Skip to content

Embroidery and textile art with IPEVO Document Cameras

Kathy Andrews is a textile artist and embroidery teacher who works with students of all abilities, teaching them the techniques and the joy of hand embroidery.

With her enthusiasm for stitching and encouraging classroom atmosphere, she is a sought-after teacher of embroidery. Her teaching has included online courses, Embroidery Guild of America local, regional, and national seminars.

“One of the things I like most is that the IPEVO camera shows what I see when I’m embroidering. This means that the student can see from the same perspective that I do as I work. It’s as if they were sitting beside me as I work.”

She is a member of the Cedar Valley Chapter of the EGA, the EGA Fiber Forum, Textile Society of America, the Minnesota Needleworkers Guild, the Stan Hywet Needleworkers Guild and the Columbia Fiber Arts Guild.

In addition to teaching, she is available for lectures. “Elizabethan Embroidery And The Trevelyon Miscellany Of 1608” and “The Unbroken Thread Sampler Collection: The Samplers And Their Makers”

“My IPEVO camera is part of my embroidery setup. It’s always right beside me when I’m stitching, so it’s ready to use when I need it. As I work, the camera is right there to take both still photos of my progress and short videos for instructional purposes later.
When I am creating a new piece of embroidery, I use the IPEVO camera to document my design process. This includes taking photos of stitches and color choices that I am experimenting with as I work.”

“The other invaluable use of the document camera is when I am collaborating with someone on a design. Because I can be connected to both the IPEVO document camera and Zoom at the same time, I’m able to talk face to face with a collaborator and show them the piece we’re working on in real time. It’s almost as good as being in the same room together and, best of all, I can collaborate with other embroiderers from all over.”

Before acquiring IPEVO doc cameras for her work, Kathy says she used to take photographs of her progress using a cell phone camera. No matter how hard she tried, the photos would sometimes come out blurry. She also needed to remember to upload them onto her computer and put them in the correct files, resulting in many of her photos getting lost among other personal pictures.

Taking a close-up photo or video with her cell phone was problematic, she needed to ask her husband to help and never got the close up she needed because their bodies would get in the way.

“The IPEVO camera’s zoom function is fabulous, taking close-up pictures is no longer an issue. It sits beside me, and I can snap a photo whenever I need to or take a video without any additional set up. The camera is sturdy and has a heavy base which means there’s no wobble when I want a close up of my work.”

When Kathy taught embroidery at seminars and classes, the usual way students would watch her demonstrations was to gather around her chair, lean over and hope they could see her work. Naturally, this didn’t always work very well, especially with any student who was in a wheelchair or needed a walker to get around. Especially now, with Covid, it’s just not safe to get so close together anymore.

She can now use her IPEVO document camera “live” connected to a projector to demonstrate. She can also take a video at home and play the video as a demonstration while she narrates in real time.

“Reviewing the process of doing embroidery wasn’t possible when doing demonstrations live; once you’ve embroidered an area you can’t really take it out and do it again to demonstrate it again. My students can request to watch the same video over and over in class as I explain it and they can ask questions.”

About recommending IPEVO to other professionals like herself, she states:

“Absolutely. If you are serious about chronicling the progress of your work, the IPEVO camera is a great addition to your tool kit. Being able to take steady, close-ups of your embroidery is so simple and the quality of the image is outstanding. The IPEVO Visualizer Software is very good and super easy to use; it didn’t take me very long to feel confident using it.
The camera is perfect for teaching embroidery; it’s safer because the students can stay seated and at least 6 feet apart. No one has to move to see the demonstration, which makes it much easier for any students with mobility challenges. Additionally – and most importantly – when the image is projected on a screen, it is many times larger. It’s a true close up.”

 

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About IPEVO
IPEVO makes versatile teaching tools instead of specialized “classroom equipment”.
We go beyond the usual conventions of classroom technology—large, expensive, specialized and complex—to rethink simple and flexible solutions for interactive teaching in today’s classrooms.
IPEVO’s interactive teaching tools empower educators and teachers with radically affordable and compact technology that is simple, intuitive and flexible, so that precious time and resources can be wholly dedicated to teaching. We intend to make educational technology accessible and available to all.

Password Strength: How to Create Strong Passwords for Credentials?

Having an efficient password policy is critical to the cybersecurity of companies. Since using easy-to-identify passwords is a way to facilitate scams by malicious actors. For the same reason, repeating passwords is a risky practice.

In 2021, more than 8.4 billion passwords from people all over the world were leaked and posted under the name ‘rock you 2021‘ in an online forum. What did they have in common? They used between 6 and 20 characters, without spaces, numbers, or symbols.

Other characteristics of easy-to-steal passwords are: using birthday or algorithms with repeated numbers, proper names, numerical combinations, and the word Brazil are also often found in leaked passwords of Brazilian users, in addition to the sequence 123456.

We have prepared this article especially to help you keep your company protected. In it, we will propose positive actions for an effective password policy. They are as follows:

  • Change Passwords Frequently
  • Use Software that Alerts You About the Change
  • Join an Account Lockout System
  • Train Your Employees
  • Do Not Use the Same Password for All Accounts
  • Create Strong Passwords
  • Have a Password Manager
  • Adopt Multifactor Authentication in Your Company’s Routine

Read it until the end!

Why Should You Adopt a Secure Password Policy?

We know hackers take advantage of the weakness of corporate passwords in most cyber-invasions. 

Therefore, regardless of the size or industry of an organization, it is essential to have a secure password policy. After all, by adopting it, one avoids invasions that generate inconvenience and financial losses, in addition to preventing the company’s credibility from coming into question.

In practice, the password policy establishes rules to be followed by the entire team, ensuring the adoption of security requirements when creating passwords for accessing corporate devices and systems.

In the next topic, we cover some criteria you should adopt when establishing a password policy for your business. 

 

Positive Actions for an Effective Password Policy

You now understand the importance of creating a secure password policy for your company. Now, let’s show you how this can be done. Keep reading our text!

  • Change Passwords Frequently

It is believed that using the same password in different applications and services can facilitate the access of malicious users, and when we reduce the number of accesses with the same password, we also reduce the possibilities that they are shared and available for access by third parties.

However, the usefulness of this measure has been questioned. Microsoft itself stopped asking for the periodic change of passwords, considering this method useless. According to this report in Isto É Dinheiro, Aaron Margosis, a cybersecurity consultant at Microsoft, stated it is necessary to change the password only if it is stolen.

Despite this debate, the periodic change of passwords has still been recommended, for this reason, we explain about software that emits alerts when it is time to change them in the following topic.

  • Use Software that Alerts You About the Change

There is specific software that warns about the need to change passwords. They work as follows: when you try to access the computer after some time, you see a pop-up, warning you about the need to change your password to proceed. If you don’t, you will not be able to access the system.

These pieces of software are very useful because, over time, it is very common for people to get comfortable and fail to change their passwords within a certain time.

  • Join an Account Lockout System

Blocking accounts is a very important practice that prevents access after a certain number of attempts. This feature prevents the user from trying to access a system by testing multiple passwords until they reach their goal. This practice is known as brute force and is often used by malicious attackers to gain unauthorized access to these systems.

To get a sense of the importance this feature has, it is widely used by e-mail services and various websites.

  • Train Your Employees

If you are at the head of an organization, you should know that in addition to investing in technology to ensure information security, you need to train your employees through awareness and training to make it possible to identify and avoid threats.

Many people are unaware of the risks involved in accessing corporate systems. In these cases, it is necessary to introduce good practices and enforce them to prevent cyberattacks, including password theft. 

It is also important that these pieces of training are constant, since technology advances every day, as well as the techniques used by malicious agents.

  • Do Not Use the Same Password for All Accounts

If someone manages to steal your password from social media, for example, it is very likely they will test it on your other services, causing much more damage if you use the same password to connect to different online platforms.

Therefore, when establishing a password policy, remember to recommend that your employees have a different password for each online environment they access.

  • Create Strong Passwords

It is not enough to use passwords to access systems. It is necessary to resort to strategies that make it possible to increase the security level of the passwords used. After all, hackers often analyze users and attempt the invasion by testing obvious possibilities such as birthdates, relatives’ names, and short words.

In these cases, we recommend using a minimum number of digits, combining uppercase and lowercase letters, numbers, and symbols.

  • Have a Password Management Solution

If you follow the fifth and sixth tips in this article, your employees will have to remember a lot of complex passwords, which can be quite difficult. That’s where a password management solution comes into play.

This feature is capable of storing passwords, facilitating the work of users, who only need to remember the password used to access this system. What’s more, password managers still suggest codes that are unlikely to be discovered. 

Of course, like all other apps, they can be breached. Therefore, it is essential to use an extremely secure master password.

  • Adopt Multifactor Authentication in Your Company’s Routine

One of the ways to create a secure password policy is to adopt multifactor authentication (MFA). This solution brings together different mechanisms to prevent intrusions, which are:

  • Knowledge Factor: something the user knows, such as a password;
  • Ownership Factor: something the user owns, such as a token; and
  • Inheritance Factor: something that relates to who they are, as in the case of biometrics.

But remember an important detail: in the multifactor authentication, the mechanisms must be independent of each other to guarantee the protection of a system. This means that if one of the factors gives access to the other, your organization is not protected.

By reading this article, you learned what you should do to create an effective password policy for your organization. Did you like our text? Share it with someone else who is interested in the topic. 

 

ALSO READ IN SENHASEGURA’S BLOG

High Availability: Technology that Guarantees Productivity and Credibility

China has Published Its Specific Law For the Protection of Personal Data. What Are The Implications?

My Company Suffered a Ransomware Attack: Should I Pay the Ransom or Not?

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

QA, the acronym that can save your life (or your company)

Do you already know what tasks the QA department performs? Would you like to discover what each QA tester does on a daily basis? You don’t know what the hell we’re talking about but you’re intrigued and can’t stop reading because my prose is enigmatic and addictive? Well, you’ve come to the right place! We’ll tell you how our QA department manages so you can learn what yours does without having to ask. Read on and don’t forget to propose me for the Nobel Prize for literature when the time comes!

Do you already know what tasks the QA department performs?

Starting with the functions of the department, QA is in charge of testing Pandora FMS and making sure that we offer the best possible quality to our clients and the community. It is an extremely complex task because Pandora FMS is very large and it could be said that chaos theory is well applied, since inserting an “&” character in a form field can cause a report that had nothing to do with it to fail. So be careful, any day your building could burn for the wrong character! From Pandora FMS we recommend hiring only professionals

Currently, our QA team is made up of Daniel Ródriguez, Manuel Montes and Diego Muñoz, although from time to time, colleagues from other departments support them to carry out specific tests. They are thick as thieves. They always sit together at company dinners and share a bottle of Beefeater after dinner.

QA Tester Team 

Daniel Rodríguez, “The beast (QA) of Metal”

Works together with the Support and Development Departments. He is devoted to testing new features and finding possible bugs to help improve the product. He loves sci-fi movies and metal:

My duties as department head are mainly to manage and supervise the work of the department, design and improve test plans, carry out manual tests and coordinate communication with the rest of the departments.

Manuel Montes

is from Madrid and began as part of the Development department, although he later joined the QA team. He loves cycling when the weather allows it, watching movies, reading and going for a walk with his family

In addition to manual tests, we carry out automatic tests with technologies such as Selenium Webdriver and Java to interact with the browser, Cucumber with Gherkin language so that the tests to be carried out are somewhat more understandable for less technical colleagues and, in turn, serve as documentation, and Allure to generate reports with the results of said tests.

Diego Muñoz, “The Gamer Alchemist”

is a QA tester, although he also helps the Support team, solving different problems for customers. He is from Huelva and although he has lived there all his life, he has no accent, which he boasts about. His hobbies range from watching movies, to video games, listening to music and watching series:

“Every piece of code that is implemented in Pandora FMS goes through my hands or through those of one of my colleagues, who judge if the changes work correctly or have any errors. We also sometimes suggest alternative ways to present features to developers or to solve the bugs that we have been able to find. In addition, in the days prior to the product release, we review the whole console in all its Metaconsole, Node and Open variants, once again making sure that the code introduced in the new version works as well as possible.”

The importance of the QA department

From the QA department, an average of 180 tickets are generated per release and, as you know, we present 10 releases a year. This adds up to more than 1,800 tickets annually, how cool is that? Sometimes it is a heinous job, because it involves throwing back the work of a Development colleague, and also difficult because it is impossible to see everything, and when a problem explodes in a client’s environment, it attracts all eyes. Although QA work has little visibility and can be very thankless, it is fundamental to the success of everyone’s work and the final product.

If you want to find out more about our departments out of curiosity or for the simple fact that this way you can find out more about yours, you can request it in the comments box, one of our busy social networks or by post, which is a little bit outdated but should totally come back. Scented letters and vermilion sealing wax. There can’t be anything more romantic!

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

ESET partners with Intel to enhance endpoint security with hardware-based ransomware detection

BRATISLAVA — March 3, 2022 — ESET, the leading endpoint protection platform vendor headquartered in Europe, has set out to integrate Intel® Threat Detection Technology (Intel® TDT) into its multi-layered cybersecurity technology suite.

Recognizing the complex and evolving nature of ransomware, an ever more formidable threat to customers’ work and personal lives, ESET will enhance its software-based detection technologies with a ransomware detection only Intel hardware can deliver. With progress in technological innovations often bringing new tools for the sustained growth and security of SMBs, the integration of Intel TDT means that ESET endpoint security software running on Intel-based PCs can deliver superior ransomware protection.

“This collaboration recognizes the immediate boost in ransomware protection that integrating Intel’s hardware-based ransomware detection technology can deliver. Tapping into telemetry at the CPU level is an effective step we can take to enable improved tracking of malicious encryption. Basically, for ESET this means exposing ransomware as it attempts to avoid detection in memory. ESET has always believed in the multi-layered approach, and by adding the silicon layer we recognize that hardware-based security is the next milestone in battling threats,” shares Előd Kironský, Chief of Endpoint Solutions and Security Technologies at ESET.

Due to the devastating impacts of past ransomware attacks and the increasing complexity of maintaining secure endpoint defenses, ransomware remains a top concern across the industry. To better address this, integrating ransomware detection improvements to ESET endpoint security solutions will provide enhanced immunity to most detection bypasses. Furthermore, with Intel TDT machine learning constantly evolving and progressing, the ability of ESET endpoint security solutions to detect derivative variants of ransomware threats will progress in lockstep.

For ESET and its clients, the value proposition of this collaboration lies in the parallel benefits of using Intel TDT machine learning models to assist with the detection of ransomware and simultaneously off-loading these processing demands to the Intel integrated graphics controller (GPU), keeping overall system performance high.

“Low impact to system performance is an area that ESET has always prioritized within its multi-layered software architecture and is a key selling point for many of our clients. Leveraging tech that can help us with prevention and protection, while also preserving performance is a win-win choice,” says Kironský.

The benefits of this integration will become available later this year in an upcoming release of ESET’s endpoint security products. In the first round of releases, ESET will focus on endpoints with 9th Gen and newer Intel Core™ and Intel vPro Windows based PCs, which are capable of leveraging Intel TDT out-of-the-box.

“Ransomware impacts both small businesses and large enterprises and can result in economic fallout on a global scale. We are excited to partner with ESET which delivers a true global deployment footprint. ESET’s ransomware optimizations will work across both Intel vPro Enterprise and our new Intel vPro Essentials targeted for SMBs. This delivers a compelling hardware and software bundle that delivers right-sized security for businesses of any size and delivers higher efficacy security when ESET software is run on Intel-based PCs. This is a major step forward to turn the tide against ransomware,” said Carla Rodriguez, Sr Director Ecosystem Partner Enablement, Intel Corp. 

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.