Skip to content

CyberLink to Showcase Smart Retail Solutions at NRF 2022

Taipei, Taiwan — January 14, 2021 — CyberLink Corp. (5203.TW), a pioneer of AI and facial recognition technologies, will showcase new, contactless smart retail solutions. This solution is powered by its market-leading FaceMe® engine running on the Qualcomm® QCS6125 multimedia processor at NRF 2022 in New York. FaceMe® will be featured at Qualcomm Technologies booth #1411, in the Javits Convention Center, January 16-18, 2022.

FaceMe® is one of the world’s top facial recognition engines, with edge-based, optimized architecture delivering precise biometric data in a few milliseconds with up to 99.82% accuracy, and is top-ranked in NIST FRVT (Facial Recognition Vendor Test).

Qualcomm® QCS6125 multimedia processor delivers integrated heterogenous compute capabilities to provide optimized Edge AI performance in addition to robust security core for secure biometrics processing.

FaceMe® offers cross-platform capabilities on Windows, Linux, Android and iOS, for a variety of edge devices and different hardware configurations, which makes it an ideal solution for smart retail, from kiosks and POS, to personalized shopping, digital signage and statistics.

FaceMe® offers a broad and growing set of features and tools that redefine accuracy, performance, security, and flexibility standards for a wide range of industries. Since the launch of FaceMe® in 2018, CyberLink has collaborated with over a hundred global partners, including hardware makers, solution providers, and system integrators, deploying its technology across multiple scenarios.

“Working hand in hand with Qualcomm Technologies, CyberLink is leveraging both companies’ technologies to enable a wide range of new user experiences, as demonstrated for retail at NRF,” said Dr. Jau Huang, Chairman and CEO of CyberLink. “Our continued collaboration with Qualcomm Technologies has been integral in making CyberLink’s FaceMe® solution the most advanced biometric access technology in the market. We look forward to having NRF attendees visit the Qualcomm Technologies booth to see FaceMe in action.”

“Qualcomm Technologies is pleased to work closely with Cyberlink to drive next-generation biometric solutions and we look forward to showcasing the FaceMe® demonstration at NRF,” said Ketal Gandhi, Director, Business Development, Qualcomm Technologies, Inc. “We have worked collaboratively with CyberLink to support pre-integration capabilities to enable customers and our ecosystem to save time on their development and accelerate the go-to-market timeline for their applications in Retail such as Biometrics Payment, Access Control, Loyalty and more.”

CyberLink is inviting NRF visitors to stop by Qualcomm Technologies’ booth to see some exciting results of this collaboration, including its application into POS solutions from Ordyx. Ordyx will introduce a complete POS system accessed by facial recognition for both cashiers and opted-in customers who desire to pay using their face. This new system leverages FaceMe® facial recognition and the Qualcomm QCS6125 solution to create a secure, fast and convenient new experience for customers.

Come meet the FaceMe® team and find out about the latest developments in AI and facial recognition.

NRF 2022 Information

  • Time: Jan 16 – 18, 2022
  • Venue: Javits Convention Center
  • Booth Info: #1411 (Qualcomm Technologies’ Booth)

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

Did you know that there are several USB types? Do you know them all?

USB types: the final list to know them all

“Pen drive”, “memory stick”, for those less attentive: “VHS”… We have given many names to what we actually meant by USB. But you have to know that the term goes a little beyond that gadget of four or eight gigabytes that we use for so many things. In fact, there are several USB types, and today we will delve into getting to know them.

USB Types: What is a USB?

First we should make clear that, as many suspected but few dared to inquire, the acronym USB is derived from the corresponding words: Universal Serial Bus. USB is a connection protocol that allows us to connect several peripheral devices to an electronic device to achieve an exchange of data. It can also be useful to carry out some operations or charge the battery of our devices. It is, then, like a port that works as a connection socket between different devices.

The range of devices that we can interconnect to a computer thanks to USB is quite wide. We just have to think a bit so that they all come to our heads immediately. Mouses, keyboards, video and photo cameras, smartphones, USB memories, music players, webcams, speakers, printers, recorders, external hard drives, PDA… There are countless examples.

We owe this protocol to the fruitful 1990s, a wonderful decade for Britpop and for technology. It was seven large technology corporations (Intel, IBM, Northern Telecom, Compaq, Microsoft, NEC and Digital Equipment Corporation) who joined hands to reach an agreement on the peripheral connection standard for a computer. The idea was good for everyone, and although they started with a first model, USB 1.0, different from the current ones, everything was just a matter of evolution.

USB Types: Standards

USB devices are classified into four types based on their data transfer speed: Low Speed (1.0), Full Speed (1.1), High Speed (2.0) and Super High Speed (3.0).

  • USB 1.0. It was the one that appeared in the mid-nineties. The maximum speed at which information could be transferred was 1.5 Mbps. Well, it could be used for connecting devices like the mouse and keyboard for example.
  • USB 1.1. The transfer rate increased to 12 Mbps.
  • USB 2.0. It is undoubtedly the most widespread standard and sends data at a speed of 480 Mbps, although its actual rate is 280 Mbps. In the cable you may find four lines: two for data transfer and two for power.
  • USB 3.0. We can consider it about ten times faster than 2.0. It reaches speeds of 4.8 Gbps. The best thing is that it is still compatible with the previous ones and on top of that, it includes five additional contacts. At present, it coexists with 2.0. in perfect harmony.
  • USB 3.1 It is the last of the standards. In fact it emerged just a few years ago. It reaches a data transfer speed of 10 Gbps. As an incentive, it comes with a new type of connector, connector C.

USB Types: Types of connectors

Now we go to the shapes of USB, which is why we are more familiar with them.

Type A. It is the one that most users will recognize. That flattened rectangle in which we can see internal connections. The male connector is at the end of the cables, while the female is the port itself.

Type B. The ports and connectors belonging to this type are just as recognizable by users, but somewhat smaller and wider than those of type A. As a general rule, we can find them in devices such as printers.

Type C. The Type-C connector has appeared the same as USB 3.1 and the distinguishing feature is that it is reversible. That’s right, no matter which side you insert, it works both ways.

MiniUSB. You may find two different versions of this one, made by 5 or 8 pins. We can see them in cameras, external hard drives, music players and a few other trinkets.

MicroUSB. The microUSB is the smallest and thinnest of all. It is quite flat and was conceived to connect to our smartphones. With them we can transfer information and charge batteries, so we also know it very well.

USB Types: Mistaking them with USB Memory

As we have seen, the concept of USB refers to the connection port. However, the term “USB” has also been extended to refer to pen drives. Pen drives are enabled with a memory that works as a place for storing and transporting data. It’s the rightful replacement for floppy disks and CDs (who doesn’t have one, for God’s sake?!), with different capacities ranging from 1GB to 1TB. Simply because the pen drive connects through USB, they have ended up calling it that. To shorten it. We are that practical and love saving that much.

Once you just got into the technological ins and outs, are you hungry for more? Would you like to go even further in the world of technology? What about spending a couple of minutes to find out what computing system monitoring is and why it is also very important?

Monitoring systems are responsible for supervising technology (hardware, networks and communications, operating systems or applications, for example) in order to analyze its performance, and to detect and alert about possible errors. And this leads us to Pandora FMS, that wonderful tool thanks to which this blog is possible.

Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

VEGAS Creative Software Embraces New 12th Gen Intel® Core™ Processor as CPU-of-Choice for Optimal Workflow Performance for VEGAS Pro

12th Gen Intel Core Processor Performance Gains, Enhanced CPU+GPU Integration Significantly Boosts VEGAS Pro Workflow Speed and Efficiency


01/05/22

VEGAS Creative Software (www.vegascreativesoftware.com) announced today it has embraced the new 12th Gen Intel® Core™ processor to optimize the workflow and performance of its lineup of video/audio editing, color grading, effects and live streaming software, including VEGAS Pro.

By embracing this new architecture, VEGAS Pro will now benefit from significant single- and multicore performance gains for content creators. All AI/ML-based features in VEGAS Pro are now optimized for the new 12th Gen processor through OpenVINO. Capabilities such as AI-based Upscale, Style Transfer and Colorization will be faster and more efficient.

For additional performance enhancements, VEGAS Pro also takes advantage of the improved GPU + CPU integration with Intel® Deep Link technology, as well as hardware accelerated encoding and decoding of video, offering a smoother workflow and a faster delivery for content creators.

The hybrid processor architecture of 12th Gen Intel® Core™ processors combines larger highperformance cores with smaller high-efficiency cores. The intelligent selection of cores for different levels of tasks is handled automatically by the Intel® Thread Director, supported by Windows 11. These capabilities are at the heart of many of the stunning, AI-powered effects built into VEGAS Pro.

Hagen Hirche, chief technology officer for MAGIX and VEGAS Creative Software commented: “The combination of VEGAS Pro, the 12th Gen Intel Core processor and Win 11 is something for our users to celebrate. With the launch of this new processor, Intel has provided a great leap forward in multicore performance and gives mobile devices desktop-like performance which in turn means our users can get more done in less time.”

Jerry Tsao, GM and VP of Client Computing Group MCP Enthusiast Segment at Intel: “This close collaboration by our engineers utilizing Intel® OpenVINO toolkit and Intel® Deep Link technology, enables an AI-rich and performance-optimized video editing experience when running VEGAS Pro on 12thth Gen Intel® Core™ H- Series processors, which will make creators more productive and help unlock their creativity.”

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About VEGAS
Today, millions of VEGAS Pro and VEGAS Movie Studio users benefit from global industry-leading video editing technologies. Now, VEGAS launches into a new era. In May, 2016, MAGIX acquired the multiple award-winning VEGAS Pro and VEGAS Movie Studio product lines, along with other video and audio products. VEGAS Creative Software stands poised to take video editing to a new level. Our development teams in the US and Germany are working on innovative solutions to old problems, and building tools that push the boundaries of what’s currently possible. The VEGAS Creative Software mission: to make VEGAS software faster, more efficient, and even more intuitive. Our goal: to provide users at all levels–from video editing amateurs to creative professionals–tools that are perfectly suited to their needs and demands.

The Log4j Vulnerability Spells Crisis for Network Security, With Some Exceptions

In early December 2021, a significant vulnerability in a common piece of Java-based code by Apache set the world on fire…at least for IT security professionals. Within 24 hours of disclosure, leading software companies like IBM, Oracle, Amazon, and Cisco went into damage control, seeking to assess the level of potential damage they had and could expect to sustain, and frantically working on patches to prevent their customers’ data from being siphoned off and sold to the highest bidder. The event was fitting for 2021, a year marked by disinformation, confusion and fear.

“The log4j vulnerability is the most serious vulnerability I have seen in my decades-long career,” Jen Easterly, U.S. Cybersecurity and Infrastructure Security Agency director, said in a interview on CNBC.

As December 2021 dragged on, related flaws continued to surface, sending those same software companies back to the drawing board to repackage and test yet another series of patches for customer distribution. This after communicating initial patches to customers that often took a whole weekend or more to implement. It didn’t bode well for a happy holiday season for already resource-strapped IT teams who had been dealing with a plethora of network security issues for two years brought on by the COVID-19 pandemic and the overnight surge of remote workforces.

Depending on the version and the type of application, the log4j vulnerability’s scope and severity ranged from focused and moderate to widespread and critical. Some vendors were hit harder than others, such as Cisco, whose Identity Services Engine system saw more than 120 configurations affected. Others, like Microsoft, capitalized on the opportunity, rolling out solutions to proactively seek out and manage affected files, software, and devices impacted by log4j.

Widespread & Hard to Pin Down

The extent of the impact of the log4j vulnerability was in many ways foreseeable. The root cause: human “ingenuity” that could otherwise be called laziness. Rather than reinventing the wheel by creating a new set of code for each application that is developed, software engineers now often patch together existing libraries and packages for shared functions to generate much of the codebase that runs critical applications.

Like many noteworthy cyber incidents before it, the Log4j vulnerability helped us open our eyes to just how many software dependencies exist across enterprise systems — no matter if they are designed for security, operations, or sales. It also highlighted to us just how hard it is to mitigate and develop stopgaps for these vulnerabilities when they are so far-reaching and barely understood, especially in the early days of disclosure.

While the ability to utilize the same code across many systems does offer value in terms of time to market, the problem is that many prefabricated libraries and open-source projects are interdependent, resulting in a web of dependencies that drill down many layers. Inevitably, this creates a scenario where indirect dependencies that can be nearly impossible to identify and troubleshoot when a vulnerability is unearthed.

For the average Joe IT manager, this just means that the software you licensed was likely built using common third-party code you’re not even aware of that likely contains some vulnerabilities. Multiply this shared code across other enterprise systems in your stack – and queue the headaches.

Avoiding Issues Like Log4j as an End-User

Java is a programming language that’s been around for a while and is commonly found in older on-premises software. As such, it should not come as a surprise that the classic tech giants of the world wasted no time prioritizing the log4j vulnerability – they had billions of dollars in revenue at stake across their suites of legacy software. And to make matters worse, the issue didn’t just impact Java-based systems, but also Java components and development frameworks that rely on it including Apache Struts2, Apache Solr, Apache Druid, Apache Flink, ElasticSearch, Apache Kafka and many others. We’re talking about tens of millions of impacted systems in use at any given moment today.

How to avoid such widespread vulnerabilities is more than a question of choosing which apps are programmed with which language(s) – software engineers can debate the efficacy of each until they are blue in the face. Rather, it’s a question of how to consume enterprise software. For organizations more reliant on cloud native software-as-a service applications, IT employees almost certainly experienced fewer lost weekends dealing with the log4j problem.

This is because SaaS has a shared responsibility model, whereby both the vendor and the customer are responsible for the security of the application in use. The onus is on the SaaS vendor to deliver secure products and services, while the responsibility for configuring, managing, and using the product lies with the customer. In the case of Log4j, most of the heavy lifting falls on the SaaS vendor. They must ensure that their products are not affected. If they are, it is up to them to provide transparency into how the system is being patched and how the vulnerability is being mitigated.

While this differentiation seems simple, implementing a cloud-first IT strategy – no matter if universal or by function – can mean retaining IT talent by avoiding burnout, optimizing your IT budget by eliminating the need for third-party professional services, and so much more.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Actiphy Releases ActiveImage Protector 2022 Backup and Recovery Solution Featuring Direct-To-Cloud Backup and In-Cloud Recovery

Wildomar, CA — November 12, 2021, Actiphy Inc., a leading publisher of backup, disaster recovery, and virtualization software, announces the release of ActiveImage Protector 2022 featuring direct-to-cloud backup, in-cloud recovery, and a new agentless and agent-based hybrid licensing option.

This new version can now backup and restore directly to and from public cloud services and SFTP servers. With new In-Cloud Recovery, backup images can be restored as VMs in the cloud environment. New LTO Tape Support provides high speed backup of bulk data to high capacity tape storage solutions to ensure long-term archival stability. Point-in-time file and folder backup, a frequently requested feature, has been included in this release.

ActiveImage Protector 2022. On-Premise Strong, Cloud Stronger.

New Features

 

  • Direct-To-Cloud Backup
    Backup systems directly to cloud storage. Supported public cloud storage services include Amazon S3 and Azure as backup destinations. In addition, Direct-To-Cloud Backup also supports SFTP servers as backup destinations.

 

 

  • In-Cloud Recovery
    Any backup image can be restored directly to a virtual machine within the same cloud environment. In-Cloud Recovery offers an easy system migration of on-premise virtual or physical machines directly to cloud environments.

 

 

 

  • Actiphy Portal Service (APS)
    A powerful new on-line monitoring portal designed for Managed Service Providers (MSP), distributors and resellers. APS provides monitoring ActiveImage Protector (AIP) clients, collecting backup logs and generating reports of AIP clients’ task status.

 

 

  • LTO Tape Support
    Support for LTO as a backup destination. Backup data saved on tape can be physically isolated from ransomware attacks and ensures long-term archival stability.

 

 

 

  • File Backup
    A new file backup option providing granular point-in-time backup and restore of specific files and folders.

 

 

  • RescueBoot
    Adds an optional boot recovery environment to the system boot menu.

 

 

  • Disk-To-Disk Copy
    A new disk-to-disk copy option that supports virtual disks, physical disks, and volumes, for a complete sector by sector copy.

 

 

  • Offline Environment Activation Support
    With Actiphy Authentication Service (AAS) or a license file, ActiveImage Protector agents can be activated in an off-line environment.

 

 

  • iSCSI Target Server
    Utilize iSCSI targets and NFS exports to emulate backup images as virtual disk files for flexible and immediate recovery or migration.

 

 

  • Subscription License
    Annual, three-year, five-year subscription and perpetual licenses are now available.

 

 

  • Hybrid Licensing for Server Edition
    Selectable Agent-based or Agentless Backup licensing is now available for server edition.

 

 

  • Additional Linux Distributions Support
    ActiveImage Protector Linux edition now supports Ubuntu 18.04 LTS and 20.04 LTS, Debian 9/10/11, RedHat 8.4, Rocky Linux 8, Alma Linux 8 and Amazon Linux 2.

 

ActiveImage Protector 2022 is a backup and recovery solution that protects physical and virtual, Windows and Linux environments. The AIP solution includes all the tools necessary for enterprise level deployment and management of backup, recovery, standby switch-over, and migration.

Copyright © 2021 Actiphy, Inc. All rights reserved worldwide. All other brands and product names mentioned in this news release are trademarks or registered trademarks of their respective holders.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Actiphy
Actiphy founded in 2007, focuses on developing and offering innovative backup and disaster recovery solutions for complete protection of all your systems and data. ActiveImage Protector backs up Windows, Linux machines on physical and virtual environments and restore systems and data fast for you to be up and running with minimal downtime and data loss. Today Actiphy hold 20% of the image backup market in Japan and are expanding our services in the Asia/Pacific and North American regions, as well as in Europe, the Middle East and Africa.