, Saskatchewan, Manitoba and in Whitehorse, Yukon. Pure Integrative Pharmacy is one of BC’s leading independent community pharmacies and has been servicing patients with 16 locations across BC since 2008.
In addition to the corporate arrangement, CloudMD and Save-On-Foods are joining forces to help provide home based telemedicine and delivery services (where available) of medications to at risk patients who cannot, or should not, leave self-isolation. BC patients unable to travel out of their homes can advise their CloudMD doctor they require home delivery of their medication and Save-On-Food’s pharmacies will take care of fulfillment and delivery.
Dr. Essam Hamza, CEO of CloudMD commented, “One of our key growth drivers is our kiosk implementation program, and we are excited to work with Save-On-Foods and Pure Integrative Pharmacy on the first major step of the roll out. CloudMD, Save-On-Foods, and Pure Integrative Pharmacy share a community centric vision and are all aligned in maintaining customer focused businesses.” He continued, “Our priority is providing patients with innovative, accessible healthcare when and where they need it and in doing so, integrating the pharmacist into their team-based care. The initial paid pilot program is the first phase of our kiosk implementation and will hopefully lead to long term, mutually beneficial relationship with Save-On-Foods and Pure Integrative Pharmacy.”
About Save-On-Foods
Save-On-Foods is committed to Going the Extra Mile for customers in every community served, every day. Known for its unique approach in customizing each store to best suit the needs of the neighbourhood by carrying more than 2,500 locally-made products from more than 2,000 local growers and producers, the company has been innovating and putting customers first for over 105 years. Save-On-Foods, its supplier partners, team members and generous customers have donated more than $30 million to children’s hospitals and contribute $3 million in donations to food banks across Western Canada each year.
About Pure Integrative Pharmacy
Pure Integrative Pharmacy is one of BC’s leading independent community pharmacies by integrating the conventional pharmacy model with evidence-based complementary medicines and cutting-edge products and services to improve the health and well-being of patients. Pure Pharmacies offer integrity and a personalized pharmacy experience where they listen to, inspire, and empower their clients to take control of their health and enjoy greater vitality, safely and sustainably. Their vision is to bridge the gap between conventional and complementary medicine and become an integrative and accessible hub of health for patients.
About CloudMD Software & Services
CloudMD is digitizing the delivery of healthcare by providing patients access to all points of their care from their phone, tablet or desktop computer. The Company offers SAAS based health technology solutions to medical clinics across Canada and has developed proprietary technology that delivers quality healthcare through the combination of connected primary care clinics, telemedicine, and artificial intelligence (AI). CloudMD currently provides service to a combined ecosystem of 376 clinics, over 3000 licensed practitioners and almost 3 million patient charts across its servers.
From VentureBeat May 2020 HP today unveiled three new Chromebooks and other mobile solutions for enterprise workers in lockdown. The launch demonstrates how quickly big companies are moving to target mobile products at people working from home during the coronavirus pandemic. Chromebooks, based on Google’s Chrome operatin…
HP today unveiled three new Chromebooks and other mobile solutions for enterprise workers in lockdown. The launch demonstrates how quickly big companies are moving to target mobile products at people working from home during the coronavirus pandemic.
Chromebooks, based on Google’s Chrome operating system, are designed to make people more productive online while keeping costs low. Many businesses have been adopting cloud-centric solutions and virtual desktop infrastructure (VDI) to increase security and save costs, but the recent pandemic has cast a spotlight on those who primarily work with web applications and virtual desktop tools.
Two fairly cool ideas from KioWare on let users use their mobile as the touchscreen proxy controller. And then for the workstation that presumably has been cleaned, users can see how long ago it was actually cleaned. Cool ideas.
Ed Note: Using the kiosk as the “fulcrum” or proxy is not a new idea but it is coming of age with the current situation. These new functions allow users to use their mobile phones as the proxy touchscreen. Statistically their mobile phone is a hotbed for bacteria but this method isolates users from contaminating the usually very clean touchscreen. People without mobile phones have cleaner fingers. Kind of an odd situation of juxtaposable factors.
As an added feature KioWare announced their new Maintenance feature which displays “Last Cleaned” date to users to add extra level of confidence. This allows users to alert store personnel if a maintenance cycle has been missed. A new characteristic of an interactive kiosk.
Establishments will have to increase maintenance cycles and no longer will it be the redheaded stepchild so to speak.
What is KioTouch?
KioTouch is a clean innovation in the kiosk industry that will help in preventing the spread of potentially contagious and harmful microbes by giving the end-user full access to the kiosk’s interface via their personal mobile device.
Across grocery and retail stores, and quick-service restaurants it is reported that of the total bacteria in these facilities 63-percent have potentially harmful consequences to humans.
How KioTouch Works
KioTouch allows the end-user of a shared device to interface without physically touching the device itself. This is accomplished by scanning a QR code via the end-user’s personal mobile device. and navigating to a landing page that gives the user full control of the kiosk while their user session is active, just as they would have had by directly interacting with the kiosk.
What is Maintenance Management?
Maintenance Management is a KioWare feature that assists in the janitorial maintenance schedule of a self-service kiosk. This is critical in preventing bacteria spread from user-to-user.
How Maintenance Management Works
Maintenance Management works on two sets of parameters that can be defined individually for each kiosk: total time between cleanings and total number of user sessions between cleanings. If either of these thresholds are passed, then the status of the kiosk changes and staff notifications occur. After cleaning, the technician resets the time and user session counter, and the cycle starts again. The KioWare toolbar has a special icon that can be displayed with the time since the last cleaning. The time will increment every 36 seconds, so the that the kiosk user can see it is working.
What Maintenance Management Looks Like
The screenshot shown here depicts KioPay with Maintenance Management enabled. In the upper-left hand corner of the screen is the Maintenance Management logo with a fractional timer that indicates the last time since the kiosk device was cleaned. After tapping on this icon a maintenance employee can reset the timer after cleaning by inputting a unique code.
Lots of news around temperature check kiosks these days. These are typically small android devices equipped with camera and thermal sensor. The sensors come from variety of places (Germany for example has one). Example temperature check sensor is Heinmann ISO 9001-2015 certificate1Heimann Sensor
Typically stand at a distance anywhere from 10 to 40 inches and get a positive or negative reading.
Androids, as well as Raspberry PI, are being used so these devices are relatively inexpensive.
Many people from many industry segments have talked about them from Indian Gaming to Disney Theme Parks.
Here are some excerpts
From Casino.org — The Chumash Casino Resort, owned and operated by the Santa Ynez Band of Chumash Mission Indians, has been closed since mid-March by the coronavirus. Last week, the tribal casino announced it will remain closed through the end of May.
When the casino reopens, the facility will be equipped with temperature-taking kiosks. Chumash Casino CEO John Elliott didn’t specify as to the number of kiosks being purchased, but explained people will approach the machine, stand approximately 10 inches away, and the device will reveal their body temperature within three to seven seconds.
The kiosks are FDA-cleared and are as accurate as a manual temperature reading,” said tribal chairman Kenneth Kahn. Each machine can scan one individual at a time.
People who receive a temperature reading of 100.4 degrees Fahrenheit or higher will be denied entry. “Access will be denied to employees or guests who exceed the temperature threshold recommended by the CDC or Public Health,” Kahn added.
Temperature checks on employees and visitors are becoming commonplace for many businesses, hospitals, grocery stores, retailers and a host of others. Temperature sensing kiosks can help stem a crisis and optimize a return to business as employees and guests return to work and entertainment venues.
The Temperature Sensing Kiosk provides a number of benefits to allow businesses to protect their most valued assets–their employees.
Reduce risk of access by infected persons*
Maintain a safe work/business environment
More hygienic than thermometers that require physical contact
Safer and more efficient than using a human resource to screen temperatures
Reduce stress and anxiety for employees and guests.
Prevention is the Key
There are many activities happening simultaneously to ensure a safe work environment. The Temperature Sensing Kiosk reduces the risk of infection to your employees and costly and time-consuming contamination clean-up efforts. Give employees and visitors the confidence to know you’re doing all you can do to protect them.
How It Works
The Temperature Sensing Kiosk is equipped with an infrared temperature sensor/detector and the system provides an alert if an individual is running a fever. The system uses an algorithm for fast detection temperature accuracy.
Protect Your Investment
Your people are your most valuable investment. To help stem the crisis and optimize a return to business, hospitals, grocery stores, and retailers and a host of other companies will look to temperature screening as employees report to work and venues open up again. This first layer of screening can curb the spread of virus as well as prevent costly and time-consuming contamination clean-up. This solution is equipped with an infrared temperature sensor/detector and the system provides an alert if an individual is running a fever.
Stop infection at the door
Maintain a safe work/business environment
More hygienic than thermometers that require physical contact
Safer and more efficient than using a human resource to screen temperatures
Avoid costly contamination clean-up
Reduce stress and anxiety for employees and guests
Specifications:
Uses an algorithm for object heat and fast detection temperature accuracy • +/- 0.5 degrees Celsius
Wyse ThinOS 9.0 is the most secure thin client operating system with Citrix Workspace app and with enhanced management capabilities from WMS 2.0 Learn More: https://bit.ly/2IP5hY3
With Wyse thin clients, data and applications are stored in a secure datacenter to ensure security and confidentiality. Our thin clients are hardened, virus and malware resistant and support role-based information delivery, this helps enable employees to work any time, any place.
Whether it’s updates, patches or any other day to day operational task, Wyse Management Suite makes it easier to manage Wyse end points from the cloud and/or the datacenter and be more responsive to business requirements.
Ready to work in any VDI environment, Wyse thin clients are designed to make it easier for people to stay productive with support for multiple 4K monitors, native enablement for unified communications and rich connectivity.
Thin Client – Convert Home PC or Laptop to Secure Corporate Endpoint
VXL is helping organisations shift rapidly to homeworking, by offering a low-cost, 6-month licence for software which easily converts current desktops and laptops – including home PCs – into secure corporate endpoints.
VXL Software offers 6-month licences to help organisations pivot easily to homeworking
VXL is helping organisations shift rapidly to homeworking, by offering a low-cost, 6-month licence for software which easily converts current desktops and laptops – including home PCs – into secure corporate endpoints.
The rapid and unexpected shift to homeworking has been a challenge for many organisations. Although employees can work from home, often it’s by using unmanaged home computers – creating all kinds of security issues.
VXL Software has announced that it can help organisations, via a new 6-month licence which enables organisations to adapt rapidly, helping them to get through this unprecedented upheaval.
Using one of VXL Software’s two homeworking solutions – one for virtualised Windows environments and one for virtualised Linux environments – organisations can instantly convert a home PC into a totally secure corporate endpoint. The user can access corporate data and applications, but that access is securely ringfenced.
Frank Noon, VP Worldwide Sales at VXL Software, says that, “Simplicity is key. Our Fusion SecureDesktop Windows solution runs as an application, while our CloudDesktop On the Go Linux solution boots from a USB drive. In either case, the host device is totally untouched – and for the duration of the session, people work as they would normally via a secure, managed connection. When they quit, they are returned to their home PC. There’s no data crossover.”
Recognising the need for organisations to adopt what may be a temporary change, VXL Software has created a special 6-month licence for just $15 USD per device. “It’s the full product,” says Noon, “and includes support. It’s designed to last for the duration of the lockdown, but it can be upgraded without price penalty should customers wish.
“It’s not an understatement to say that these are challenging times,” concludes Noon, “but technology does enable many organisations to keep going. Companies such as VXL Software are at the forefront of enabling a shift to a new way of working that, for many, will be the norm for quite a while.”
Like many organisations, VXL Software has shifted to homeworking. “We’re pleased to say that VXL Software is operating almost as normal,” concludes Noon. “We’re helping customers via telephone, video calls and e-mail. Likewise, product support is fully operational.”
Using a digital signage kiosk to take temperature has a lot of interest recently. It could be one strategy for re-opening business and assuring customers of safety.
Bob Iger, CEO of Walt Disney Co., is pondering what such a future would look like. Perhaps, he suggests, it would look like testing the temperatures of all of the guests before they enter the theme parks.
“One of the things that we’re discussing already is that in order to return to some semblance of normal, people will have to feel comfortable that they’re safe,” Iger said in an interview with Barron’s. “Some of that could come in the form, ultimately, of a vaccine, but in the absence of that, it could come from basically, more scrutiny, more restrictions. Just as we now do bag checks for everybody that goes into our parks, it could be that at some point we add a component that takes people’s temperatures, as a for-instance.”
Twitter reaction to the idea of testing all visitors before they are allowed inside the parks was swift and decidedly negative. Full article
Another industry looking to reassure is the airline travel industry.
“And when international aviation does start up again, there will be a need to protect and reassure passengers. Hand sanitizer will likely need to be available throughout the airport, including at boarding gates. “And there is evidence that temperature control at airports reassures passengers, even though it is only a partial solution,” says Powell. “Likewise, routinely wearing masks is contrary to WHO advice but passengers may prefer cabin crew to wear them initially.” See article on reassuring passengers from iata.org
Temperature Taking Kiosk Solutions
Here is one from 22Miles.
22Miles has an offering
Available in 22”
Digital Signage content distribution through 22MILES platform
Body Temperature testing on the screen
Can be used at store entrance, hospital, corporate lobby, etc
There are many activities happening simultaneously to ensure a safe work environment. The Temperature Sensing Kiosk reduces the risk of infection to your employees and costly and time-consuming contamination clean-up efforts. Give employees and visitors the confidence to know you’re doing all you can do to protect them.
The Temperature Scanning Kiosk provides a number of benefits to allow businesses to protect their most valued assets–their employees.
Stop infection at the door
Maintain a safe work/business environment
More hygienic than thermometers that require physical contact
Safer and more efficient than using a human resource to screen temperatures
Reduce stress and anxiety for employees and guests.
Our Temperature Scanning Kiosk allows for efficient and accurate self-scanning of guests, patients, and employees as they enter your facility. Please contact us if you are interested in learning more.
In April we launched the Smart City Design website which features RFPs, Contracts, News, Resources and more. It is the plan to provide more focus on markets such as Smart City, Digital Signage, POS aka Point-Of-Sale markets.
These are important markets for Thin Clients which typically like to think the primary market is corporate America via Dell or HP. Thin clients are being used all over. The corporate market focus almost acts as an inhibitor.
A Smart city is an urban area that uses different types of electronic Internet of Things (IoT) sensors to collect data and then use insights gained from that data to manage assets, resources and services efficiently. This includes data collected from citizens, devices, and assets that is processed and analyzed to monitor and manage traffic and transportation systems, power plants, utilities, water supply networks, waste management, crime detection,[1] information systems, schools, libraries, hospitals, and other community services.[2][3]
The Smart city concept integrates information and communication technology (ICT), and various physical devices connected to the IoT network to optimize the efficiency of city operations and services and connect to citizens.[4][5] Smart city technology allows city officials to interact directly with both community and city infrastructure and to monitor what is happening in the city and how the city is evolving. ICT is used to enhance quality, performance and interactivity of urban services, to reduce costs and resource consumption and to increase contact between citizens and government.[6] Smart city applications are developed to manage urban flows and allow for real-time responses.[7] A Smart city may therefore be more prepared to respond to challenges than one with a simple “transactional” relationship with its citizens.[8][9] Yet, the term itself remains unclear to its specifics and therefore, open to many interpretations.[10]
See below — If you are interested in receiving the actual data behind these line items then please send an email to [email protected] — We provide RFP services to many companies. Members and sponsors of the Kiosk Manufacturer Association receive a significant discount when adding their subscription. Ala carte subscriptions to just these RFPs are available however. If a spot analysis is desired that can also be subcontracted. #smartcity#smartcities#kiosks
Apr 2020
Smart City Implementation Roadmap for Anaheim, CA. The City of Anaheim seeks to retain the services of a highly qualified consulting vendor experienced in successfully managing and completing Smart City strategies and roadmaps.
Broadband Internet Services for Lakeland County Florida — SMART CITY APPLICATIONS, DIGITAL DIVIDE SOLUTIONS, POTENTIAL REVENUE SOURCE
#
Contracts
Orlando – Smart City Master Plan – expires 11/22
Fort Lauderdale – Smart City Media – Touchscreen Information Kiosks
Smart Digital Kiosks – Harrisburg, PA – Smart City Media
Sacramento Regional Transit District – 12/20
Dallas Texas – Smart City Networks
California – San Diego Convention Center Expansion
Healthcare kiosks are, now more than ever, a valuable tool for serving more patients without the need for up close staff interaction. They can be used for checking in patients and gathering symptom information for efficient triage purposes. They can also be used to measure patient blood pressure or heart rate, temperature, and other diagnostic information. Moreover, healthcare kiosks are also helpful for educating patients, collecting health insurance information, and scheduling future services.
Making a healthcare kiosk accessible not only improves patient care, but is required by the Americans with Disabilities Act (ADA). The ADA prohibits discrimination against individuals with disabilities regarding public accommodations and the court has defined public accommodation to include (in title III) service establishments including healthcare facilities.
Creating an accessible healthcare kiosk
Disabilities, according to the ADA, can be physical (motor skills), cognitive (intellectual), low to no vision, low to no hearing, and more. But before addressing software accessibility, the first step to creating an accessible healthcare kiosk should be to make the kiosk physically accessible. The ability to access the kiosk by users in a wheelchair is required by the ADA. It outlines specific compliance guidelines like the height of operable parts, the viewing angle, and the approach area for accessing the kiosk — which must also be accessible via a wheelchair. The approach area requires a clear path without stairs, uneven flooring, or objects to obstruct access.
Once physical accessibility has been established, turn your attention to another an equally important component: software. The kiosk application must also be accessible for use by someone who is blind or has low vision. The kiosk needs to have a screen reader, such as JAWS® for kiosk to turn text to speech. Some examples of accessible kiosks can be found in this video.
Touchscreens may be difficult for people with disabilities, so an external input/navigation device is also useful to allow users to engage with a kiosk without using a touchscreen. The kiosk application must be developed to ensure it can be easily navigated and understood when read through a screen reader. WCAG 2.1 AA standards are application and website guidelines for accessibility. Following those guidelines with a healthcare check-in app, for instance, will make it easier for a blind or low vision user to understand and navigate the kiosk app. Learn more about selecting the right input device for your accessible kiosk.
Some things to consider when planning your accessible healthcare kiosk
What application will you be using? Is it already accessible? If yes, can you improve usability for kiosk users?
Is the kiosk hardware ADA compliant for height and reach specifications?
Does the kiosk include an input device that has an audio jack? Oftentimes, there is no effect on audio jacks built in audio jacks when headphones are inserted. Using an input device that includes an audio jack will allow JAWS to turn off and on based on the presence of the headphones.
Are you providing all information in a way that is accessible to all users, including those who are deaf or hard of hearing, and those who are blind or who have low vision? That includes any PDFs that are being read on the screen, videos in need of captioning, and document signing for HIPAA compliance.
The Trump Administration today announced expanded Medicare telehealth coverage that will enable beneficiaries to receive a wider range of healthcare services from their doctors without having to travel to a healthcare facility. Beginning on March 6, 2020, Medicare—administered by the Centers for Medicare & Medicaid Services (CMS)—will temporarily pay clinicians to provide telehealth services for beneficiaries residing across the entire country.
“The Trump Administration is taking swift and bold action to give patients greater access to care through telehealth during the COVID-19 outbreak,” said Administrator Seema Verma. “These changes allow seniors to communicate with their doctors without having to travel to a healthcare facility so that they can limit risk of exposure and spread of this virus. Clinicians on the frontlines will now have greater flexibility to safely treat our beneficiaries.”
On March 13, 2020, President Trump announced an emergency declaration under the Stafford Act and the National Emergencies Act. Consistent with President Trump’s emergency declaration, CMS is expanding Medicare’s telehealth benefits under the 1135 waiver authority and the Coronavirus Preparedness and Response Supplemental Appropriations Act. This guidance and other recent actions by CMS provide regulatory flexibility to ensure that all Americans—particularly high-risk individuals—are aware of easy-to-use, accessible benefits that can help keep them healthy while helping to contain the spread of coronavirus disease 2019 (COVID-19).
Prior to this announcement, Medicare was only allowed to pay clinicians for telehealth services such as routine visits in certain circumstances. For example, the beneficiary receiving the services must live in a rural area and travel to a local medical facility to get telehealth services from a doctor in a remote location. In addition, the beneficiary would generally not be allowed to receive telehealth services in their home.
The Trump Administration previously expanded telehealth benefits. Over the last two years, Medicare expanded the ability for clinicians to have brief check-ins with their patients through phone, video chat and online patient portals, referred to as “virtual check-ins”. These services are already available to beneficiaries and their physicians, providing a great deal of flexibility, and an easy way for patients who are concerned about illness to remain in their home avoiding exposure to others.
A range of healthcare providers, such as doctors, nurse practitioners, clinical psychologists, and licensed clinical social workers, will be able to offer telehealth to Medicare beneficiaries. Beneficiaries will be able to receive telehealth services in any healthcare facility including a physician’s office, hospital, nursing home or rural health clinic, as well as from their homes.
Medicare beneficiaries will be able to receive various services through telehealth including common office visits, mental health counseling, and preventive health screenings. This will help ensure Medicare beneficiaries, who are at a higher risk for COVID-19, are able to visit with their doctor from their home, without having to go to a doctor’s office or hospital which puts themselves or others at risk. This change broadens telehealth flexibility without regard to the diagnosis of the beneficiary, because at this critical point it is important to ensure beneficiaries are following guidance from the CDC including practicing social distancing to reduce the risk of COVID-19 transmission. This change will help prevent vulnerable beneficiaries from unnecessarily entering a healthcare facility when their needs can be met remotely.
President Trump’s announcement comes at a critical time as these flexibilities will help healthcare institutions across the nation offer some medical services to patients remotely, so that healthcare facilities like emergency departments and doctor’s offices are available to deal with the most urgent cases and reduce the risk of additional infections. For example, a Medicare beneficiary can visit with a doctor about their diabetes management or refilling a prescription using telehealth without having to travel to the doctor’s office. As a result, the doctor’s office is available to treat more people who need to be seen in-person and it mitigates the spread of the virus.
As part of this announcement, patients will now be able to access their doctors using a wider range of communication tools including telephones that have audio and video capabilities, making it easier for beneficiaries and doctors to connect.
Clinicians can bill immediately for dates of service starting March 6, 2020. Telehealth services are paid under the Physician Fee Schedule at the same amount as in-person services. Medicare coinsurance and deductible still apply for these services. Additionally, the HHS Office of Inspector General (OIG) is providing flexibility for healthcare providers to reduce or waive cost-sharing for telehealth visits paid by federal healthcare programs.
Medicaid already provides a great deal of flexibility to states that wish to use telehealth services in their programs. States can cover telehealth using various methods of communication such as telephonic, video technology commonly available on smart phones and other devices. No federal approval is needed for state Medicaid programs to reimburse providers for telehealth services in the same manner or at the same rate that states pay for face-to-face services.
This guidance follows on President Trump’s call for all insurance companies to expand and clarify their policies around telehealth.
This guidance, and earlier CMS actions in response to the COVID-19 virus, are part of the ongoing White House Task Force efforts. To keep up with the important work the Task Force is doing in response to COVID-19 click here www.coronavirus.gov. For information specific to CMS, please visit the Current Emergencies Website.
As you know, in November, HP announced ZCentral, a solution powering the next-gen of computing with the world’s first single-sourced remote workstation solution. Starting today, customers can access the new generation of ZCentral Remote Boost here, and the proprietary ZCentral Connect software here. In tandem, HP is extending the ZCentral Remote Boost software free trial to 3 months for anyone who may need it, on any workstation (it’s always included with Z by HP devices).
By centralizing high-compute performance, companies are able to free power users to tackle complex, graphics-intensive projects, with ISV certifications, from anywhere.
ZCentral also adds an extra layer of security for IT departments with remote workers. By keeping the workstation secure and centralized next to the data storage, with ZCentral Connect and ZCentral Remote Boost, only encrypted pixels are sent over the network, so company data remains highly secure at the source.
Visit Kiosk Industry for latest updates on AntiMicrobial Wipes, Sprays, film, UV-C, Copper, Coatings and more.
Last Updated on
Disinfectant Wipes for Touch Screen
By now we have all seen and read countless articles on how best to protect ourselves and others from bacterial infection. Before we begin we want to list some recommended resources right off the bat that can help educate your point of view on antibacterial, antimicrobial and of course, the coronavirus. See our full portal page on AntiBacterial for more information.
Another option — wipe down with bleach wipes and after several passes of that wipe down with Easy Screen.
Bleach – figure 1/3 cup bleach per gallon of water for mix ratio
Avoid highly concentrated solutions of alcohol based.
If you want to “double-clean” then consider getting handheld UVC product like the Blade below for localized and safe UVC cleaning (after surfaces have been wiped down). Oily fingers are one of the complicating factors to consider.
PDI has been monitoring the COVID-19 epidemic (SARS-CoV-2 virus), previously identified as 2019 Novel Coronavirus (2019-nCoV), to provide you the most current information to help manage this outbreak. The CDC has recently issued additional recommendations for surface disinfection, including recommendations for the use of an EPA-approved disinfectant with emerging viral pathogens claims. This letter supersedes previous letter issued on January 30, 2020.
Super Sani-Cloth ® Wipes, Sani-Cloth ® AF3 Wipes, and Sani-Cloth ® Bleach Wipes meet the criteria for the EPA emerging viral pathogens claim. PDI has submitted the addition of the required language for this claim on these master labels to the EPA and is awaiting expedited approval. Recently launched products, including Sani-Cloth ® Prime Wipes, Sani-Prime ® Spray, Sani-24 ® Spray, and Sani-HyPerCideTM Spray already have the EPA emerging viral pathogens claim on their master labels.
Recommended Wipe
Super Sani-Cloth is what we would recommend. It is the most equipment friendly wipe that is on the list.
The SARS-CoV-2 virus still has not been made readily available by the CDC for testing. The CDC states: “If there are no available EPA-registered products that have an approved emerging viral pathogens claim for COVID-19, products with label claims against human coronaviruses should be used according to label instructions.” The following PDI products have label claims against human coronaviruses:
Handheld cleaning would include after-hours with handheld UV device (example here is Blade). $700
UV-C Handheld Blade FAQ
How does one use it?
With the Blade unit, all you need to do is get it as close to the surface as possible and pass it over the surface. Being one inch away, a few seconds exposure kills all bacteria and virus.
How long does it take?
Some take a little longer than normal but a few seconds is plenty if 1 inch away
What is the wrong way to use them?
You don’t shine the light up or at anyone and the operator should wear safety glasses which we include with every unit
How does it handle oily fingerprints and smudges?
The surface should be wiped down for the best application
These should be used in off-hours when no customers or patients around? Example: the front lobby of VA where check-in’s are taking place.
They can be used 24 hours a day, you just need to have people stand back while you run the unit over the surface
See our full portal page on AntiBacterial for more information.
WESTMINSTER, Colo., March 4, 2020 /PRNewswire/ — The Kiosk Manufacturer Association aka KMA announces our new ADA and Accessibility Chairpersons. Serving as co-chairpersons for our committee is Randy Amundson of Frank Mayer and Associates, Inc. and Mr. Peter Jarvis of Storm Interface. Randy is one of our founding chairpersons and is continuing in his support of KMA and ADA. Peter is a charter sponsor of the Accessibility Committee and now helps lead the way for the KMA.
From Randy Amundson, “Peter Jarvis and I continue to work closely in finalizing the Kiosk Accessibility Code of Practice (CoP). We feel that the CoP will be a useful tool that kiosk manufacturers and their clients can use to ensure that their kiosks are accessible to the widest population of people with some form of disability possible. Peter and I are also working on developing an independent standard that can be used by nationally recognized testing labs in order to certify a kiosk as being ADA compliant”.
Peter Jarvis adds, “First, let me thank the committee’s previous Co-Chair Laura Miller for her work in raising awareness of accessibility issues within the kiosk industry. Laura continues to make an outstanding contribution to the work of the KMA Accessibility Committee but has now stepped into a role dedicated to kiosk accessibility at Vispero. Her commitment, to ensure equality in access to information, services and products, continues to influence the committee’s objectives. As the new Co-Chair (serving the KMA’s European members) I hope to continue the initiatives of the committee and look forward to working with the committee’s US resident Chairperson Randy Amundson.”
We very much thank Laura Boniello Millerwith Vispero our founding co-chairperson for her contributions, support and effort over the last two years.
Visit with the KMA at the upcoming CSUN conference as well as at MURTEC. In May we will be exhibiting at the National Restaurant Show.
See our Affiliations page for more – NRF, NRA, RTN, Accessibility Association, Patent Reform, RNIB and more.
If your company, organization, association, local, city, state or federal agency would like to participate at some level with the KMA either with ADA or with EMV, please contact [email protected] or call 720-324-1837
Come to the 2020 Exhibit Hall and experience first-hand the cutting-edge assistive technology offered in over 100 booths. For 34 years, thousands have attended the CSUN Conference’s free Exhibit Hall to have the opportunity to directly interact with the providers who develop the technology, products and services designed to promote inclusion for people with disabilities.
The Exhibit Hall is located in the Grand Ballroom and Marquis Ballroom on the lobby level of the hotel. Be one of the first to explore the latest innovative technology when doors open on Wednesday, March 11 at 12:00 pm. We also welcome you to attend the Exhibit Hall Opening Reception at 12:30 pm.
This March 11th-13th, Vispero will be leading multiple presentations on kiosk accessibility at CSUN’s Annual Accessibility Conference being held in Anaheim, CA. Vispero’s Vice President and subject matter expert Matt Ater, will lead a panel of kiosk accessibility experts on “Lessons Learned from Developing Accessible Kiosks”. The panel will include KMA Accessibility Board co-chair Peter Jarvis, Senior Executive VP at Storm Interface, among others. Kiosk accessibility and usability will be discussed in a presentation called “Kiosk Accessibility: Understanding the Kiosk User Experience”, kiosk industry veteran Laura Boniello Miller and usability expert Rachael Bradley Montgomery will discuss the perspective of the kiosk user and how deployers can best accommodate users with disabilities. Vispero’s Ryan Jones will lead a session, “JAWS Kiosk: What Is It and When Would I Use It” to assist in using the JAWS screen reader in accessible kiosk deployments. Along with the presentations you can visit the Vispero booths in the Marquis Ballroom, #503, #603, and #703 to see accessible kiosks in action, including kiosks from Olea, Pyramid and SeePoint. Vispero will also be hosting an accessible Escape Room, and on-site registration will be available using an accessible kiosk powered by JAWS, located in the Vispero Showcase Suite.
Vispero has added support for the new Storm Assistive Technology device, the new Extended Functionality AudioNav. JAWS will continue to support the Storm AudioNav and other assistive technology devices by Storm as they are added.
Editors Note: Short and concise report on QSR Kiosk market. Nothing on drive-thru kiosks. Quite a few players not included (maybe next time). Example would be reference to McDonalds Times Square Flagship project (see CNBC writeup we published back in May 2019). That is Pyramid Computer out of Germany making those. No mention of Evoke or Coates for that matter. Recent news of Glory $225M investment in Acrelec is worth considering. Deployers like Appetize nada. Canada, Europe, Asia and South America are not covered. Still it is a recommended report for those who are looking to get educated on the QSR Kiosk Market.
Summary: Self-Service Kiosks Gaining QSRs’ and Consumers’ Adoption. Mercator Advisory Group research report assesses the 2019 U.S. QSR kiosk market and its future growth prospects.
Market: Self-Service Kiosks Gaining Popularity, provides insight and market analysis on the fast-growing QSR kiosk market in the United States, where ordering via self-service kiosks in quick service restaurants is gaining popularity among consumers and QSRs are adopting the technology in various configurations.
The Defense Information Systems Agency (DISA) is seeking sources for Application Containment
CONTRACTING OFFICE ADDRESS:
IT CONTRACTING DIVISION
BUILDING 3600
2300 EAST DRIVE
Scott AFB IL 62225-5406 US
For the purposes of this Sources Sought, endpoints are described as follows: t * Thick Client Network clients running on fully-capable systems – Local storage and processing capability; can operate independently if not connected to a network. t * ThinClient Network client running on minimally-capable system – Minimal local storage and processing capability. t * ZeroClient Client with no capability outside of network context. t * Server Respond to client requests; provide enterprise services (typically in data centers). Users are System Administrators. t * Virtual Client Client running virtually on a host platform; no physical resources. The target is an endpoint (excluding devices like phones and tablets) security and management solution that mitigates prevalent adversary attack vectors, tactics, and techniques used to compromise a system. The proposed solution must automatically isolate the execution of high risk applications interacting with untrusted content from more trusted portions of the endpoint (e.g. host operating system); and/or the solution must facilitate incident detection, investigation, response and threat hunting. Any proposed solution must continue to be effective in disconnected, virtual, intermittent, and low bandwidth network conditions without a dependence upon regularly recurring (e.g. daily, weekly, monthly) content updates. The proposed solution must be capable of scaling to millions of endpoints and provide information in near real-time. Any proposed solution must be ready for testing and subsequent deployment. In order for the Government to evaluate the technical merits of the vendors solution(s), the solution(s) shall be capable of meeting the following technical requirements: Application Containment t 1. The solution shall automatically isolate applications interacting with untrusted content (e.g., internet web pages, email, removable media, and office documents) from more trusted portions of the device outside the container. t 2. The solution shall automatically detect potentially malicious code behavior executing within the isolation container. t 3. The solution shall automatically capture necessary details (e.g., ports and protocols in use, running executables and services, browser plugins in use, etc.) of events (e.g., malicious activity) occurring within the isolation container to support retrospective post-event analysis, threat analysis, and situational awareness. t 4. The solution shall automatically constrain potentially malicious activity to within the isolation container. t 5. The solution shall be configurable to control the ability of applications running within the isolation container to access only specified system resources (e.g., storage devices, network resources, human interface devices, etc.). t 6. The solution shall automatically eliminate and report all isolation container artifacts of compromise and intrusion remnants to the common management server in support of rapid remediation and investigation. t 7. The solution shall automatically restore access to a potentially compromised application within 60 seconds post-compromise, unless configured to allow malware to run for the purpose of analysis. t 8. All components shall be protected against unauthorized/malicious access and modification. This applies to executable code, data, and component settings. t 9. The solution shall provide continual verification of the integrity of the isolation container to ensure there is no unauthorized/malicious access or persistent modification. t 10. Solution components shall not impair authorized system operations (e.g., patching, scanning, business software usage, information assurance tools/initiatives (Secure Host Baseline, Assured Compliance Assessment Solution, etc.) nor shall they degrade managed system performance in any way, which may adversely impact a system s primary business/mission functions. t 11. The solution shall provide automatic time stamping of all collected data and events based on a single time standard (e.g., Coordinated Universal Time). t 12. The solution shall support the Department’s currently mandated means of authentication (e.g., Public Key Infrastructure (PKI)). t 13. The solution shall securely store and transmit data in a manner that ensures the confidentiality, integrity, availability, and source authenticity of the data. t 14. The solution shall automatically report operating status and configuration to its common management system, based on a pre-defined schedule, to ensure the capability is operating and configured as expected. t 15. The solution shall interoperate with event monitoring and correlation systems (e.g. SIEMs) to facilitate aggregated situational awareness. t 16. The solution shall allow for patching and update of containerized applications through a means of automated verification (e.g., integration with automated patch management infrastructure/processes). t 17. The solution shall encrypt all data in transit or data at rest with Federal Information Processing Standards (FIPS) 140-2 compliant cryptographic modules. t 18. The solution shall support open standards for automated threat information sharing. t 19. The solution shall protect managed endpoints operating in Connected, Disconnected, Intermittent, and Limited (DIL) bandwidth networked and standalone environments. t 20. The solution shall report to the Common Management Server all potentially malicious events encountered while the managed endpoint was without network connectivity. t 21. The solution shall provide configurable alerting based upon administrator defined criteria. t 22. The solution shall send alerts at administrator-definable intervals. t 23. The solution shall, at a minimum, operate on the most common vendor supported operating systems approved for use in the DoD environment (e.g., Microsoft Windows 8.1, Windows 10 (including Secure Host Baseline), and Exchange Server 2016, Linux). t 24. The solution shall provide the ability for designated administrators, authenticated according to DoD standards, to configure the solution in accordance with applicable DoD policies. t 25. The solution shall automatically report potentially malicious events detected within the isolation container to a common management server and provide actionable information in a non-proprietary, standard format (e.g. Structured Threat Information expression (STIX)). t 26. The isolation container shall ensure that destructive malware within the container is unable to negatively impact user data or the integrity of the host system. t 27. The solution shall, where possible, inspect and/or sanitize active or potentially malicious untrusted content passing out of the container to the underlying more-trusted host. Examples include copy-paste, printing, file saving, and synchronization of configuration, and user data such as cookies and bookmarks. Sanitization should re-encode content in such a way as to minimize the likelihood of malicious exploitation when content is processed. t 28. The solution should be capable of containing operating system kernel-level vulnerability exploitation. t 29. The solution shall have the capability to be tuned/configured to reduce alerts resulting from false positives. t 30. The solution’s uninstall capability shall ensure no artifacts are left behind following execution of the uninstall processes. t 31. All solution components shall have the ability to be automatically deployed and configured based on predefined configurations. SPECIAL REQUIREMENTS Must have Secret Facility Clearance. Please provide your current Facility Clearance level. SOURCES SOUGHT: The North American Industry Classification System Code (NAICS) for this requirement is 511210, with the corresponding size standard of $41.5 million. To assist DISA in making a determination regarding the level of participation by small business in any subsequent procurement that may result from this Sources Sought, you are also encouraged to provide information regarding your plans to use joint venturing (JV) or partnering. Please outline how you would envision your company’s areas of expertise and those of any proposed JV/partner would be combined to meet the specific requirements contained in this announcement. In order to make a determination for a small business set-aside, two or more qualified and capable small businesses must submit responses that demonstrate their qualifications. Responses must demonstrate the company s ability to perform in accordance with the Limitations on Subcontracting clause (FAR 52.219-14). SUBMISSION DETAILS: Responses should include: t 1. Business name and address; t 2. Name of company representative and their business title; t 3. Type of Small Business; t 4. CAGE Code; t 5. Your contract vehicles that would be available to the Government for the procurement of the product and/or service, to include ENCORE III, SETI, NIH, NASA SEWP, General Service Administration (GSA): OASIS, ALLIANT II, VETS, STARS II, Federal Supply Schedules (FSS) (including applicable SIN(s)), or any other Government Agency contract vehicle that allows for decentralized ordering. (This information is for market research only and does not preclude your company from responding to this notice.) t tVendors who wish to respond to this should send responses via email NLT 4:00 PM Eastern Daylight Time (EDT) on February 17, 2020 to Taylor Rakers, [email protected] and Cody Seelhoefer, [email protected]. If you feel your company has a solution that meets the requirements above, submit a brief capabilities package (no more than ten pages) demonstrating that ability. t tProprietary information and trade secrets, if any, must be clearly marked on all materials. All information received that is marked Proprietary will be handled accordingly. Please be advised that all submissions become Government property and will not be returned. All government and contractor personnel reviewing submitted responses will have signed non-disclosure agreements and understand their responsibility for proper use and protection from unauthorized disclosure of proprietary information as described 41 USC 423. The Government shall not be held liable for any damages incurred if proprietary information is not properly identified. SCOTT AFB, IL 62225
The Defense Information Systems Agency (DISA) is seeking sources for Endpoint Detection and Response (EDR)
CONTRACTING OFFICE ADDRESS:
IT CONTRACTING DIVISION
BUILDING 3600
2300 EAST DRIVE
Scott AFB IL 62225-5406 US
INTRODUCTION:
This is a SOURCES SOUGHT ANNOUNCEMENT to determine the availability and technical capability of small businesses (including the following subsets, Small Disadvantaged Businesses, Certified 8(a), Service-Disabled Veteran-Owned Small Businesses, HUBZone Small Businesses and Woman Owned Small Businesses) to provide the required products and/or services.
The Endpoint Security Portfolio is seeking information for potential sources for Endpoint Detection and Response (EDR) capability allowing cyber defenders to quickly detect and investigate security incidents and automatically detect malicious system activities and behaviors. EDR capabilities continuously record significant events occurring on managed systems for the purpose of identifying, reporting, and investigating malicious activity; thereby reducing and adversary s dwell time on DoD networks. Recorded data accessible through a management console query interface. The EDR capability complements other endpoint security measures and capabilities; the ability to restrict execution of high-risk applications and computer processing.
DISCLAIMER:
THIS SOURCES SOUGHT ANNOUNCEMENT IS FOR INFORMATIONAL PURPOSES ONLY. THIS IS NOT A REQUEST FOR PROPOSAL. IT DOES NOT CONSTITUTE A SOLICITATION AND SHALL NOT BE CONSTRUED AS A COMMITMENT BY THE GOVERNMENT. RESPONSES IN ANY FORM ARE NOT OFFERS AND THE GOVERNMENT IS UNDER NO OBLIGATION TO AWARD A CONTRACT AS A RESULT OF THIS ANNOUNCEMENT. NO FUNDS ARE AVAILABLE TO PAY FOR PREPARATION OF RESPONSES TO THIS ANNOUNCEMENT. ANY INFORMATION SUBMITTED BY RESPONDENTS TO THIS SOURCES SOUGHT ANNOUNCEMENT IS STRICTLY VOLUNTARY.
REQUIRED CAPABILITIES:
For the purposes of this Sources Sought, endpoints are described as follows:
t
Thick Client Network clients running on fully-capable systems – Local storage and processing capability; can operate independently if not connected to a network.
t
Thin Client Network client running on minimally-capable system – Minimal local storage and processing capability.
t
Zero Client Client with no capability outside of network context.
t
Server Respond to client requests; provide enterprise services (typically in data centers). Users are System Administrators.
t
Virtual Client Client running virtually on a host platform; no physical resources.
The target is an endpoint (excluding devices like phones and tablets) security and management solution that mitigates prevalent adversary attack vectors, tactics, and techniques used to compromise a system. The proposed solution must automatically isolate the execution of high risk applications interacting with untrusted content from more trusted portions of the endpoint (e.g. host operating system); and/or the solution must facilitate incident detection, investigation, response and threat hunting. Any proposed solution must continue to be effective in disconnected, virtual, intermittent, and low bandwidth network conditions without a dependence upon regularly recurring (e.g. daily, weekly, monthly) content updates. The proposed solution must be capable of scaling to millions of endpoints and provide information in near real-time. Any proposed solution must be ready for testing and subsequent deployment.
In order for the Government to evaluate the technical merits of the vendors solution(s), the solution(s) shall be capable of meeting the following technical requirements:
EDR
t
The solution shall provide the ability to automatically capture, record and analyze a user-selectable range of endpoint parameters and events in order to assess system operations, support risk management and enable hunt and forensic activities. Examples of data the solution shall be capable of capturing include: – Windows Registry – Changes to Keys (and their associated processes; including auto-run keys), Access Control Lists (ACLs), license keys, ownership, and administrative rights.
t
t- User Activity – Authentication and privileged user activities.
t- Network Activity – File transfers, connections opened and closed, destination (Uniform Resource Locator, Internet Protocols, type of traffic and encryption method (e.g., File Transfer Protocol, Secure File Transfer Protocol, Server Message Block, Transport Layer Security, and Secure Sockets Layer.
t – Processes and Services – Automatic and manual starts and stops. Process parent and child relationships. Loaded and unloaded Dynamic Link Libraries, and record of their associated processes and files on the file system.
t – Software Changes Operating System, driver and program installation, uninstall, patching, and modification information (e.g., software versions, software identification tags, patch information and mutex data).
t – Peripheral Connections – Wired and wireless connections to peripheral devices.
t – Other File Activity – Files created, opened, closed, saved, modified, moved, or deleted.
t – In-memory Activities – In-memory activities associated with potentially malicious activity; including mutexes and named pipes associated with processes.
t – Hardware Changes – Peripheral device detection, removal, or modification.
t
t
The solution shall not impair authorized system operations (e.g., patching, scanning, business software usage, information assurance tools/initiatives (secure host baseline, assured compliance assessment solution, etc.) nor shall it degrade managed system performance in any way, which may adversely impact a system s primary business/mission functions.
t
The solution shall encrypt all data in transit or data at rest with FIPS 140-2 compliant cryptographic modules.
t
The solution shall, at a minimum, operate on the most common vendor supported operating systems approved for use in the DoD environment (e.g., Microsoft Windows 8.1, Windows 10 (including secure host baseline) and Exchange Server 2016).
t
The solution shall support automated/scheduled transfer of endpoint data to Government approved data archives (e.g., commercial cloud, DoD-owned, federal data center, etc.)
t
The solution shall provide time stamping of all collected data and events based on a single time standard (e.g., coordinated universal time).
t
The solution shall securely store and transmit data in a manner that ensures the confidentiality, integrity, availability, and source authenticity of the data.
t
The solution shall provide the ability to automatically discover and alert on previously unknown external and/or internal hardware/peripheral devices (such as storage) connected to endpoints for the purpose of retrospective/post-event analysis.
t
The solution shall provide integrated and customizable search with, at minimum, the ability to, from the central management server or other authorized consoles, search data from all systems for information relevant to an incident investigation or risk analysis.
t
The solution shall have the ability to execute manual and scheduled scans of specified systems for indicators derived from threat intelligence or other sources.
t
The solution shall provide integrated analytics (including visualization) and support the creation of custom analytics, in order to identify anomalous endpoint behaviors, support incident investigation, and perform event analysis.
t
The solution shall have the ability to pull locally stored data from specified endpoints in near real time to support high priority hunt and forensic operations.
t
The solution shall provide automatic hardware-level, operating system-level, and application-level monitoring.
t
The solution shall allow administrative functions to be delegated to users based on roles/permissions and or groupings of endpoints they are responsible for managing.
t
The solution shall provide automated analysis and visualization of an attack; including production of an event timeline and initial assessment of severity/impact.
t
The solution shall support delegation (i.e., user-specified) of who can access/view collected endpoint data.
t
The management and analytic components of the solution shall scale to support an endpoint client load of at least 500,000 endpoints.
t
The solution shall support the Department’s currently mandated means of authentication (e.g., PKI).
t
The solution shall automatically report detection of potentially malicious events to a common management server and provide actionable information in non-proprietary, standard formats (e.g. STIX).
t
The solution shall generate reports based on pre-saved user-defined formats and datasets to facilitate rapid analysis, decision making, and follow-up actions following events.
t
The solution shall, through a central management server, provide options for configurable automated or manual remediation actions in response to detected potentially malicious events.
t
The solution’s uninstall capability shall ensure no artifacts are left behind following execution of the uninstall processes.
t
The solution shall support the rapid push (objective: within 30 seconds) of configuration changes from the management server to all installed agents.
t
The solution shall protect managed endpoints operating in Connected, DIL bandwidth networked, and standalone environments.
t
All solution components shall have the ability to be automatically deployed and configured based on predefined configurations.
t
The solution shall report to the common management server all potentially malicious events encountered while the managed endpoint was without network connectivity.
t
All components shall be protected against unauthorized/malicious access and modification. This applies to executable code, data, and component settings.
SPECIAL REQUIREMENTS
Must have Secret Facility Clearance. Please provide your current Facility Clearance level.
SOURCES SOUGHT:
The North American Industry Classification System Code (NAICS) for this requirement is 511210, with the corresponding size standard of $41.5 million.
To assist DISA in making a determination regarding the level of participation by small business in any subsequent procurement that may result from this Sources Sought, you are also encouraged to provide information regarding your plans to use joint venturing (JV) or partnering. Please outline how you would envision your company’s areas of expertise and those of any proposed JV/partner would be combined to meet the specific requirements contained in this announcement.
In order to make a determination for a small business set-aside, two or more qualified and capable small businesses must submit responses that demonstrate their qualifications. Responses must demonstrate the company s ability to perform in accordance with the Limitations on Subcontracting clause (FAR 52.219-14).
SUBMISSION DETAILS:
Responses should include:
Business name and address;
t
Name of company representative and their business title;
t
Type of Small Business;
t
CAGE Code;
t
Your contract vehicles that would be available to the Government for the procurement of the product and/or service, to include ENCORE III, SETI, NIH, NASA SEWP, General Service Administration (GSA): OASIS, ALLIANT II, VETS, STARS II, Federal Supply Schedules (FSS) (including applicable SIN(s)), or any other Government Agency contract vehicle that allows for decentralized ordering. (This information is for market research only and does not preclude your company from responding to this notice.)
t
tVendors who wish to respond to this should send responses via email NLT 4:00 PM Eastern Daylight Time (EDT) on February 17, 2020 to Taylor Rakers, [email protected] and Cody Seelhoefer, [email protected]. If you feel your company has a solution that meets the requirements above, submit a brief capabilities package (no more than ten pages) demonstrating that ability.
t
tProprietary information and trade secrets, if any, must be clearly marked on all materials. All information received that is marked Proprietary will be handled accordingly. Please be advised that all submissions become Government property and will not be returned. All government and contractor personnel reviewing submitted responses will have signed non-disclosure agreements and understand their responsibility for proper use and protection from unauthorized disclosure of proprietary information as described 41 USC 423. The Government shall not be held liable for any damages incurred if proprietary information is not properly identified.
Thin Client News – IGEL Founding Father Heiko Gloge Passes CEO Torch To Jed Ayres
‘This is a once-in-a-lifetime opportunity focused on how the world is going to consume applications and Windows desktops,’ says new IGEL CEO Jed Ayres. ‘It’s a Cinderella moment in my career. It’s a great honor, but it’s also a huge responsibility because of the heritage, tradition and stability that Heiko brought to this company.’
Heiko Gloge, the founding father and driving force behind IGEL’s rise over the past two decades from an upstart German thin-client manufacturer to a global next-generation edge operating system powerhouse, is stepping aside and handing the global CEO post to Jed Ayres.Ayres, the hard-charging marketing maestro who Gloge recruited as U.S. CEO four years ago to take IGEL into Silicon Valley and lead the global software offensive, is pledging to take the company from $150 million in sales to more than $1 billion.
The $1 billion goal comes as the 20-year-old company moves to capture the exploding cloud workspaces opportunity with a blockbuster partnership with software giant Microsoft. As the first Linux client for Microsoft’s fast-growing Windows Virtual Desktop, IGEL is in a unique position to capture significant edge operating system market share.