Technology & Trends - IP cameras
Merging objectives into a business relationship requires ongoing communication along with a shared vision and values A myriad of books has been written on business relationships. From establishing and maintaining business relationships to compensation issues and contract terminations, there’s a how-to book out there on most every aspect of business. While I have never published a business “how-to” book, I do have the benefit of experience in successfully navi...
Thermal cameras see heat rather than light, so they are a perfect “human detector” Safeguarding outdoor assets in a reliable and cost-effective manner often comes down to a single requirement: Accurate intruder alerts and timely information about the unfolding event. While there are many technologies available for outdoor security, smart cameras with video analytics have emerged as the solution of choice for detecting intruders in real time outdoors. Yet the best...
Vulnerability scans rely on mostly automated tools to find potential vulnerabilities at either the network or application level Security vulnerability in any network can be found and exploited by hackers and others in no time. The only questions are when this will happen and how much damage an individual could do once they’ve gained access to the network. Recognising this reality, most organisations test their own networks for security weaknesses, whether to meet compli...
Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centres, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but firs...
Currently some retailers operate two separate speaker systems in their stores: one for broadcasting background music and one for announcements Twenty years ago, IP network cameras launched a revolution in video surveillance. Today, network audio systems are about to do the same for the speaker market. Back in 1996, the predominant video cameras were analogue. They weren’t intelligent. They required an expensive and complex head-end of recording and monitoring systems....
Panoramic cameras enable an operator to assess a wide field of view at a glance and to zoom in to view additional detail as needed. Providing this capability are a single camera, a single mounting location, and often using a single cable. Complete 180-degree or 360-degree coverage brings total situational awareness of the area being viewed. Panoramic cameras can also enable you to record everything in the field of view, all the time, and to zoom in for detail, wheth...
If one component within the infrastructure changes, other components may need to be changed too Developing a bill of materials for an infrastructure is not difficult if you have the right information. One word of caution: Infrastructures are unique. Each is individual, so don’t depend on drop-down menus; it simply will not work. If one component within the infrastructure changes, take the time to check and see if the rest of the components need to be changed, too. Let&...
The global market for security as a service is set to grow from $921 million in 2016 to $1.49 billion by 2020 The global security as a service market is made up of video surveillance as a service (VSaaS) and access control as a service (ACaaS). With video surveillance as a service, the user pays on a yearly, quarterly or monthly basis for the ability to view live or recorded surveillance data. Using access control as a service, the customer pays a subscription to have a server...
Hikvision has been in the news in the United Kingdom recently, including a front page news story in The Times. SourceSecurity.com offered Keen Yao, Vice President at Hikvision’s International Business Centre, a chance to set the record straight regarding concerns expressed about hacking of cameras, the company’s ties to the Chinese state, and its role as the biggest video surveillance equipment manufacturer in the world. Hikvision has come a long way in the past few ye...
When a manufacturer states a specific PoE power for a camera, always count on the maximum class power source Power over Ethernet (PoE) is an important consideration in IP video security infrastructures, and many people believe Institute of Electrical and Electronics Engineers (IEEE) standards are the last word. However, when it comes to PoE, there is a wide range of both voltages and wattages that can qualify as being within an individual IEEE power class. This applies to both...
If you want to cultivate new ideas among your employees, it is important to let them know that they are allowed to challenge the status quo The Americans asked for horses – Henry Ford gave them cars. In the beginning of the 20th century, he disrupted the transportation industry. He created a new market outmatching established leading companies, products and alliances. And he got the idea himself. Many of us want to disrupt our industries with new innovations that...
The use of multiple wires has advantages for network transmission Network connection to a remote device begins by considering the type of cable. In some cases, installed cable may already be present and available for reuse, or you may have the option to install a new cable. Let’s review the major types of cable used for most security applications, their advantages and disadvantages. Types of cables In general, there are four major types of cable. First is coaxial cab...
48% of U.S. judges say they are not adequately prepared to deal with the range of “scientific or technical evidence” presented in court Over the last decade, the video surveillance security industry has morphed drastically in attempts to keep pace with both the consumer electronics and enterprise IT markets. This has created a steep learning curve for law enforcement as well as individuals in the judicial system. A 2012 survey titled “A national survey of ju...
The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular. The meteoric rise of “deep learning” technology over the past several years has been truly dramatic in many industries. Industry giants from Google, Microsoft, Facebook, IBM and many others have been pouring mass...
For more than a decade, Verint Systems, Melville, New York, has been developing and redefining the phrase the company pioneered: actionable intelligence. Today, its real-world specifications provide an in-depth analysis of video and integrated physical security data, deepening the gathering of intelligence and lessening risk at the protected premises. The entire realm of situational awareness continues to transition as intelligence is gleaned from new points, with this trend only...
CSR applies to the security industry in many different ways and can be practised by small or large businesses What exactly is Corporate Social Responsibility (CSR) and how does it apply to the security industry? Let’s look at how two very different companies – Axis Communications and FGH Security – each put CSR at the heart of their operations. Corporate Social Responsibility means different things to different people, and is often used as a catchall for one...
A perceived benefit of buying direct is to save money as opposed to paying a middleman Security companies have multiple options to purchase security products today – online, manufacturer direct, or from the vast array of security products and electrical supply networks dotting the landscape. Because there are numerous options, and costs may not vary drastically, the final decision on where to purchase ultimately boils down to service and additional support these channels...
Too often we attribute failure of connected devices to the devices themselves when the problem is actually an infrastructure failure Network infrastructures for security devices are complex. It may seem simple to connect an Ethernet cable to a cable modem, but the connection of IP cameras, access control devices and other IP/Power Over Ethernet (PoE) devices is not nearly so simple. Infrastructure is the heart of any system; and too often we attribute failure of connected devi...
In our world we make mobile security equipment for surveillance on-the-go in moving vehicles There are too many moving parts to a mobile system to think we could just predict hardware innovations. In our world we make mobile security equipment for surveillance on-the-go in moving vehicles. To make it work it takes a village of components vendors to bring it all together into a system that will keep civilians safer in the future. Possibly to the point of preventing an event fro...
Camera apps provide flexibility that is unheard-of with traditional server-based processing and analytics solutions The ability to customise IP video surveillance cameras with third-party apps has been a game-changer in system design and implementation. Traditional analytics require streaming all video to a server or external processor for deep interpretation to detect a license plate, face, or other criteria in each video frame. Apps perform image processing within the camera...
Part 6 of our Robots in Security series Later this year Universal Protection Service will begin offering a new autonomous robot to customers in California The next security guard you see may look more like R2D2 than Paul Blart, Mall Cop. Robots are starting to make their way into the offerings of security companies, and they may give guards a whole new image. Later this year Universal Protection Service — a division of Universal Services of America — wil...
We will examine the question of the increasing technicality of the closed circuit video industry from three perspectives; The Manufacturer, the Specifier, and the Integrator. History of Closed Circuit Video industry Before we begin examining this subject, let's take a look briefly at the history of the Closed Circuit Video Industry. 1920s: Tubes were invented (Cathode, Image Dissector, Iconoscope) 1940s: CCTV first introduced to monitor rocket launches 1970s: The...
Part 10 of our Security in Healthcare series Ensuring the safety of patients, staff and visitors is no easy task Security integration is more than a buzzword in the hospital and healthcare vertical. Increasingly, it’s a necessity. When creating a safe and secure healthcare environment, end users should look for solutions that not only drive new levels of security and business intelligence but can provide long-term value in the future. Specifically, Kevin...
One obvious benefit of an NVR appliance compared to software VMS system is ease of configuration and installation A quality networked video recorder (NVR) and software-based video management system (VMS) both do an excellent job of safeguarding valuable video data. But there are a number of pros and cons for both, along with specific applications that will do better with one option over the other. These can easily be broken down into five topics: ease of setup/install, suppor...
The age of robotics is fast approaching. To be successful, security systems integrators need to understand how these machines fit in the security of their clients, according to industry experts. “The integrators did not begin this trend,” says Bill Bozeman, President and CEO of the PSA Security Network, cooperative of security product suppliers and system integration companies. “They did not say, ‘Oh boy I can’t wait to introduce robotics into my portfolio'. This i...
Many end-users shell out the cash to acquire the newest high-end devices, plug in, and expect to be wowed A well-developed surveillance system can give a single security guard the power to see what otherwise might take a hundred pairs of eyes to see. But what happens when all the components are all connected and powered up, and the resulting image on the screen is, well, indiscernible, or, at the very least, terribly pixelated? Many end-users shell out the cash to acquire the...
The 62nd ASIS International Seminar and Exhibits will run from September 12 to September 15 in Orlando, Florida. ASIS estimates that the Seminar may attract more than 20,000 security professionals to the Orlando Convention Center, where the event is being held. Giving back to the host community The Seminar always has a major economic effect on the host community. This year, ASIS will inaugurate a programme called Security Week, which is designed to give something back to the Sem...
There’s no better indication that robots are the next big thing in security than the formation of the industry organisation known as Robolliance. It’s billed as “a forum for technology partners and industry experts in robotics, surveillance and security to advance the understanding and awareness of the Autonomous Robotics marketplace.” Founded by Sharp Electronics Corp, its members include some of the biggest names in security and technology including Bell and Howell, R...
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the United States fosters health insurance coverage for workers and their families, and requires national standards for electronic health care transactions. The law’s privacy provisions include protection of information related to any individual’s health status, provision of health care, or payment for health care. There are also additional health privacy laws specific to California. Inter...
Today, we find ourselves in a world where we all need to talk less about products and more about solutions The security industry has changed a lot in recent years. Many will remember a time not so long ago when it was about buying boxes/pieces of tin, opening them up and installing them. Today, we find ourselves in a world where we all need to talk less about products and more about solutions. Despite this, there is still an inclination to put everything in a ‘box’...
Browse expert commentaries
Related videos
Enhanced security with S617 video door station
Remote Guarding Video Series Part 1: Overview and Basics.
Remote Guarding Video Series Part 5: Future and Technology
Hikvision Unveils WonderHub: Revolutionising Interactive Displays for Collaboration
Verkada GC31 Cellular Gateway for Seamless Device Connectivity
Hikvision AX Hybrid PRO Alarm System For SMB Industrial Facilities
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download