|By PR Newswire||
|March 17, 2014 06:00 AM EDT||
VILNIUS, Lithuania, March 17, 2014 /PRNewswire/ -- Neurotechnology, a provider of high-precision biometric identification technologies, today announced new releases across their entire line of biometric Software Development Kits (SDK). The latest product versions include significant algorithm improvements for functionality enhancement and higher recognition accuracy. The new, higher-level API is designed to make it easier and faster to integrate any combination of fingerprint, face, iris and voice biometrics into identification projects – from basic applications like secure entry to national-scale projects such as voter registration that require high-speed, high-volume identification capabilities. The new API also makes it simple to switch between the local computer and the required server-side solution and enables the application to be scaled up as needed.
Updated products from Neurotechnology include:
- MegaMatcher 5.0 multi-biometric SDK for large-scale applications,
- MegaMatcher Accelerator 7.0 multi-biometric software and hardware server side matching solution,
- MegaMatcher on Card 3.3 for multi-biometric matching on a smart card,
- VeriFinger 7.0 for fingerprint identification,
- VeriLook 5.5 for facial identification,
- VeriEye 2.8 for iris identification, and
- VeriSpeak 2.1 for voice identification.
"Our focus has always been on the creation of more powerful biometric algorithms, and we have continued that tradition with major enhancements across these new product versions," said Irmantas Naujikas, Director, Business Development, for Neurotechnology. "Also, project implementation periods are often critically short, so we restructured the API to make it more intuitive, enabling developers to integrate multiple biometric technologies into their projects in a much shorter period of time. We included more simplified samples and tutorials to make the integration process easier," Naujikas added.
Other significant product updates include:
- Fingerprint Biometrics (VeriFinger 7.0, MegaMatcher 5.0 SDK, MegaMatcher Accelerator 7.0): Major updates to the fingerprint segmentation, extraction and matching algorithm provide greater precision. The new recognition algorithm provides a level of accuracy that is up to two times higher than the previous version.
- Face Biometrics (VeriLook 5.5, MegaMatcher 5.0 SDK, MegaMatcher Accelerator 7.0): The new facial recognition algorithm offers faster face detection, improved face feature determination and emotion detection.
- Other biometric modalities: Iris Biometrics (VeriEye 2.8, MegaMatcher 5.0 SDK, MegaMatcher Accelerator 7.0), Voice Biometrics (VeriSpeak 2.1) and Matching On Card (MegaMatcher on Card) all include algorithm updates for functionality improvement or higher recognition accuracy.
MegaMatcher 5.0, which is available in both Standard and Extended versions, enables the use of any combination of fingerprint, face, iris, palmprint or voice biometric modalities while providing extremely fast and accurate identification. MegaMatcher 5.0 can match up to 200,000 fingerprint, face or iris records or 8,000 voice print records per second on a single matching server or cluster node. The Cluster Server component, which accommodates multiple Cluster Nodes for extended capacity and speed, is available in MegaMatcher Extended SDK. The MegaMatcher SDK also includes support for embedded platforms, which enables users to develop PC, embedded or mixed biometric systems that support Windows, Linux, Mac OSX and Android platforms.
Even faster matching speeds can be achieved with the new MegaMatcher Accelerator 7.0 hardware and software solution which matches up to 100 million fingerprints, 100 million faces or 200 million irises per second on single hardware server. MegaMatcher Accelerator 7.0 provides a significantly higher degree of recognition accuracy than any previous version. The matching solution supports fingerprint, face and iris biometric modalities. It is available in both Standard and Extended versions with computer cluster components to enable the building of clusters of MegaMatcher Accelerator units for extremely high speed, high volume identification applications.
Biometrics – and particularly multi-modal biometrics – are increasingly becoming critical components in the issuance of passports, national IDs, voting systems and border control projects around the globe. For these projects, having fast and accurate matching is essential to ensure unique identification and provide a process that works quickly and smoothly for the user. As the need for these biometric projects accelerates worldwide, Neurotechnology's SDKs provide the high degree of speed and accuracy required for national-scale projects while helping to ensure that the development and integration of multiple biometric modalities is as fast and easy as possible.
The entire updated Neurotechnology biometric product line is available through Neurotechnology or from distributors worldwide. For more information, go to: www.neurotechnology.com.
Neurotechnology is a provider of high-precision biometric fingerprint, face, iris, palmprint and voice identification algorithms, object recognition technology and software development products. More than 2500 system integrators, security companies and hardware providers integrate Neurotechnology's algorithms into their products, with millions of customer installations worldwide.
Neurotechnology's identification algorithms have consistently earned the highest honors in some of the industry's most rigorous competitions, including the National Institute of Standards and Technology (NIST)'s Fingerprint Vendor Technology Evaluation (FpVTE), the Minutiae Interoperability Exchange Test (MINEX), the Iris Exchange (IREX) and the Fingerprint Verification Competitions (FVC).
Drawing from years of academic research in the fields of neuroinformatics, image processing and pattern recognition, Neurotechnology was founded in 1990 in Vilnius, Lithuania and released its first fingerprint identification system in 1991. Since that time the company has released more than 100 products and version upgrades for identification and verification of objects and personal identity.
Jennifer Allen Newton
Bluehouse Consulting Group, Inc.
Jennifer (at) bluehousecg (dot) com
Storage administrators find themselves walking a line between meeting employees’ demands to use public cloud storage services, and their organizations’ need to store information on-premises for security, performance, cost and compliance reasons. However, as file sharing protocols like CIFS and NFS continue to lose their relevance, simply relying only on a NAS-based environment creates inefficiencies that hurt productivity and the bottom line. IT wants to implement cloud storage it can purchase a...
May. 30, 2015 04:30 AM EDT Reads: 2,853
The emergence of cloud computing and Big Data warrants a greater role for the PMO to successfully manage enterprise transformation driven by these powerful trends. As the adoption of cloud-based services continues to grow, a governance model is needed to orchestrate enterprise cloud implementations and harness the power of Big Data analytics. In his session at Cloud Expo, Mahesh Singh, President of BigData, Inc., discussed how the Enterprise PMO takes center stage not only in developing the app...
May. 30, 2015 04:30 AM EDT Reads: 2,629
Cloud Foundry open Platform as a Service makes it easy to operate, scale and deploy application for your dedicated cloud environments. It enables developers and operators to be significantly more agile, writing great applications and deliver them in days instead of months. Cloud Foundry takes care of all the infrastructure and network plumbing that you need to build, run and operate your applications and can do this while patching and updating systems and services without any downtime.
May. 30, 2015 04:30 AM EDT Reads: 3,575
Are your Big Data initiatives resulting in Big Impact or Big Mess? In her session at Big Data Expo, Penelope Everall Gordon, Emerging Technology Strategist at 1Plug Corporation, shared her successes in improving Big Decision outcomes by building stories compelling to the target audience – and her failures when she lost sight of the plotline, distracted by the glitter of technology and the lure of buried insights. The cast of characters includes the agency head [city official? elected official?...
May. 30, 2015 04:30 AM EDT Reads: 3,389
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial C...
May. 30, 2015 04:30 AM EDT Reads: 5,534
SYS-CON Events announced today that BMC will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. BMC delivers software solutions that help IT transform digital enterprises for the ultimate competitive business advantage. BMC has worked with thousands of leading companies to create and deliver powerful IT management services. From mainframe to cloud to mobile, BMC pairs high-speed digital innovation with robust...
May. 30, 2015 04:15 AM EDT Reads: 1,032
After a couple of false starts, cloud-based desktop solutions are picking up steam, driven by trends such as BYOD and pervasive high-speed connectivity. In his session at 15th Cloud Expo, Seth Bostock, CEO of IndependenceIT, cut through the hype and the acronyms, and discussed the emergence of full-featured cloud workspaces that do for the desktop what cloud infrastructure did for the server. He also discussed VDI vs DaaS, implementation strategies and evaluation criteria.
May. 30, 2015 04:00 AM EDT Reads: 4,629
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core...
May. 30, 2015 03:30 AM EDT Reads: 5,397
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
May. 30, 2015 03:00 AM EDT Reads: 5,808
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ...
May. 30, 2015 02:00 AM EDT Reads: 6,192
Collecting data in the field and configuring multitudes of unique devices is a time-consuming, labor-intensive process that can stretch IT resources. Horan & Bird [H&B], Australia’s fifth-largest Solar Panel Installer, wanted to automate sensor data collection and monitoring from its solar panels and integrate the data with its business and marketing systems. After data was collected and structured, two major areas needed to be addressed: improving developer workflows and extending access to a b...
May. 30, 2015 01:00 AM EDT Reads: 2,015
When an enterprise builds a hybrid IaaS cloud connecting its data center to one or more public clouds, security is often a major topic along with the other challenges involved. Security is closely intertwined with the networking choices made for the hybrid cloud. Traditional networking approaches for building a hybrid cloud try to kludge together the enterprise infrastructure with the public cloud. Consequently this approach requires risky, deep "surgery" including changes to firewalls, subnets...
May. 30, 2015 12:00 AM EDT Reads: 4,261
Move from reactive to proactive cloud management in a heterogeneous cloud infrastructure. In his session at 16th Cloud Expo, Manoj Khabe, Innovative Solution-Focused Transformation Leader at Vicom Computer Services, Inc., will show how to replace a help desk-centric approach with an ITIL-based service model and service-centric CMDB that’s tightly integrated with an event and incident management platform. Learn how to expand the scope of operations management to service management. He will al...
May. 29, 2015 11:45 PM EDT Reads: 1,501
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impac...
May. 29, 2015 09:00 PM EDT Reads: 4,994
2015 predictions circa 1970: houses anticipate our needs and adapt, city infrastructure is citizen and situation aware, office buildings identify and preprocess you. Today smart buildings have no such collective conscience, no shared set of fundamental services to identify, predict and synchronize around us. LiveSpace and M2Mi are changing that. LiveSpace Smart Environment devices deliver over the M2Mi IoT Platform real time presence, awareness and intent analytics as a service to local connecte...
May. 29, 2015 04:27 PM EDT Reads: 535