Founded in 2004 in Madrid, with offices in Washington, D.C. and Cape Town, South Africa, AGNITiO is among the many players in voice biometrics that include Auraya, AECOM, CSID, Nuance, Speech Technology Center, TradeHarbor and Voice Biometrics Group. In the past, AGNITiO has differentiated itself by advancing the field. Currently the company is working on new systems that … [Read more...]
Future Analytics: X6 Smartglasses Powered by Ignite
While Palantir and the U.S. Army continue their running argument over whose platform is better -- Gotham or DCGS-A -- “reality” courtesy of the U.S. Department of Defense may have intervened with an alternative that renders the sniping irrelevant: military grade X6 Smartglasses that deliver real time tactical data directly to troops on the ground, without reliance on hand-held … [Read more...]
The Relevance of Axilent ACE Profiler to Surveillance
Available information on Axilent founder and CEO Loren Davie is as spare as data on the company itself: scattered career tidbits on Linkedin; tweets that reveal an array of personal interests ranging from music to Tor, the Dark Web, and an affinity for Satoshi Nakamoto, inventor of the Bitcoin protocol. Davie’s self-profile is as puzzling as that of Axilent’s new website, which … [Read more...]
VSS Monitoring: For Best-in-Class Network Packet Brokers
C5IS reviews VSS Monitoring: pioneer, market leader & arguably the very future of Network Packet Brokers. Network Packet Brokers (NPBs) and TAPs are systems designed to provide visibility into the network. Both have grown in popularity with the rise of software defined networks, virtualized networks, the cloud, and the attendant increase in the volume, bandwidth and … [Read more...]
NetFlow Versus Tor: Surveillance Winning That Fight
In NetFlow Versus Tor, the latest round of legitimate computer science vs. terrorists using the Onion Router, lab tests show it is now possible to deanonymize targets on the world’s most popular and infamous anonymous service. Tor enjoys legendary status as a service that encrypts network communications end-to-end, is completely impenetrable to surveillance and … [Read more...]