CT Solutions

Canon's LV-7585Large-Venue Projector

The new Canon LV-7585 multimedia projector is a large-venue model designed for the installation market, featuring 6500 ANSI lumens of brightness, a contrast ratio of 1600:1, and standard 1.3x optical zoom lens (or a choice of four different optional interchangeable lenses). Projected image size ranges from 31 to 400 inches (measured diagonally). The LV-7585’s lens is centered on the front panel of the projector, for ease of device placement during installation. The projector features a side-loading lamp for easy access and replacement, plus an auto-winding filter system, which automatically moves the filter element forward to expose a new, clean section of filter when needed. The filter also can be advanced manually using the remote control. MSRP: $9,999.

Advanced Media Design's DMR210eEnhanced Digital Media Recorder

Advanced Media Design, developer of the AV-over-IP collaboration technology MediaPointe, has released the DMR210e digital media recorder. The DMR210e features hundreds of hours of on-board storage in high-definition WXGA resolution, in MPEG-4 format. The device simultaneously streams audio and video content while recording, for live sharing as well as on-demand access. It automatically creates files compatible with an Apple iPod or iPhone, so users can download a recorded presentation through iTunes. Videos recorded with the DMR210e also can be transferred onto an intranet, the internet, or-with MediaPointe’s proprietary CopyMe! technology- immediately downloaded onto a CD-ROM, DVD-ROM, or USB flash drive. MSRP: $14,995.

Protection From Data Breaches

TouchNet Information Systems has launched Seek-N-Secure, a combination of service and technology that guards colleges and universities from data breeches. Seek-N-Secure enables schools to identify payment points throughout a campus; develop a compliance strategy; and leverage patent-pending, "heat-seeking" software to isolate and protect sensitive data (such as credit card numbers, bank account information, and Social Security numbers). The process combines confidential services and software not only to find potentially sensitive files, but also to help identify business practices that contribute to the accumulation of that data. Contact vendor for pricing.

Featured