September 2017 M T W T F S S « Jun 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Follow Quantopix on TwitterMy Tweets
Subscribe to Blog via Email
April 6th, 2016
Endicott, New York, April 6th, 2016. Quantopix Technologies, LLC is proud to announce the release of a new innovation in cloud-based technology to address a pressing need by service based businesses.
ServiceQ by Quantopix is Service-Centric. It helps manage many aspects of service employee/client relationships. It eliminates paperwork through customized forms, manages appointments and schedules through employee/client calendars, logs service time and time charges, manages client records and uploaded documents, tracks accounts receivables, issues and emails invoices, and generates client statements. This is all done in real time.
Whether the service is managing elderly care services, legal cases, fitness and training centers, therapy practices, landscaping, or hauling and moving services, ServiceQ can be customized to meet each particular management needs.
ServiceQ is focused on managing the valuable time each employee spends on serving his or her clients. Employees can create an engagement term for individual clients, or for a group of clients who are serviced together. ServiceQ will keep the clients up-to-date through email notifications throughout the term.
The software manages individual or group enrollments, maintains enrollment records, logs employee hours spent on each client, helps employees record service notes and upload relevant documents, and generates accurate billable time logs for each employee and client.
The software can be configured to keep clients informed of their appointment changes, engagement updates, service logs, and payments updates.
To know more about Quantopix’s ServiceQ and sign-up, go to http://www.quantopix.com/serviceq/info/
About Quantopix Technologies, LLC
Quantopix provides Software Development and Data Management Solutions for small and medium size businesses. They focus on developing custom data management tools for Work Flow, Data Mining, and Analytics to support strategic business decisions.
Quantopix Public Relations
Quantopix Technologies, LLC
This article was published on US Small Business Administration (SBA) website October 2015.
Top Ten Cybersecurity Tips
- Protect against viruses, spyware, and other malicious code
Make sure each of your business’s computers are equipped with antivirus software and antispyware and update regularly. Such software is readily available online from a variety of vendors. All software vendors regularly provide patches and updates to their products to correct security problems and improve functionality. Configure all software to install updates automatically.
- Secure your networks
Safeguard your Internet connection by using a firewall and encrypting information. If you have a Wi-Fi network, make sure it is secure and hidden. To hide your Wi-Fi network, set up your wireless access point or router so it does not broadcast the network name, known as the Service Set Identifier (SSID). Password protect access to the router.
- Establish security practices and policies to protect sensitive information
Establish policies on how employees should handle and protect personally identifiable information and other sensitive data. Clearly outline the consequences of violating your business’s cybersecurity policies.
- Educate employees about cyberthreats and hold them accountable
Educate your employees about online threats and how to protect your business’s data, including safe use of social networking sites. Depending on the nature of your business, employees might be introducing competitors to sensitive details about your firm’s internal business. Employees should be informed about how to post online in a way that does not reveal any trade secrets to the public or competing businesses. Hold employees accountable to the business’s Internet security policies and procedures.
- Require employees to use strong passwords and to change them often
Consider implementing multifactor authentication that requires additional information beyond a password to gain entry. Check with your vendors that handle sensitive data, especially financial institutions, to see if they offer multifactor authentication for your account.
- Employ best practices on payment cards
Work with your banks or card processors to ensure the most trusted and validated tools and anti-fraud services are being used. You may also have additional security obligations related to agreements with your bank or processor. Isolate payment systems from other, less secure programs and do not use the same computer to process payments and surf the Internet.Are you ready for the shift from magnetic-strip payment cards to safer, more secure chip card technology, also known as “EMV”? October 1st is the deadline set by major U.S. credit card issuers to be in compliance. Visit SBA.gov/EMV for more information and resources.
- Make backup copies of important business data and information
Regularly backup the data on all computers. Critical data includes word processing documents, electronic spreadsheets, databases, financial files, human resources files, and accounts receivable/payable files. Backup data automatically if possible, or at least weekly, and store the copies either offsite or on the cloud.
- Control physical access to computers and network components
Prevent access or use of business computers by unauthorized individuals. Laptops can be particularly easy targets for theft or can be lost, so lock them up when unattended. Make sure a separate user account is created for each employee and require strong passwords. Administrative privileges should only be given to trusted IT staff and key personnel.
- Create a mobile device action plan
Mobile devices can create significant security and management challenges, especially if they hold confidential information or can access the corporate network. Require users to password protect their devices, encrypt their data, and install security apps to prevent criminals from stealing information while the phone is on public networks. Be sure to set reporting procedures for lost or stolen equipment.
- Protect all pages on your public-facing websites, not just the checkout and sign-up pages
I presented this topic at the Greater Binghamton Business Expo in Upstate New York. The presentation is intended to help decision makers realize the shift in IT deployments as the result of current cloud offerings. It compares the current cloud solutions and the pros and cons of In-House vs. On-Demand IT solutions in the cloud. I hope you find this presentation helpful in reaching what is best for your organization.
For Immediate Release – January 19th, 2015
Cloud Software helps therapists focus on patients not the paperwork
Vestal, New York Jan. 19, 2015. Quantopix Technologies, LLC is proud to announce an agreement with Lifespan Physical Therapy, Occupational Therapy, and Speech and Language Pathology Services, PLLC of King Ferry, NY to develop a cloud based Therapy Practice Management Software to manage their practice that provides physical and occupational therapy and speech and language pathology services.
The original program to manage many aspects of their clinical therapy practice was built in-house at Lifespan and deployed on individual laptops. Lifespan outsourced the effort to migrate this program to a cloud server, allowing their staff to work anywhere while sharing the most up-to-date information through a common database. Now, and with the help of Quantopix Technologies, this project moves to the next level of automation and data management to ensure that clinical therapists remain sharply focused on helping their patients and on perfecting their services.
Quantopix builds on decades of experience in data management and database related projects to help clients make better business decisions, streamline their processes, and enhance their services. “We are very excited to extend our technology services to health care practitioners,” said Al Sabawi, President and CEO at Quantopix. “Unlike normal business data, health related data is highly regulated and has to be managed to a strict standard”
About Quantopix Technologies, LLC
Quantopix provides Software Development & Data Management Solutions for small and medium size businesses. They focus on developing custom data management tools for Work Flow, Data Mining, and Analytics to support strategic business decisions.
Quantopix Public Relations
Quantopix Technologies, LLC
What is the Internet of Things?
Simply put, it is when everyday ‘dumb’ things like your shoes and swimsuit start sending (and possibly receiving) data to or from other devices, wirelessly I am sure, giving information relevant to their status and function. When this communication ties into the Internet, these things can form a web of live data sources known as the Internet of Things. But let us not get ahead of ourselves and get some background first.
We have come to understand what “smart’’ means in smartphones. it’s about being loaded with features typically found on laptops or bigger machines, and even features that once required its own hardware like Navigators and high resolution video cameras. In 2013, mobile phones accounted for 17% of all internet traffic worldwide according to StatCounter.com. It is expected to increase substantially as more heavily populated developing countries improve their Internet infrastructures and reduce connectivity cost. But what does that have to do with The Internet of Things?
Mobile phones have driven leaps in multiple technologies across hardware and software; from miniaturization, cheaper memory, lower power consumptions, to efficient algorithms that offload much of the processing from backend servers to the phones themselves. This mobile device that most of us are attached to, has become a very valuable feed to the rest of the world about our micro environment; reading, measuring, and, when we choose, sharing this micro environment with our private network of friends. This in turn spurred innovations in all types of micro sensors that smartphones makers can add on, sometime as external accessories, to their devices. Sensors like motion measurement, human voice detection, optical sensors, temperature, pressure, acceleration, body vital signs, and of course GPS and altitude to name a few. The advances also added intelligent and efficient software like speech and facial recognition, noise filtering, even machine learning algorithms that automatically build models of what to expect from a sensor and take action when a new reading does not fit the expected input. All of these new innovations were made accessible to everyday consumers at a very reasonable price that is getting cheaper by the day. The lower cost was mainly driven by fierce competition to tap into the smart devices market. It is also because of the mass production of what is known as System-on-a-Chip (SoC) hardware components. These components integrate complex functions in a dedicated microchip and perform them much faster than if done by the main computer processor. These SoC’s created a Chinese buffet of capabilities for device designers to assemble from. In the last couple of years, consumer electronics and appliances manufacturers have been tripping over each other to jazz up their devices with these components to get their customer’s attention and hopefully add incremental value over the competition.
We are now approaching a critical mass of low cost technologies coming together to remove the human from the center of interaction. In other words, just like a car manufacturer can remotely monitor your new car and call you to come for repairs before the engine light flashes, your fridge can text you a list of its contents just as you are entering the supermarket door so you can decide what groceries to buy. Or a shopping cart that adds up the prices of the items in it before you stand in the checkout line. Or better yet, skip the line altogether and wave your credit card as you exit the store and your receipt instantly shows up on your smartphone and logged into your expense ledger. These are not futuristic fantasies, these are current and proven technologies which are not widely implemented yet.
This availability of sensory data from “things” has created a new technology paradigm. Every day functional consumer dumb things like shoes, door keys, swimsuits, pocket wallets, handbags, pens, and school notebooks are candidates for these sensory microchips that “call home” via the nearest Wi-Fi and summit reports to a master program with built-in intelligence to make use of it. This master program is likely running in a secure cloud that has a big mouth to swallow gigabytes of data per second. The idea is, by having all this data in one place, the human who owns these “things” can delegate some management tasks to a software agent to detect events, trigger responses, or just provide alerts and recommendations on what action to take.
The Big, the Messy, and the Meaningless Data
Enter Big Data. You can imagine now if a manufacturer wants to use this technology for its product lines, there has to be an existing infrastructure to handle it. Possibly a “Service Provider for Things” to which the products can connect once they are registered or activated. The owner of these products can then monitor the generated data and possibly select a software to process it, or maybe turn it off when she pleases. Take for example a Nike walking shoes equipped with this technology. It can read a great deal of data every second: your pulse, forces of impact, pressure points, the relative positions of your feet, your location, foot orientation, speed, etc. Now assume Nike will sell a million of these shoes worldwide and you immediately start to see the volume and velocity of data coming out of them. You would think that Nike or some other player must have prepared the grounds to deal with this outflow if there is a value to be gained from it by the end user or Nike itself. We are seeing some of these preparations in infrastructure building up in cloud computing but we have a long way to go yet.
If you are one who likes to surround herself with smart “things” like the Nike shoes above, then your “things” are creating serious network traffic. Collectively, your “things” are now generating massive data that may overlap, send readings that contradict each other, report all sorts of bugs or errors. This becomes a lot messier when the software running at the “Service Provider of Things” attempts to integrate data from your smart things for your personal “Dashboard of things”. Your shoes can be reporting that you are enjoying a walk at 4 MPH at the same time your swimsuit is experiencing a 150 F temperature water. If the software was design to assess your daily exercise activities, it has to decide: Are you waking or are you sitting in a hot tub? Could it be that you put your swimsuit in the washer and went for a walk? Or is this just meaningless data to skip over? Maybe it is time for the master program to interact with you to learn how to deal with these inconstancies. It could text you a question: Hey John, I am confused! Are you walking or in a Hot tub?
A new field of Big Data science has just opened up as you can see. A combination of many disciplines in computer science covering communication protocols, massive data management, machine learning, and user interface to name a few.
The Road to Reality for the IofT
So the technologies are obviously there, cheap enough, and tiny enough to deploy. Where do we go from here? Like an army of well-trained soldiers, equipped and ready to go to battle, these technologies need a great general to lead them. Someone with vision, but also loved and respected by the field captains and the populous alike. Someone with a vast network of partners and supporters that can lend skills and expertise at a twitch of a finger. Someone with massive wealth to spend unabated until the war is won. Of course no one can be that good. However, someone has just stepped into the ring that may have a real shot, Finally!
On June 2nd, 2014 at Apple Worldwide Developer Conference in San Francisco, Apple signaled a clear intention to enter this realm by announcing two programming kits for developers to build on: HomeKit and HealthKit. These two kits will work with Apple’s upcoming release of iOS 8 and are meant to help developers build Apps specifically for “things” at home and for your health and fitness.
The HomeKit allows programmers to write Apps integrating Apple devices with other smart home devices like Smart TVs, Furnaces and Air Conditioners, Smart Refrigerators, Electricity Panels, Security Systems, light switches, and other devices that may come along in the near future. This announcement is significant not just because it comes from the dominant leader in the smart devices market, but also because it is backed by a real functioning infrastructure that promises seamless integration into an existing and well-functioning, although proprietary, “Internet of Apple Things”. The kits are composed of code libraries and instruction manuals to developers describing messaging protocols and how to command and receive responses from other smart devices. This opens the door for mass participation from developers, but more importantly it creates new expectations from end users forcing developers to innovate and investors to back them up.
The Internet of Things is not real yet, at least not the way my buddies and I used to dream about it when I was a fresh programmer 25 years ago. I told my programmer friends then it won’t be long before we are wearing smart baseball hats that read our thoughts and let us communicate our ideas in perfect articulation to whomever we wish without moving a muscle. A hat that quietly reminds us where we left our car keys and the time of the meeting we all try to forget but have to go to. Well, I was wrong about the smart baseball hat, but smartphones and the eyeglasses from Google are a step closer to my dream.
Quantopix Technologies is inviting data analysis professionals, modelers, and analytics enthusiasts to try Quantopix Analytics System (QAS) beta release 0.91. QAS offers easy to use statistical and charting features that are often completed by a single click. There is no download required, and no installation on your PC. QAS is installed in the cloud and uses a web interface to perform complex analysis you usually find in large command-line based systems. Instead of the limited power of the CPU on your PC, QAS harnesses the full computational power of a multi-core distributed system on the server. To get started in the cloud, click here
Rich and Fully Extensible Functions
Accessing Data from Anywhere
If a data source is accessible on the network and connectable using the standard Open Database Connectivity (ODBC) interface, the chances are you can use it in QAS. In this release of QAS, we have tested with Oracle, IBM DB2, and MySQL both local and remote interfaces. We also tested using PDO (PHP Database Objects) successfully. You can also upload any Comma Separated Values (*.csv) file into the QAS internal database and start using it instantly.
Please join us in making QAS the best data analytics platform around. Help spread the word.
Al Sabawi, CEO
Quantopix Technologies, LLC
For QAS gallery of visualization capabilities, see the photos on our Facebook page.