Welcome!

@CloudExpo Authors: Kevin Jackson, Pat Romanski, Liz McMillan, Dana Gardner, Elizabeth White

News Feed Item

Un dispositif de positionnement dans une montre-bracelet utilise la technologie M2M Cinterion de Gemalto pour aider à protéger les personnes atteintes d’autisme ou de la maladie d'Alzheimer

Gemalto (Euronext NL 0000400653 GTO), le leader mondial de la sécurité numérique, annonce que sa technologie M2M Cinterion® a été intégrée dans le dispositif de localisation individuelle (DLI) GPS innovant TRiLOC™ utilisé pour localiser des personnes souffrant de maladies de type autisme (MTA), de démence ou de la maladie d’Alzheimer. La solution de montre-bracelet, facile à porter, utilise un module Cinterion ultrafin pour permettre des communications cellulaires globales 24H/24 et 7J/7, ainsi qu'un suivi par GPS. Le dispositif TRiLOC aide les soignants à localiser et à protéger les personnes ayant des besoins spéciaux tout en réduisant la nécessité d’une surveillance physique constante. Au niveau mondial, on compte plus de 30 millions d’individus souffrant d’autisme ou de la maladie d'Alzheimer et plus de 60 millions de soignants qui cherchent des solutions pour améliorer leur indépendance et leur sécurité1.

Développé par iLOC Technologies, le DLI TRiLOC intègre le module M2M Cinterion PHS8 de Gemalto pour fournir simultanément des communications données et vocales haute vitesse et des données de localisation GPS. La solution de Gemalto transmet la localisation précise d’un individu au téléphone portable ou à l'ordinateur du soignant désigné tout en permettant des appels vocaux bidirectionnels mains libres lorsque cela est nécessaire. Une fonctionnalité d’écoute à distance permet aux soignants de détecter lorsqu’une aide immédiate est requise ; par ailleurs, le porteur a accès à un bouton SOS en cas d’urgence. Communiquant avec Bluetooth™ 4.0, le DLI TRiLOC peut être synchronisé avec les appareils de santé mobile, les équipements domestiques intelligents et les solutions de sécurité pour envoyer aux soignants des mises à jour relatives au statut du porteur. Un accessoire optionnel porté par les soignants offre la détection de proximité et la fonction modem électronique permettant l’envoi immédiat de messages écrits et d’alarmes audio si un individu s’éloigne trop. De plus, une alerte peut être envoyée lorsque la sangle verrouillable du dispositif est manipulée. La technologie avancée de gestion de l’alimentation M2M Cinterion de Gemalto prolonge l’autonomie de la batterie du dispositif, permettant ainsi une plus longue durée de fonctionnement entre 2 recharges.

« Le dispositif de localisation individuelle GPS TRiLOC est le fruit de deux années de recherche et de nombreuses discussions avec des associations de soignants et des parents d’enfants atteints de MTA », a déclaré Tony Fama, Président et PDG d’iLOC et père d’un enfant atteint d’une MTA. « TRiLOC procure à mon fils davantage d’autonomie et réduit le besoin d’une surveillance constante. Grâce à l’accessoire offrant la fonction modem, les familles et les soignants peuvent prévoir des sorties dans les musées, les centres commerciaux et même les parcs de loisirs fréquentés sans avoir à subir l’énorme stress lié au risque de vagabondage de l’individu ».

« C’est très gratifiant de voir notre technologie améliorer véritablement la vie des personnes ayant des besoins spéciaux, dans ce cas celles susceptibles de se perdre », a déclaré Norbert Muhrer, Vice-président directeur de Gemalto M2M. « Nos efforts de miniaturisation nous ont permis de créer le module le plus mince que nous ayons jamais produit, le Cinterion PHS8, qui est suffisamment petit et puissant pour offrir cette montre-bracelet innovante. Grâce à cette solution, Gemalto contribue à nouveau à l’amélioration de la sécurité et du confort pour les citoyens en tirant pleinement profit du potentiel du monde des communications sans fil et du monde numérique qui nous entourent ».

1 – Autism Wandering Awareness Alerts Response Education (AWAARE) et American Health Assistance Foundation (AHAF)

À propos d’iLOC Technologies

iLOC Technologies Inc. est une société privée sise à Montréal, au Canada. Sa mission consiste à proposer des produits et services de pointe, économiques et innovants en matière de sécurité et de sûreté personnelles qui favorisent la tranquillité d’esprit pour l’utilisateur final.

Contacts
iLOC Technologies Inc.
1870 Boul. Des Sources, suite 205
Pointe-Claire, Québec
Canada H9R5N4
Site Internet : http://www.iloctech.com
E-mail : [email protected]
1.855.456.4562 (iLoc)
1.514.987.4562 (iLoc)

À propos de Gemalto

Gemalto (Euronext NL0000400653 GTO) est le leader mondial de la sécurité numérique avec un chiffre d’affaires 2011 de 2 milliards d’euros. Présent dans 43 pays, Gemalto emploie plus de 10 000 salariés travaillant depuis 74 bureaux et 14 centres de Recherche et Développement.

Nous nous développons au cœur du monde numérique en évolution rapide et constante. Des milliards de personnes à travers le monde revendiquent de plus en plus la liberté de communiquer, acheter, voyager, faire des transactions bancaires, se divertir et travailler – à tout moment et en tous lieux - de façon agréable et sûre. Gemalto répond à leurs demandes croissantes en matière de services mobiles personnels, paiement sécurisé, authentification des accès au « cloud », protection de l’identité et de la vie privée, services d’e-santé et d’e-gouvernement performants, billettique des transports urbains facile d’utilisation et applications M2M fiables.

Gemalto développe des logiciels embarqués et des produits sécurisés que nous concevons et personnalisons. Nos plateformes logicielles et nos services gèrent ces produits sécurisés, les données confidentielles qu’ils contiennent et les services sécurisés qu’ils rendent possibles pour les utilisateurs finaux. Nos innovations offrent à nos clients de nouvelles possibilités d’améliorer la praticité et la sécurité des vies numériques de chacun.

Gemalto continue de croître avec le nombre grandissant de personnes qui utilisent ses solutions pour interagir dans le monde numérique et mobile.

Pour plus d’informations, visitez nos sites www.gemalto.com/france, www.justaskgemalto.com, blog.gemalto.com, ou suivez @GemaltoFrance sur twitter.

Le texte du communiqué issu d’une traduction ne doit d’aucune manière être considéré comme officiel. La seule version du communiqué qui fasse foi est celle du communiqué dans sa langue d’origine. La traduction devra toujours être confrontée au texte source, qui fera jurisprudence.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
"Software-defined storage is a big problem in this industry because so many people have different definitions as they see fit to use it," stated Peter McCallum, VP of Datacenter Solutions at FalconStor Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Enterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intensifying security policies, among other factors, require IT organizations to continuously deploy configuration changes. Therefore, enterprises are looking for better ways to automate the management of their networks while still leveraging existing capabilities, optimizing perf...
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet a...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Aspose.Total for .NET is the most complete package of all file format APIs for .NET as offered by Aspose. It empowers developers to create, edit, render, print and convert between a wide range of popular document formats within any .NET, C#, ASP.NET and VB.NET applications. Aspose compiles all .NET APIs on a daily basis to ensure that it contains the most up to date versions of each of Aspose .NET APIs. If a new .NET API or a new version of existing APIs is released during the subscription peri...
Verizon Communications Inc. (NYSE, Nasdaq: VZ) and Yahoo! Inc. (Nasdaq: YHOO) have entered into a definitive agreement under which Verizon will acquire Yahoo's operating business for approximately $4.83 billion in cash, subject to customary closing adjustments. Yahoo informs, connects and entertains a global audience of more than 1 billion monthly active users** -- including 600 million monthly active mobile users*** through its search, communications and digital content products. Yahoo also co...
As companies gain momentum, the need to maintain high quality products can outstrip their development team’s bandwidth for QA. Building out a large QA team (whether in-house or outsourced) can slow down development and significantly increases costs. This eBook takes QA profiles from 5 companies who successfully scaled up production without building a large QA team and includes: What to consider when choosing CI/CD tools How culture and communication can make or break implementation
Ixia (Nasdaq: XXIA) has announced that NoviFlow Inc.has deployed IxNetwork® to validate the company’s designs and accelerate the delivery of its proven, reliable products. Based in Montréal, NoviFlow Inc. supports network carriers, hyperscale data center operators, and enterprises seeking greater network control and flexibility, network scalability, and the capacity to handle extremely large numbers of flows, while maintaining maximum network performance. To meet these requirements, NoviFlow in...
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
Redis is not only the fastest database, but it is the most popular among the new wave of databases running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 19th Cloud Expo, Dave Nielsen, Developer Advocate, Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
The competitive landscape of the global cloud computing market in the healthcare industry is crowded due to the presence of a large number of players. The large number of participants has led to the fragmented nature of the market. Some of the major players operating in the global cloud computing market in the healthcare industry are Cisco Systems Inc., Carestream Health Inc., Carecloud Corp., AGFA Healthcare, IBM Corp., Cleardata Networks, Merge Healthcare Inc., Microsoft Corp., Intel Corp., an...
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...