Daniel Reichman
Daniel Reichman
Ph.D., CEO and Chief Scientist, Ai-RGUS, Ai-RGUSDaniel Reichman, Ph.D. is the CEO and Chief Scientist of Ai-RGUS, an AI start-up spun out of Duke University. After receiving his Ph.D. at age 25, Dr. Reichman founded Ai-RGUS. With over 24 university publications, Dr. Reichman obtained his doctorate in Electrical and Computer Engineering from Duke University from a programme fully funded by the US Army Research Office. Before Duke, he graduated from the fully funded programme at The Cooper Union in New York City, with his Masters and Bachelors in Electrical Engineering and a minor in Mathematics. Over the years, Dr. Reichman has successfully completed consulting projects including the development of software to assist reading more than 10,000 pages that needed to be summarised for a book. His passion is to develop algorithms to improve quality of life by automating routine tasks.
Round table contributions
Trust is the foundation of successful relationships between buyers and sellers in the security marketplace. Trust facilitates collaboration, reduces risk, improves decision-making, and ultimately driv...
By all accounts, technology development is moving at a rapid pace in today's markets, including the physical security industry. However, market uptake of the newest technologies may lag, whether becau...
Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depends on our ability t...
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network ex...
Retaining top talent is a route to bring innovative ideas and creative solutions to a company. Talent drives product development, improves processes, and helps businesses stay ahead of the competition...
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security...
Direct costs such as purchase price and maintenance are important elements in the total cost of ownership (TCO). However, there are others. Elements such as opportunity costs of lost revenue or hidden...
By linking human resource (HR) systems to physical security, access control systems can automatically update permissions based on employee changes, such as promotions, terminations, or department tran...
While technology like cameras, alarms, and access control systems are crucial components, they are only as effective as the people who use and manage them and the systems that deploy them. When i...
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to take proactive steps...
College campuses are meant to be places of learning, growth, and community. Fostering such an environment requires the deployment of policies and technologies that ensure safety and security. Consider...
Audio might detect sounds like breaking glass or footsteps before a person even enters the field-of-view of a video camera. Audio also helps to provide context: Someone running in a video image might...
Factors such as stable demand and large contracts make the government market particularly enticing for security companies and professionals. However, entering and thriving in the government market pre...
Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthroughs. The advantages...
The design of buildings encompasses many elements, from the practical to the aesthetic. Well-designed buildings should be functional, and they can also be beautiful and inspiring. But can security sys...
News mentions
Trust is the foundation of successful relationships between buyers and sellers in the security marketplace. Trust facilitates collaboration, reduces risk, improves decision-making, and ultimately driv...
By all accounts, technology development is moving at a rapid pace in today's markets, including the physical security industry. However, market uptake of the newest technologies may lag, whether becau...
Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depends on our ability t...
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network ex...
Retaining top talent is a route to bring innovative ideas and creative solutions to a company. Talent drives product development, improves processes, and helps businesses stay ahead of the competition...
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security...
Direct costs such as purchase price and maintenance are important elements in the total cost of ownership (TCO). However, there are others. Elements such as opportunity costs of lost revenue or hidden...
By linking human resource (HR) systems to physical security, access control systems can automatically update permissions based on employee changes, such as promotions, terminations, or department tran...
While technology like cameras, alarms, and access control systems are crucial components, they are only as effective as the people who use and manage them and the systems that deploy them. When i...
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to take proactive steps...
College campuses are meant to be places of learning, growth, and community. Fostering such an environment requires the deployment of policies and technologies that ensure safety and security. Consider...
Audio might detect sounds like breaking glass or footsteps before a person even enters the field-of-view of a video camera. Audio also helps to provide context: Someone running in a video image might...
Factors such as stable demand and large contracts make the government market particularly enticing for security companies and professionals. However, entering and thriving in the government market pre...
Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthroughs. The advantages...
The design of buildings encompasses many elements, from the practical to the aesthetic. Well-designed buildings should be functional, and they can also be beautiful and inspiring. But can security sys...
Manufacturers make things. That hasn’t changed. Manufacturers today still produce finished goods from raw materials using various tools, equipment, and processes. What is evolving is a greater e...
Migrating to the Cloud can be a cultural shift for some organisations, especially when it comes to physical security systems. Challenges such as concerns about data security and compliance, cost manag...
When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security systems use is minimal...
The security industry offers a vast array of technologies and vendors. This can be overwhelming for end users, who depend on security integrators for guidance and service. But how well do security int...
Technology can be a powerful tool, but it can also be misused. Ethical principles help ensure that technology is used in a way that minimises risks and avoids causing harm to people or society. Issues...
Security experts
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download