Geisel Software http://geisel.software/rss.xml en Endeavor Robotics http://geisel.software/clients/endeavor-robotics <span>Endeavor Robotics</span> <div class="field field--name-field-client-logo field--type-image field--label-hidden field--item"> <img src="/sites/default/files/2018-09/Endeavor%20Robotics%20Logo_228x129.jpg" width="228" height="129" alt="Endeavor Robotics Logo" typeof="foaf:Image" class="img-responsive" /> </div> <span><a title="View user profile." href="/users/tgeisel" lang="" about="/users/tgeisel" typeof="schema:Person" property="schema:name" datatype="">tgeisel</a></span> <span>Mon, 09/17/2018 - 23:37</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> </p> <p>Endeavor Robotics is the world’s leading provider of battle-tested Unmanned Ground Vehicles (UGVs). We have delivered more than 7,000 robots to customers in over 55 countries. We partner with U.S. and international defense forces, law enforcement, energy and industrial users to design and build innovative robotic solutions that support a wide range of missions.</p> <p>Largest robot supplier to the U.S. Department of Defense; managing multiple Programs-of-Record; Combat-proven products deployed in Afghanistan, Iraq, and other areas of conflict.</p> <p>Developing innovative robotic solutions and customer-driven next generation capabilities; Applying latest in technology, including AI, deep learning, and IOP to new mission needs; Partnering with leading tech firms for advanced radio, sensor and payload integration.</p> <p>Design, Manufacturing and Integration Experts; Robots built under ISO 9001 processes; American design/manufacturing; American-owned.<br />  </p> </div> <section> </section> Mon, 17 Sep 2018 22:37:07 +0000 tgeisel 211 at http://geisel.software http://geisel.software/clients/endeavor-robotics#comments U.S. Dept of Veterans Affairs http://geisel.software/clients/us-dept-veterans-affairs <span>U.S. Dept of Veterans Affairs</span> <div class="field field--name-field-client-logo field--type-image field--label-hidden field--item"> <img src="/sites/default/files/2018-09/Veteran%20Affairs%20Logo%20210x129.jpg" width="210" height="129" alt="Veterans Affairs Logo" typeof="foaf:Image" class="img-responsive" /> </div> <span><a title="View user profile." href="/users/tgeisel" lang="" about="/users/tgeisel" typeof="schema:Person" property="schema:name" datatype="">tgeisel</a></span> <span>Mon, 09/17/2018 - 23:21</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> </p> <p>The US Department of Veterans Affairs provides patient care and federal benefits to veterans and their dependents.</p> <p><strong>Mission Statement</strong><br /> To fulfill President Lincoln's promise "To care for him who shall have borne the battle, and for his widow, and his orphan" by serving and honoring the men and women who are America's veterans.</p> <p><strong>VA Core Values and Characteristics</strong><br /> Core values describe an organization's culture and character and serve as the foundation for the way individuals in an organization interact with each other and with people outside of the organization. The Department of Veterans Affairs Core Values and Characteristics apply across the entire VA enterprise.</p> </div> <section> </section> Mon, 17 Sep 2018 22:21:35 +0000 tgeisel 210 at http://geisel.software http://geisel.software/clients/us-dept-veterans-affairs#comments Medica Corporation http://geisel.software/clients/medica-corporation <span>Medica Corporation</span> <div class="field field--name-field-client-logo field--type-image field--label-hidden field--item"> <img src="/sites/default/files/2018-09/Medica_Corp_Logo_204x129.jpg" width="204" height="129" alt="Medica Corporation Logo" typeof="foaf:Image" class="img-responsive" /> </div> <span><a title="View user profile." href="/users/tgeisel" lang="" about="/users/tgeisel" typeof="schema:Person" property="schema:name" datatype="">tgeisel</a></span> <span>Mon, 09/17/2018 - 22:39</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>Medica Corporation manufactures simple-to-use, highly reliable diagnostic blood testing analyzers. Actively engaged in developing new technology, Medica specifically designs products to enhance productivity and the quality of care in small to medium-size in vitro diagnostic laboratories. Medica’s clinical chemistry, blood gas, electrolyte, and hematology analyzers are focused on the global need to lower health care costs.</p> </div> <section> </section> Mon, 17 Sep 2018 21:39:50 +0000 tgeisel 209 at http://geisel.software http://geisel.software/clients/medica-corporation#comments Congruity 360 http://geisel.software/clients/congruity-360 <span>Congruity 360</span> <div class="field field--name-field-client-logo field--type-image field--label-hidden field--item"> <img src="/sites/default/files/2018-09/Congruity%20360%20Logo_LARGER_280X147.jpg" width="280" height="147" alt="Congruity 360 Logo" typeof="foaf:Image" class="img-responsive" /> </div> <span><a title="View user profile." href="/users/tgeisel" lang="" about="/users/tgeisel" typeof="schema:Person" property="schema:name" datatype="">tgeisel</a></span> <span>Mon, 09/17/2018 - 22:17</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>Congruity360 is a comprehensive solution provider for complete data lifecycle management.</p> <p>As a single-source managed solutions provider, we offer a comprehensive portfolio of services to enable lifecycle management of enterprise IT infrastructures. Our operation only succeeds when we provide guidance and solutions derived solely from practical experience and we recognize that our team’s hands-on experience and training is our most valuable asset.</p> <p>We also recognize that data security is vital to the operational success of an organization, and this is where we come in to help! We understand the challenges that IT professionals face as businesses scale, like the needs for increased and fast-paced data growth, decreased time to market, and expanded infrastructure and storage capacity.</p> </div> <section> </section> Mon, 17 Sep 2018 21:17:53 +0000 tgeisel 208 at http://geisel.software http://geisel.software/clients/congruity-360#comments Why IoT Security Must Be Built-in From the Start http://geisel.software/blog/why-iot-security-must-be-built-start <span>Why IoT Security Must Be Built-in From the Start</span> <div class="field field--name-field-header-image field--type-image field--label-hidden field--item"> <img src="/sites/default/files/2018-03/bigstock%20Colorful%20Painted%20Door%20Padlock-800x431-108956531.jpg" width="800" height="431" alt="Colorfully painted wooden door with padlock" typeof="foaf:Image" class="img-responsive" /> </div> <span><a title="View user profile." href="/users/geisel" lang="" about="/users/geisel" typeof="schema:Person" property="schema:name" datatype="">geisel</a></span> <span>Mon, 03/19/2018 - 21:19</span> <div class="field field--name-field-blog-category field--type-entity-reference field--label-hidden field--item">128</div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p dir="ltr">Developments within the Internet of Things (IoT) space are happening at tremendous speed, but the pace of this change creates challenges from a security standpoint.</p> <p>Recent research from Capgemini Consulting found most organizations are not providing adequate security and privacy safeguards within their IoT products.</p> <p>Much of this is a result of a lack of specialized security skills, but also glaring inefficiencies within the IoT product development process. Capgemini’s survey found only 48 percent of companies focus on securing their IoT products from the very beginning of product development.</p> <p>This is potentially disastrous. Given the expanding potential attack base being created by the huge growth in connected devices, security needs to be just as much at the heart of any IoT development as the product’s basic functionalities.</p> <p>Stopping hackers, and preventing holes from being left in any IoT system, is something that must be thought out from the very beginning. This goes beyond even the system itself, and how it connects devices together and to the cloud. Developers need to think even further ahead. For example, they need to plan how they are going to carry out necessary firmware upgrades down the line in a secure manner.</p> <p>Ensuring security is woven into the product development should not be too difficult. Security is a customer’s major concern when it comes to IoT, and ensuring they are adequately protected can be key to future sales and revenues. The security solutions are out there, manufacturers just have to make sure they use them.</p> <p>This is slightly complicated by the fact that, because the industry is still in its early stages, people are still figuring security out. There are so many companies coming up with IoT solutions, that we are yet to have any one-stop security solutions because of the diversity of devices.</p> <p>This means that what secures one device will not necessarily be sufficient for the next device because it might be completely different. Plus, each device has so many different aspects to it - say Bluetooth, or Wi-Fi, or radio - that they cannot all fold into a solution.</p> <p>Nonetheless, the solutions are out there, and they must be built into IoT products at the earliest stage. Nordic, for example, has software on its devices that conducts encrypted firmware uploads. Those are starting to emerge for a variety of aspects of IoT devices. So when commencing your top-level design, you need to look at the particular things that should be secured on each device, and make sure they are tackled from the start.</p> <p>This will obviously depend on what components are involved in each case, on a client-by-client basis. There is no one solution to IoT security, it is different to every device. But ensuring you have in-built the security solutions from the very beginning will ensure it is not an ongoing burden for your company, and will save time and aggravation in the long run.</p> <p>Don’t get caught unaware. When you start mapping out your product functionality, map out how you propose to deal with security every step of the way, identifying the solutions that work for each particular issue. Your client, and your business, will thank you in the long term.</p> </div> <div id="field-language-display"><div class="form-item js-form-item form-type-item js-form-type-item form-item- js-form-item- form-group"> <label class="control-label">Language</label> English </div> </div> Mon, 19 Mar 2018 21:19:26 +0000 geisel 204 at http://geisel.software Consumers Need to Get Wise to IoT Security http://geisel.software/blog/consumers-need-get-wise-iot-security <span>Consumers Need to Get Wise to IoT Security</span> <div class="field field--name-field-header-image field--type-image field--label-hidden field--item"> <img src="/sites/default/files/2017-10/Bigstock%20-%20Consumer%20Shopping%20-%20800x431.jpg" width="800" height="431" alt="Abstract of consumers in mall area" typeof="foaf:Image" class="img-responsive" /> </div> <span><a title="View user profile." href="/users/geisel" lang="" about="/users/geisel" typeof="schema:Person" property="schema:name" datatype="">geisel</a></span> <span>Wed, 10/11/2017 - 18:01</span> <div class="field field--name-field-blog-category field--type-entity-reference field--label-hidden field--item">128</div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>Too many consumers of Internet of Things solutions do not pay enough attention to security. This level of apathy may have serious repercussions down the line.</p> <p>The research bears this out. An opinion poll by the US Chamber of Commerce’s Technology Engagement Center found that the majority of IoT consumers rely wholly on device manufacturers to detect threats and safeguard them against malicious activity. &nbsp;</p> <p>In the UK, similar research by tech firm Canonical found almost half of people are not even aware of the dangers surrounding IoT, ignorant of the fact that their devices could be targets for hackers.&nbsp;</p> <p>Almost 40 percent of people say they are not “sufficiently aware” of IoT security dangers, while 79 percent say they have never even read a news article focused on these issues. Of even more concern, the majority of people say their distrust of IoT security has not grown over the last year.</p> <p>This demonstrates that those educational campaigns on the risk of IoT devices are not hitting home. This failure to take security seriously on the part of the consumer could have serious repercussions for the industry as a whole.</p> <p>Firstly, as the Canonical research suggested, the lack of awareness of security issues on the side of consumers means the majority are failing to adequately secure their devices. A shockingly low 31 percent of consumers said they update their devices when updates are released by manufacturers. 40 percent have never, ever, updated their firmware.</p> <p>This obviously comes with huge associated risks. Devices are therefore more susceptible to attack. Such hacks can have dire consequences for users, and could harm the industry in the long-term once people are suddenly made aware in the worst possible way of the potentially catastrophic effects of unsecured connected “things”.</p> <p>The lack of consumer awareness over security places the burden of responsibility on manufacturers. Yet, in many cases, this is not working out for the best. Many companies fail to ensure security is treated as a paramount part of the IoT product development cycle.</p> <p>Other companies fail to ensure they will be able to run future updates on their devices in a secure way. These mechanisms need to be built in from the start, but in a way that they cannot be compromised. Too often this aspect of security is also overlooked.</p> <p>The industry is still in the process of getting security right. The solutions are out there, you just need to know to use them. That is why we need to get consumer education right, to ensure the security and sustained growth of the IoT industry.</p> <p>Aside from ensuring they update their devices, there is not alot consumers can do security-wise. But while they continue to lack understanding of the potentially disastrous repercussions of lax IoT security, manufacturers do not have a financial imperative to build in security solutions.</p> <p>Consumers should ensure they pay attention to things like security reviews for IoT products. This serves a dual purpose. Not only will it ensure their connected devices are secure, but it will place the responsibility back with the manufacturers to ensure they are up to scratch. This way, we can make certain we get security right and allow the industry to fulfill its potential.</p> <p dir="ltr">&nbsp;</p> </div> <div id="field-language-display"><div class="form-item js-form-item form-type-item js-form-type-item form-item- js-form-item- form-group"> <label class="control-label">Language</label> English </div> </div> Wed, 11 Oct 2017 17:01:11 +0000 geisel 203 at http://geisel.software IoT Security a Challenge As Device Numbers Rise http://geisel.software/blog/iot-security-challenge-device-numbers-rise <span>IoT Security a Challenge As Device Numbers Rise</span> <div class="field field--name-field-header-image field--type-image field--label-hidden field--item"> <img src="/sites/default/files/2017-09/Bigstock%20Security%20a%20Challenge%20800-431.jpg" width="800" height="431" alt="Padlocks with Binary background of orange and blue" typeof="foaf:Image" class="img-responsive" /> </div> <span><a title="View user profile." href="/users/geisel" lang="" about="/users/geisel" typeof="schema:Person" property="schema:name" datatype="">geisel</a></span> <span>Tue, 09/26/2017 - 20:01</span> <div class="field field--name-field-blog-category field--type-entity-reference field--label-hidden field--item">128</div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p dir="ltr">It is indisputable that the Internet of Things (IoT) is the next Industrial Revolution, given the impact it will have on the way people, businesses and governments live and work.</p> <p dir="ltr">Boston Consulting Group (BCG) predicts $267 billion USD will be spent on IoT technologies, products, and services within 3 years.</p> <p dir="ltr">IoT, then, is the future. But it is also very much the present. As many as 8.3 billion connected things are in use this year, according to Gartner, up 30 percent from last year. The already sizeable proliferation of connected devices means we have to get security right now if we are not to face greater problems down the line.</p> <p dir="ltr">For all the opportunities inherent in IoT, it comes with its fair share of dangers. The growing number of connected devices opens up new opportunities for hackers, making it vital that IoT device manufacturers ensure they have built-in security functions to protect their customers.</p> <p dir="ltr">The problem is that there are so many potentially vulnerable points, and so much potential negative impact. Holes in the security systems of IoT devices can put consumer data, corporate IP, and a firm’s entire IT infrastructure at risk.</p> <p dir="ltr">There are various aspects to this. Manufacturers need to ensure devices - possibly pre-hacked - that come into the network cannot compromise it. We need to make sure an IoT device cannot be used as a trojan horse to get into other devices. We need to make sure someone can’t buy one of our devices and use it to hack others.</p> <p dir="ltr">But it is not just about the devices. The device connects to the cloud, which opens up a whole new world of possibilities for hackers, so we need to focus on security there too. Data being transferred needs to be encrypted, though this is an area that has generally been sorted out.</p> <p dir="ltr">Meanwhile, even after these secure devices have been rolled out to the market, they are going to need their firmware to be updated at some point in the future. This needs to be secure to ensure only the manufacturer can carry out updates, and so these mechanisms need to be built in from the start.</p> <p dir="ltr">These issues need to be adequately addressed if the industry is to develop as predicted. According to research conducted by management consultancy firm Capgemini, 71 percent of executives say security concerns will influence purchase decisions on IoT products.</p> <p dir="ltr">Of even more concern, only 33 percent of executives believe IoT products are highly secure from cyber security attacks. In spite of this, less than 50 percent of organizations provide privacy-related information regarding their IoT products, and only 48 percent of IoT companies focus on security from the start when designing their products.</p> <p dir="ltr">This dangerous lack of emphasis was demonstrated late last year when a distributed denial-of-service (DDoS) attack against DYN’s DNS infrastructure saw a number of major sites taken offline, including Spotify and Twitter. This is something that could happen time and time again if we don’t get security right.</p> <p dir="ltr">The industry is still at an early stage, and still getting to grips with challenges such as security. But with the IoT space expected to develop at a dazzling pace, now is the time to make sure we make the security of our devices - and therefore our clients - a central plank of the development of the sector.</p> </div> <div id="field-language-display"><div class="form-item js-form-item form-type-item js-form-type-item form-item- js-form-item- form-group"> <label class="control-label">Language</label> English </div> </div> Tue, 26 Sep 2017 19:01:16 +0000 geisel 202 at http://geisel.software Tackling Security Issues With the Internet of Things http://geisel.software/blog/tackling-security-issues-internet-things <span>Tackling Security Issues With the Internet of Things</span> <div class="field field--name-field-header-image field--type-image field--label-hidden field--item"> <img src="/sites/default/files/2017-03/Tackling%20Security%20Issues%20Hoodie%20800x431%20Final.jpg" width="800" height="431" alt="Hacker With Abstract Blue Background" typeof="foaf:Image" class="img-responsive" /> </div> <span><a title="View user profile." href="/users/geisel" lang="" about="/users/geisel" typeof="schema:Person" property="schema:name" datatype="">geisel</a></span> <span>Tue, 04/18/2017 - 04:10</span> <div class="field field--name-field-blog-category field--type-entity-reference field--label-hidden field--item">128</div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p dir="ltr">The Internet of Things is big, and getting bigger. Breakthroughs in technology, falling costs, and a growing market mean it is an increasingly exciting space to get into. Yet, as with all growing technological innovations, it has its security challenges. Let’s take a look at some of the security concerns thrown up by IoT and how to tackle them.</p> <p>Many companies don’t think about the security of IoT devices, as before embedded devices could be connected to the cloud there was no need. Connect any&nbsp;device to the internet, however, be it a laptop or a toaster, and all of a sudden security concerns arise. As IoT devices connected to the cloud proliferate, so do opportunities for hackers to gain entry to your devices and - through them - your server.</p> <p>Often vendors don’t understand that the simple process of adding internet functionality to their devices - even if they are not traditionally internet devices - could compromise the whole network.</p> <p dir="ltr">This risk only becomes greater as devices gradually become more interconnected, and when we take into account the fact device protocols used by IoT may not have gone through the same testing for vulnerabilities as that which traditional software goes through. It is a new industry, with developers unable to work from a manual in many cases and solving new problems. Though devices will be functional, they need to be properly tested for security issues.</p> <p dir="ltr">These potential threats are scary enough when it comes to the Connected Home and your personal security, but let’s not forget IoT goes far beyond that, into the likes of financial services, healthcare, oil and gas, electric, and government. Yet awareness of security risks still seems to be lacking, with perhaps only a well publicized attack with serious loss of data likely to make people sit up and take notice.</p> <p>Still, there are some companies handling security for IoT, though major firms have not yet taken the lead on it. Yet companies and individuals using IoT also need to be aware that these security firms can’t do everything. If a user doesn’t change a preset password, and a hacker gains access to their device and server, it is out of the company’s hands. Preparation needs to go in from all sides before devices are rolled out to ensure security.</p> <p>This preparation is hampered by the fact that patching vulnerabilities as you go along is usually cheaper than making sure the IoT product is secure from the start. Patching can actually make issues worse, confusing customers and leaving products open to attacks. Best to make sure security protocols are in place from the beginning, and that customers know what they need to do to keep themselves secure at the time of purchase.</p> <p>Better encryption is necessary. Many analysts believe poor implementation of cryptographic features could be a major weakness in the face of attackers who could reset them. Poor passwords are another issue, with customers needing to be educated on the need to reset passwords upon purchase, and how to make those passwords most effective. Currently, too, IoT devices might lack of the processing power, compounding security issues. However, this will change, but in the meantime companies need to be aware that there are potential problems and make sure they are covered.</p> <p>You might think that as an IoT business your first priority is functionality, but in terms of keeping you and your customers secure, making sure your solutions are protected against malicious attacks must come at the top of the list.</p> </div> <div id="field-language-display"><div class="form-item js-form-item form-type-item js-form-type-item form-item- js-form-item- form-group"> <label class="control-label">Language</label> English </div> </div> Tue, 18 Apr 2017 03:10:01 +0000 geisel 196 at http://geisel.software IoT Goes Beyond the Connected Home http://geisel.software/blog/iot-goes-beyond-connected-home <span>IoT Goes Beyond the Connected Home</span> <div class="field field--name-field-header-image field--type-image field--label-hidden field--item"> <img src="/sites/default/files/2017-03/bigstock-800x431-BEYO%10ND-iot-Female-Medi-158633783.jpg" width="800" height="431" alt="Medical Abstract Background with Laptop" typeof="foaf:Image" class="img-responsive" /> </div> <span><a title="View user profile." href="/users/geisel" lang="" about="/users/geisel" typeof="schema:Person" property="schema:name" datatype="">geisel</a></span> <span>Mon, 04/10/2017 - 13:00</span> <div class="field field--name-field-blog-category field--type-entity-reference field--label-hidden field--item">20</div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p dir="ltr">When most people think of IoT, they think of the Connected Home. The idea that your car can talk to your front door, which can talk to your lighting, which can talk to your stove. The standard example of IoT is that your car - using embedded software and the cloud - is able to inform your front door when you pull into your driveway, which in turn unlocks and informs your lights they need to switch on now.</p> <p>Things haven’t quite gone that far - yet - but it is heading that way. But IoT is much more than just your house. Companies are using IoT for manufacturing and enterprise. Last year, the installed base of IoT devices in industrial automation reached 10.3 million. Of all the niche markets, however, healthcare is one of the major ones.</p> <p>According to research from MarketResearch.com, the healthcare IoT market segment is set to grow to US $117 billion by 2020. Increasingly, connected devices in a number of forms are being introduced to patients to regularly track health information. Smart beds detect if they are occupied and when a patient tries to get up, while also adjusting to ensure appropriate pressure. Home medication dispensers can automatically upload data if a patient does not take medication.</p> <p>There are other innovations.<a href="http://mimobaby.com/"> Mimo</a> has rolled out an infant monitor providing parents with real-time information on their baby, including its breathing and skin temperature, with data sent straight to a smartphone. Pixie Scientific has developed smart diapers analyzing a patient's urine in order to track any urinary tract infection (UTI), with a caregiver able to scan a QR code on the front of the diaper and have the data sent to their smartphone.</p> <p>Vigilant, a Swiss firm, has meanwhile developed a smart insulin injection tracker, which comes in the form of an electronic cap fitting most insulin pens, and transmitting insulin injection data to an app.<a href="http://proteusdigitalhealth.com/proteus-digital-health-announces-fda-clearance-of-ingestible-sensor/"> Proteus Digital Health</a>, on the other hand, is bringing IoT to pills, launching an ingestible sensor within a pill that tracks a patient’s medication schedule.</p> <p>These devices also serve to open new markets for companies looking to get into the IoT healthcare space. Since many of them require follow-up consultation with a doctor or other type of healthcare professional, there is an opening for more, smarter devices that can deliver more valuable data and further decrease the need for direct patient-doctor interaction.</p> <p>One of the major benefits of these advancements in IoT in the healthcare sector is that support can become more efficient, enabling healthcare professionals to keep an eye on the health of their patients without the need for hospitalization or regular visits. Senior citizens particularly stand to benefit. With IoT technologies employed in the home, they can live more independently, with reduced costs and less need for additional caregiver resources.</p> <p>Some obstacles remain to the development of the sector, however, most notably, as ever, around data privacy and security. Most of the above devices have secure methods of communicating health information to the cloud, but they are still targets for hackers and could be vulnerable. Increasingly, however, regulators will develop frameworks for connected devices utilized in the healthcare sector, something already evident with the release by the United States Food and Drug Administration of guidelines for medical IoT devices. Regulation will catch up, but it will always be behind the pace of innovation in a sector that looks to be as lucrative for investors as it is efficient for healthcare professionals and patients alike.</p> </div> <div id="field-language-display"><div class="form-item js-form-item form-type-item js-form-type-item form-item- js-form-item- form-group"> <label class="control-label">Language</label> English </div> </div> Mon, 10 Apr 2017 12:00:45 +0000 geisel 194 at http://geisel.software Jibo http://geisel.software/clients/jibo <span>Jibo</span> <div class="field field--name-field-client-logo field--type-image field--label-hidden field--item"> <img src="/sites/default/files/2017-04/JiboLOGO200x129.jpg" width="200" height="129" alt="Jibo Logo" typeof="foaf:Image" class="img-responsive" /> </div> <span><a title="View user profile." href="/users/tgeisel" lang="" about="/users/tgeisel" typeof="schema:Person" property="schema:name" datatype="">tgeisel</a></span> <span>Sat, 04/01/2017 - 05:30</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>Jibo&nbsp;Inc.&nbsp;is the creator of the world’s first social robot for the home.</p> <p>Jibo is an interactive robot that experiences the world, and reacts with surprisingly thoughtful movements and responses that show he’s no ordinary bot. So while he’ll gladly snap a photo or send a message, he’ll also get to know you and the people you care about.</p> </div> <section> </section> Sat, 01 Apr 2017 04:30:11 +0000 tgeisel 201 at http://geisel.software http://geisel.software/clients/jibo#comments