Market Sectors

block 10


Editorial Features

Mosquito Control Serving Fairfield and Westchester County ny and ct

We all look forward to summer, especially the cookouts, lazy Saturday afternoons, and other fun under the warm sun right in our own backyard. Just like the song says, Summertime and the living is easy. But if you have mosquitoes, all that easy living isn’t so easy. Red Carpet Mosquito Control can help you get your backyard back so you can get on with your summer fun.

Home mosquito control is one of the toughest outdoor concerns for most homeowners because a mosquito infestation is not only annoying, its also a big health concern. Anyone who has ever been bitten by one of these tiny pests knows the aggravation of the red, itchy skin and knows there are more to come if they don’t do some kind of mosquito control.

Even a few mosquitoes buzzing around the yard are enough to put a damper on those backyard activities.

If you have mosquitoes, there are some basic steps to take until you can get your mosquito squad under control. From removing mosquito habitats to preventing bites, there are things any homeowner can do to minimize the impact until more permanent home mosquito control services can be put in place.


Mosquito Habitats

Mosquitoes thrive where there is standing water, their favorite place to lay their eggs.

Getting rid of some of these habitats is a great first step for effective mosquito control.

  • Clean out those gutters. Gutters that have debris and other obstructions allow water to stand for long periods of time, creating a perfect place for mosquitoes to flourish.
  • Bird baths, rain barrels, and potted plant trays are other prime locations for water to stand. Emptying these at least once a week will go a long way towards eliminating mosquito habitats.
  • Any type of swimming pool can be just one huge nursery for all those mosquito eggs, so make sure to keep that water circulating or change out the water in smaller pools.
  • Toys left out in the yard, old tires, and many other places where water can stand should be drained or dumped. A thorough inspection of your yard should help you find many of these problem areas and will give you a good start on getting things under control.

Avoiding Bites

Mosquito bites are certainly annoying, but also potentially dangerous. Mosquitoes carry Zika, West Nile, Malaria and other viruses that are harmful to the health of humans and animals. A few precautions, though not very summer-like, should minimize the danger until mosquito control services are in place.

  • Wearing long-sleeved shirts, long pants, and socks go a long way in preventing bites simply because there is a lot less skin for mosquitoes to bite. Tucking your pants into your socks is another step you can take.
  • Use spray mosquito repellents around the yard, especially in areas you suspect may have, or have had, standing water.
  • Apply EPA-approved repellents to exposed skin making sure you follow the label directions.
  • Set up some citronella candles, torches, or similar type repellents for broader home mosquito control around decks and other places where you spend time.
  • Replace outdoor lights with yellow bulbs wherever possible because they have been shown to be less attractive than regular white lights.
  • To keep mosquitoes outside where they belong, be sure to have screens on any open windows, and make sure doors stay closed whenever possible.

Red Carpet Mosquito Control provides mosquito and tick control to ny and ct.

We service Rye, Port chester, Scarsdale, harrison, Larchmont, purchase, armonk, greenwich, stamford, darien, easton, fairfeild, westport, and weston.


Red Carpet Mosquito Control
44 Amogerone CrosswayGreenwich, CT 06830
(203) 900-4466



Connecticut gears up for Lyme season

It started with neck and foot pain.

Barbara Meyer-Mitchell of Norwalk didn’t think much of it, and she did not connect it to symptoms that followed.

“It was a cascade of: every six months to a year, I had a weird new thing,” she said. “I went to a specialist for each problem, and they weren’t linking them together.”

Her primary care doctor in Westport tested her seven times for Lyme disease, but each test returned negative. It wasn’t until nearly a decade after her first symptoms appeared that she tried a new method being developed to detect Lyme.


Today’s most common Lyme test looks not for the disease-causing organism itself but for the specific antibodies people’s immune systems manufacture in response. Those antibodies were not in Meyer-Mitchell’s bloodstream, perhaps because she had had the disease for so long. But the long squiggly spirochetes causing it were.


Meyer-Mitchell still remembers the swell of emotion she felt upon learning the diagnosis — finally, there was an explanation for the host of symptoms her team of specialists had not been able to solve.

The Advanced Laboratory Services Inc. lab in Pennsylvania, where the test was conducted, has had difficulty satisfying the scientific community that its test is reliable, but researchers agree on the importance of a test that can detect the disease itself. That’s why, in a Danbury laboratory, a team of Western Connecticut Health Network researchers are pursuing a method of identifying the disease by scanning for its genes.


In addition to being to diagnose people with Lyme whose bodies have not created antibodies, such a test allows people to diagnose the disease earlier (it generally takes two to three months before tests can detect antibodies) and to tell whether the disease has been successfully treated (antibodies can linger in the blood even after the organisms causing them have disappeared, creating potential for false positives).

In the microscope room, Lead Research Associate Srirupa Das watched a video the of the bacteria wiggling across a Petri dish. She said that with the antibody test, “You miss a lot of positive cases. And once it detects it, it is already late, you are already infected with Lyme disease for two or three months ... By that time, the disease has already spread.”

Das said that being able to diagnose and start treatment early increased a patient’s chances of being cured. “That is why our research is so important.”

Paul Fiedler, a doctor researching Lyme disease at the Western Connecticut Health Network, pointed to a poster showing their team’s results.

“This is when we got really excited,” he said, indicating a chart comparing results from a traditional test to the results of the WCHN’s test as performed on 19 patients.

For the regular Lyme test, 32 percent of patients tested positive at the time of diagnosis, with that number increasing as patients returned to get retested two and six weeks later. In contrast, 63 percent of the patients tested by WCHN tested positive at diagnosis, and that number decreased over subsequent weeks as patients were treated.

However, even after three weeks of antibiotics, 44 percent of the WCHN patients still tested positive. “They’re supposed to be cured, right,” Fiedler said. “That’s what we want to follow.”

There is controversy over what causes Lyme disease symptoms to persist after treatment, Fiedler explained — some believe that it’s a prolonged infection (chronic Lyme disease), while others believes it’s a prolonged immune response causing problems.

Since an antibody-based test could not tell the difference between the two, WCHN’s gene-based test has the potential to finally answer the question. WCHN also home to the Lyme Disease Biobank, which has been collecting biological samples from people with Lyme disease since 2010. Fiedler said that another researcher had created a test for a number of tick-borne illnesses from a drop of blood, which could be used to look for patterns of how Lyme disease interacts with other infections.

The WCHN’s research, as Director of Public Relations Andrea Rynn, pointed out, is funded through philanthropy, and so the team recently launched a fundraising campaign, Taking Aim at Lyme ( Fiedler hopes the campaign will raise both funds and awareness.

Lyme season is gearing up, as young ticks — the smallest and most difficult to notice — are looking for hosts and people are spending more time outdoors.

At Wah Wah Taysee Scout Camp in North Haven, nestled near the foot of Sleeping Giant State Park, Ranger Ross Lanius came home Monday evening after clearing tree damage caused by the recent storm.

He pulled off four ticks.

“You just got to be careful and check yourself every night,” he said.

Experts say a tick’s bite needs to last over a day before the infection sets in. But spotting ticks can be harder than it seems.

The other night, Lanius thought he had gotten them all and readied to relax.

“And Lordy be, I sit down and there’s one on my other wrist,” he recalled.

Kirby Stafford, chief scientist and state etymologist at the Connecticut Agricultural Experiment Station in New Haven, tests for ticks in the environment by dragging a square yard of polar fleece along vegetation (he dresses in insecticide-treated clothes for protection) in addition to asking the public to send in ticks they find.

“Usually we get about 3,000 ticks submitted by the public, the majority from Fairfield and New Haven counties,” Stafford said. A year ago, following a very mild winter, he had roughly 5,000 ticks.

As for whether this year will be a bad one, he says it’s too early to tell. While this winter was also mild, it was long, and he says tick submissions in early 2018 weren’t as high as in 2017. What he can say is that he had seen an increase in Fairfield County’s submission of Lone Star ticks.

“So it’s not just the deer ticks or dog ticks that people have to look out for,” he cautioned.

If you find a tick, you can submit it to your local health department for testing. Theresa Argondezzi, a health educator at the Norwalk Health Department, explained that anyone can come in with a tick during normal health department hours. There, a scientist will identify the tick and send deer ticks to Stafford’s office in New Haven.

Argondezzi said her department send ticks off to the state for free for Norwalk residents (for non-Norwalk residents, it’s $15). She cautioned the tick should not be smooshed, taped or covered in any type of substance — instead, they should be sealed in a contained or plastic bag, then packaged in a padded envelope.

The WHCN Lyme Disease Biobank accepts samples from anyone who has ever been diagnosed with Lyme disease, regardless of location — those interested in participating should email.

“When you think about this, this is still a relatively new disease,” said Rynn of WHCN. Lyme was discovered in Lyme, Connecticut, in the 1970s.


FOr those looking to protect themselves from ticks red carpet Mosquito control is the answer.

Red Carpet Mosquito Control
44 Amogerone CrosswayGreenwich, CT 06830
(203) 900-4466


Meltdown and Spectre - Updated Threat Information - Latest Information - SANS DFIR WEBCASTS

Two new vulnerabilities (Meltdown and Spectre) were introduced that are in the architecture of processors in nearly every computer and other devices using CPUs. Code to exploit these vulnerabilities in some cases is now publicly available and we can expect that more capable/modular code will be released soon. During this webcast, we'll walk through how the vulnerabilities work, what is being done to patch them, the performance impacts of patching, and probable exploit scenarios for the vulnerabilities. 

Approaching video forensics with fresh intelligence

New AI technology that mimics the human brain can help law enforcement and intelligence organizations rapidly identify patterns, objects and faces in large amounts of archived and live streaming video


Video is a critical element in crime prevention and investigation, yet current law enforcement systems are increasingly unable to cope. The sheer volume of surveillance material captured and stored every day is staggering, and set to rise dramatically. Adding more cameras to gather more information will only ever be useful if processes to search and analyze the mountain of data keep pace. As it stands vital information may be missed because the vast majority of video is simply never viewed. 


Information technology firm Cisco estimates than in 2021 it would take more than 5 million years to watch the amount of video traffic across the globe – each month. Market researcher IHS forecasts that 127 million surveillance cameras and 400,000 body-worn cameras will ship this year, in addition to the estimated 300 million cameras already deployed. By 2020 it is predicted there will be more than 1 billion cameras operated by smart cities worldwide, providing 30 billion frames of video per day. Internet video surveillance traffic alone increased 71 per cent in 2016 according to Cisco, and is set to increase sevenfold by 2021. Globally, 3.4 per cent of all video traffic crossing the internet will be video surveillance.


Give that a major problem for surveillance operators is directed attention fatigue, where the brain naturally alternates between periods of attention and distraction, it would require a superhuman effort to identify and classify all these images. What is required is a system that is never distracted and can work in conjunction with people to reduce errors, which is what artificial intelligence-driven video systems promise. 


AI in video surveillance can potentially deliver four times the performance of conventional video search – in contrast to human vigilance, which studies have shown can degrade by 95 per cent after about 20 minutes.


The cost of deep learning


Since 2012, when AI video analytics took off, the systems trained to recognize objects and facial IDs from different types of image have proved expensive to run and slow to compute, and require large datasets to generate results. These systems, which are based on convolutional neural networks (CNNs), employ an AI technique known as ‘deep learning’. They excel at churning through data but lack the ability to refine and react to streams of information gathered from the surrounding environment – which the human brain is extremely good at.


What’s more, CNNs exhibit limitations including poor noise immunity, particularly when random pixels appear in an image due to noisy sensors or lens contamination. They can serve false classifications if the network becomes confused – for example by someone wearing glasses, or if it cannot find a new face in a crowd without a large set of labelled images relating to that face being added to the database. The network parameters of CNNs need careful adjustment, and even then the accuracy rate for correct image classification may not be sufficient for video surveillance applications.


Spiking neural networks


A relatively new approach is the spiking neural network (SNN), which simulates and models the different aspects of the human brain’s operation much more closely than a CNN.


For instance, a police department that is looking for a suspect in live video streams does not have thousands of images of that suspect; nor does it have weeks to train a CNN system. In an SNN-based system, it can find patterns and people in videos in milliseconds and from a single image – which, importantly, can be as small as 24 x 24 pixels: it doesn’t need to be high definition. The system excels in recognition in low-light, low-resolution, noisy environments, making it ideal for the large amount of previously installed video surveillance systems.


Unlike current CNN technologies that require extensive pre-labelled datasets and expensive cloud-based training and acceleration, an SNN system can be implemented in software with traditional computer processors (CPUs) and trained on-premises. The one-shot technology learns in real time and requires only modest processing power – typically a Windows- or Linux-based x86 desktop computer or server – as well as consuming little energy.


This enables a greater number of law enforcement organizations to capitalize on the opportunities offered by AI. It means AI algorithms can be used with legacy systems without requiring expensive hardware or infrastructure upgrades, and it can be deployed in the field in highly secure environments that may not have cloud connectivity.


Tasks that seemed impossible for machines just a few years ago are becoming almost routine, and SNN technology has perhaps the greatest potential to bring valuable new capabilities into mainstream automated video surveillance today.


About the author:

Bob Beachler is Senior Vice President of Marketing and Business Development at BrainChip. He can be reached at: [email protected]

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information

In 2016 almost 1.1 billion identities were stolen globally.  This number is up dramatically from a reported 563.8 million identities stolen in 2015.   In addition, the same Symantec Internet Security Threat Report placed the United States at the top of the list for both the number of breaches by country (1,023) and the number of identities stolen by country.

New York State’s Division of Financial Security and other government entities around the globe have been monitoring this increased cybercriminal threat and determining means to help protect the private information of individuals as well as the information technology systems of regulated organizations.

New York State’s Division of Financial Security released new cybersecurity requirements (23 NYCRR 500), directly affecting the way that financial data is managed going forward. Applicable to financial services companies operating in New York State, these regulations declare that, on an annual basis, financial firms are required to prepare and submit a Certification of Compliance with the NY DFS Cybersecurity Regulations to the superintendent, commencing on February 15, 2018.

The scope of this legislation describes measures related to: cybersecurity programs and policy, personnel, resources and training, penetration testing and assessments, audit trails, access privileges, application security, third parties, NPI (Non Public Information) encryption, data retention, incident response and notification.

Among other requirements, this regulation dictates that companies declare any cyberattack to the superintendent within 72 hours. In the past, many companies chose to not disclose information related to these hacking exposures because much of their cost stems from damage to brand reputation and the necessary steps required to rebuild the trust of their clients post-attack.

Similar to the NY DFS proposal, the Federal Reserve Board (FSD), the Office of the Comptroller of the Currency (OCC), and the FDIC issued an advance notice of proposed rulemaking (ANPR) on enhanced cyber risk management and resilience standards for large banking organizations.  Additionally, the states of Vermont and Colorado have released laws pertaining to cybersecurity and the improved protection and monitoring of data. 

Two technologies specifically called out in the new NYS DFS Cybersecurity requirements, Multi-factor Authentication (MFA) and Risk Based Authentication (RBA), are key methods of complying with regulation and defending against attacks. 

Multi-factor authentication is defined as using at least two factors to authenticate a person, generally a combination of:

  • “Something I Have” — this could be a hardware token, a mobile soft token, etc.
  • “Something I Know” — like a PIN code, a password, and
  • “Something I Am” — such as a fingerprint or face recognition.

With MFA, the two factors are fully independent from each other (i.e. the failure of one factor would not compromise the other one).

Risk based authentication is the capacity to detect anomalies or changes in the normal use patterns of a person as part of the authentication process, require additional verification if an anomaly is detected to avoid any breach.

It is more efficient to avoid hacking and cyber-attacks in the first place by focusing attention on the security of the applications being accessed, both externally and internally.  To learn more about these regulations and how similar standards will impact you, visit

Top 10 Considerations for Choosing the Right Secure Issuance Solution

You need new ID badges, and you know that you’d like to be able to have these “smart cards” enable access to your building and/or your network – or perhaps even other systems like transit or cashless vending – but where do you start? What are your options for printing (and encoding) badges such as these?   Are there other things to consider before making a purchase?

HID Global can help. The white paper, Top Ten Considerations for Choosing the Right Secure Issuance Solution, outlines the top ten things to look for when selecting a secure issuance provider to help you find a solution that meets your specific needs.

Please click here for your free copy of this white paper.

Lessons learned from WikiLeaks

Adi Ruppin

WikiLeaks is only one example (albeit a major one) in a chain of data leakage incidents in recent months. Looking back over the last year or so, you might also recall the posting of TSA screening manuals online, the unintentional release of numerous product specs, as well as many other incidents.

Why are we seeing so many leaks lately? Here are three reasons:

Reason 1: The need to share

Leakage is in no small part due to the fact that data sharing and collaboration have become a “must” in today’s increasingly mobile and global world. This more complex world makes it easier to share and collaborate, but also makes it exceedingly easy for information to leak.

Reason 2: Ease of use

This is the usual security-versus-connectivity paradox. You need to find the optimal solution that balances security and connectivity. You cannot lock down all documents in a vault and not share them with anyone. Nor can you indiscriminately send them via unprotected e-mail. A major reason why documents leak is that most existing solutions are extremely cumbersome to use. They involve installing servers, agents, defining policies and more. And, if something is hard to use, chances are people will not use it.

Reason 3: The right solution for the problem

There is a lot of confusion in the market today, with many different product categories available, such as data loss prevention (DLP), enterprise digital rights management (DRM), e-mail encryption, virtual data rooms and many others. For example, just because you’re using encrypted e-mail doesn’t mean your information will not leak, as this type of protection typically applies only when the document is in transit. As soon as it gets to its destination, it can be freely forwarded to an unauthorized party. It is important to make sure that your solution is solving the right problem.

So what can you do?

In our world, without walls, we need to assume that documents must be shared across organizational boundaries and across different platforms, such as PCs and mobile devices. So, it is pointless to try to protect some nonexistent perimeter. Ultimately, the only solution is to embed security and controls into the documents themselves. New technologies allow document owners to maintain control and track files throughout the documents’ lifecycles. Such solutions allow users to control who views documents and who prints them, and even lets them wipe files completely at any time; even after they have been downloaded.

Adi Ruppin is vice president of marketing and business development for WatchDox, a provider of document protection, control and tracking solutions. Ruppin can be reached at:

[email protected]




Henry Bros. Electronics, Inc. completes the merger with Kratos Defense & Security Solutions, Inc.

Henry Bros. Electronics, Inc. (HBE), a turnkey provider of technology-based integrated electronic security solutions, announced on Dec. 16 that on December 15, after receiving the required stockholder approval, it completed the previously announced merger transaction with Kratos Defense & Security Solutions, Inc.

The affirmative vote of the holders of a majority of the outstanding shares of Henry Bros. common stock was required to approve the merger transaction with Kratos. According to the final vote tally of shares of Henry Bros. common stock, approximately 79 percent of the outstanding shares of Henry Bros. common stock, as of November 2, 2010, the record date for the annual meeting, was voted to approve the merger.

Under the terms of the merger agreement, Henry Bros.'s stockholders will receive $8.20 in cash, without interest and less any applicable withholding taxes, for each share of Henry Bros. common stock they hold.

As of December 16, 2010, the stock of Henry Bros. will no longer be quoted on The NASDAQ Capital Market.



Applied DNA Sciences to redesign its Web site

Applied DNA Sciences announced on Dec. 22 that it has begun a “comprehensive redesign” of its Web site, which will begin with a reworked front page.

“Our company blog has similarly been reimagined to give flesh and blood detail to our story,” wrote James Hayward, the company’s chairman, president and CEO, in an e-newsletter.

Hayward invited visitors to the revamped Web site to read a wide variety of blog entries, and then contribute to the company’s redesign effort by indicating the types of information they would like to see. “More in-depth information on our fast-growing product line?” asked Hayward. “More success stories? More investor-oriented features and data?”

Hayward said a formal online reader survey will soon follow.

AS&E receives $3.8 million order for ZBV Military Trailers

ZBV Military Trailer

American Science and Engineering, Inc., a supplier of X-ray detection solutions, announced on Dec. 22 the receipt of a $3.8 million order from an unidentified government customer for multiple ZBV Military Trailers.

The ZBV Mil Trailer is a ruggedized version of the company’s Z Backscatter Van (ZBV) built onto a standard military trailer. Security officials use the ZBV Mil Trailer for screening vehicles, containers and other cargo for terrorist threats and contraband, AS&E said in a recent press release.

“This first ZBV Mil Trailer order for this service branch of the Armed Forces comes as a direct result of its success with active fielded systems,” said Anthony Fabiano, AS&E’s president and CEO. “The ZBV Mil Trailer has demonstrated its effectiveness for inspecting vehicles and cargo for explosive threats and contraband in harsh terrain.”



Recent Videos

IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.
HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...