Robotics









News
Advantech, a pioneer in IoT intelligent systems and embedded platforms, hosted an investor conference today (March 5th), which was presided over by Chairman KC Liu alongside three co-presidents – Mr. Eric Chen, Ms. Linda Tsai, and Mr. Miller Chang. Advantech’s 2024 revenue declined by 7%; however, the gross margin was maintained due to the effective control on operations. The 2024 gross margin was 40.8%, the operating profit amounted to NT$9.050 billion (operating margin of 15.1%), and the consolidated net income after tax totaled NT$9.005 billion (net profit margin of 15.1%), while 2024 annual EPS reached NT$10.45. Meanwhile, Advantech proposed a cash dividend per share of NT$8.4, reflecting an increase in dividend payout ratio to 80%. The dividend proposal was approved by the Board of Directors last week and is subject to final approval by the 2025 annual shareholders meeting. Edge computing technology Eric Chen, President of General Management and CFO, stated, “Looking forward to 2025, order momentum has gradually recovered, with BB ratios in regional markets rebounding above 1. Meanwhile, as Advantech continues to expand in the Edge AI market, overall operations are expected to grow steadily.” According to Miller Chang, President of Advantech’s Embedded Sector, the rapid development of global artificial intelligence and edge computing technology has driven Advantech's extensive Edge Computing Platform holds a high market share across various industries. Advantech continues to innovate by developing Edge AI acceleration modules, Edge AI industry application systems, Edge AI large-language training systems, and Edge AI servers. High-performance computing Advantech's Edge Computing Platform has widely adopted various mainstream AI chips Additionally, it provides an integrated AI software platform tool, the Edge AI SDK, to help industry customers evaluate and validate AI platform performance and application development, accelerating the deployment of AI at the edge device level. Meanwhile, Advantech's Edge Computing Platform has widely adopted various mainstream AI chips and collaborates with pioneer chip manufacturers, such as Intel, AMD, Nvidia, Qualcomm, NXP, and MediaTek, to co-develop and launch high-performance Edge AI computing platforms simultaneously. Advantech focuses on high-performance computing and Edge AI applications in emerging industries, including 5G, networking, healthcare, transportation, automation equipment, and robotics. Industrial edge computing Furthermore, Linda Tsai, President of Advantech’s Intelligent System sector, stated that Advantech is committed to driving the development of industrial edge computing, focusing on vertical markets such as smart manufacturing, industrial and semiconductor equipment, collaborative robots, transportation, network security, and video streaming. The company will provide advanced technologies, including machine vision solutions The company will provide advanced technologies, including machine vision solutions, PC-based industrial controllers, Edge computers, Edge servers, and Edge Video Appliances, enabling customers to enhance production efficiency and accelerate digital transformation. In addition, Advantech will deeply integrate AI, edge computing, and industry applications by launching AI vision cameras, industrial AI inference systems, and a series of Edge LLM servers. Delivering innovative solutions The company will also collaborate with AI ecosystem partners to deliver innovative solutions. Moreover, Advantech plans to expand its presence in key areas such as intelligent inspection, collaborative robots, logistics and warehousing, and smart cities, accelerating the growth of the Edge AI market. Advantech will strengthen its investments in L11 SKYRack integration services Lastly, Advantech will strengthen its investments in L11 SKYRack integration services, providing customers with assembly, integration, and testing services for industrial rack solution. Leveraging its global service network, the company enables localised assembly and delivery, supporting applications in semiconductor front-end equipment, medical imaging, and video streaming to provide comprehensive system solutions. Comprehensive system solutions Advantech Chairman KC Liu stated that in 2025, Advantech will launch a new brand strategy,’Edge Computing & WISE-Edge in Action.’ “Moving forward, the company will deepen its understanding of customer needs by transforming Edge Computing into a competitive advantage, thereby optimising operational efficiency and enhancing decision-making accuracy for clients.” “In the AI era, Advantech aims to drive industry advancement and foster innovation. The company will continue to focus on five key industries: Edge Intelligence Systems, Manufacturing, Energy and Utilities, iHealthcare, and iCity Services & iRetail. Through the software-hardware integration strategy, Advantech will leverage WISE-Edge to connect and enable edge intelligence, building a smart, interconnected ecosystem that facilitates real-time industry insights and drives innovative applications.” “Looking ahead, Advantech will further advance the integration of hardware and software in Edge AI by collaborating with ecosystem partners. The company aims to create sustainable growth and generate long-term value for shareholders, society, and employees—ultimately fulfilling its vision of "Enabling an Intelligent Planet."
Matrix, a trailblazer in security and telecom solutions, proudly takes center stage as the Title Sponsor for 'Footprints 25' – the milestone 25th edition of the prestigious national technical fest hosted by the Faculty of Technology and Engineering (FTE), Maharaja Sayajirao University. Mark the calendars for 7-9th March 2025, as 'Footprints 25' gears up to spotlight the ingenuity and technical brilliance of aspiring engineers from MS University. This three-day national youth extravaganza promises an exciting lineup of competitions, workshops, and exhibitions, all dedicated to driving innovation and pushing the boundaries of technological progress. Matrix's unwavering commitment Matrix is proud to champion this initiative, playing a pivotal role in assigning and uplifting the next era Matrix's unwavering commitment to excellence perfectly resonates with the vision of 'Footprints 25,' a platform where students from across the country will unite to explore, innovate, and exhibit their technical expertise. As the Title Sponsor, Matrix is proud to champion this initiative, playing a pivotal role in empowering and inspiring the next generation of engineers and innovators. Future of technology Ganesh Jivani, CEO of Matrix, shared his excitement about the collaboration, stating, "Matrix is honored to be the Title Sponsor for 'Footprints 25.' We strongly believe in fostering and empowering young talent, the driving force behind the future of technology." "This event serves as a remarkable platform for students to showcase their ingenuity and skills, and we are thrilled to support and be part of this inspiring journey." Impactful 'Footprints 25' event 'Footprints 25' will feature an exciting array of technical competitions, including robotics, coding challenges, and project exhibitions, offering students a dynamic platform to exhibit their technical expertise. Matrix's sponsorship underscores its dedication to empowering educational initiatives and nurturing innovation within the technology and engineering landscape. Matrix eagerly anticipates an inspiring collaboration with the Faculty of Technology and Engineering at Maharaja Sayajirao University, looking forward to a successful and impactful 'Footprints 25' event that celebrates innovation and excellence.
Robotic Assistance Devices, Inc. (RAD), a subsidiary of Artificial Intelligence Technology Solutions, Inc., a pioneer in AI-driven security and productivity solutions, announced the development of HERO™ (Humanoid Enforcement & Response Officer), an advanced humanoid security robot engineered to further expand the physical forms in which RAD delivers safety and security functionality. HERO joins the RAD hardware family that includes the award-winning ROSA™, RIO™, AVA™, TOM and ROAMEO™. HERO will make its public debut at ISC West in Las Vegas this April. RADDOG LE2™ and ROAMEO HERO, in development by AITX’s subsidiary Robotic Assistance Devices Mobile, Inc. (RAD-M), could be commercially available towards the end of 2025. HERO is powered by RAD’s hardware and software suite, as are the Company’s other mobile solutions, including RADDOG LE2™ and ROAMEO, via its RAD electronics vest and backpack. This enables that RAD’s core software for SARA™, response options, and mobility functionality are fully compatible with all other RAD devices making start up time and operational effectiveness quick and easy for clients. AITX’s strategic goals One of AITX’s strategic goals is to develop portable packs as shown on HERO and RADDOG RAD-M is expected to bring HERO to market quickly, and at little cost, as the bulk of the software and has already been tested and proven on other mobile devices. One of AITX’s strategic goals is to develop portable autonomous packs as shown on HERO and RADDOG, allowing for cost-efficient development for new hardware. HERO applications HERO is designed to address the human preference of engaging humanoid-type form factors. While the balance of RAD’s product set are purpose-built devices designed to reduce human labour and increase cost efficiency for specific duties related to safety and security, HERO packages these functional abilities in a more approachable or intimidating, depending on what is happening, demeanour. This form is expected to encourage high compliance with facility rules as well as provide additional de-escalation benefits that a non-humanoid form cannot offer. Around-the-clock security operations HERO offers a reliable alternative by providing even, around-the-clock security operations Human security officer roles are often underappreciated, poorly compensated, and carry an element of physical and verbal abuse risk. Compounded by rising labour costs, high turnover rates, and shortages of qualified security personnel have left many organisations struggling to maintain effective coverage. HERO offers a reliable alternative by providing consistent, around-the-clock security operations without the financial burden associated with staffing, training, and employee benefits. AITX’s mission “HERO is a continuation of AITX’s mission to improve safety, security and efficiency while under cost pressures, exactly as the market is demanding,” said Steve Reinharz, CEO/CTO of AITX. “When ready for commercial deployment, we will have further solidified our offering as having unmatched utility through both our software and hardware.” Technology built for real-world applications HERO, like all RAD solutions, is being engineered to interact naturally with individuals HERO, like all RAD solutions, is being engineered to interact naturally with individuals. Much like a human security officer, HERO can provide de-escalation through its presence and conduct, perform access control duties, issue verbal warnings, and escalate incidents as needed via its immediate connection through SARA (Speaking Autonomous Responsive Agent). Furthermore, verified recipients of SARA telephone calls will be able to verbally direct HERO remotely. Its ability to process vast amounts of data in real time allows it to recognise potential threats and respond appropriately, significantly improving response times, reducing reliance on human intervention and lowering costs when compared to legacy solutions. RAD’s extensive network of channel partners Solutions developed by RAD-M are marketed and distributed by AITX subsidiary, Robotic Assistance Devices, Inc., and through RAD’s extensive network of channel partners. This structure ensures that innovations like HERO reach a broad market efficiently, providing businesses and organisations with access to advanced, AI-driven security solutions backed by a trusted ecosystem of industry professionals. Unveiling at ISC West 2025 Attendees will have the first opportunity to witness HERO’s capabilities in action and explore HERO will be formally introduced to the security industry at ISC West, the premier security conference, taking place in Las Vegas from March 31 – April 4, 2025. Attendees will have the first opportunity to witness HERO’s capabilities in action and explore its potential to reshape the security landscape. Further details regarding functionality, demonstrations and availability will be shared in subsequent announcements. Security guarding and monitoring model AITX, through its subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the nearly $50 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. RAD solutions are specifically designed to provide cost savings to businesses of between 35%-80% when compared to the industry’s existing and costly manned security guarding and monitoring model. Mobile robotic solutions All RAD technologies, AI-based analytics and software platforms are developed in-house RAD delivers these tremendous cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics and software platforms are developed in-house. Other client opportunities RAD has a prospective sales pipeline of over 35 Fortune 500 companies and numerous other client opportunities. RAD expects to continue to attract new business as it converts its existing sales opportunities into deployed clients generating a recurring revenue stream. Each Fortune 500 client has the potential of making numerous reorders over time.
Over the last 10 years, threats to the UK, including espionage, terrorism, cyber-attacks, and disinformation, have increased dramatically in volume and velocity. Globally, multiple state-on-state conflicts pose serious risks, with the potential to escalate into both intra and intercontinental struggles. Range of sub-sectors Private Equity activity across Security-Tech has continued to grow year-on-year, with 191 direct investments made since 2018 across a range of sub-sectors. These include Safety & Security, Risk & Crime Prevention, Identity Technology, Intelligence and Surveillance, Communication Technology, Cyber Security, Defence and Frontier Technology. According to Heligan, as threats evolve, Private Equity investment is crucial for accelerating innovation and market readiness and maintaining the operational edge over adversaries. Approaches in other security and defence sectors Security-Tech investment has accelerated across different regions of the UK, with 89 transactions Security-Tech investment has accelerated across different regions of the UK, with 89 transactions in the Southeast from 2018-2024 and 25 in the Midlands, with deal activity also rising in the Northwest and Scotland. Matt Croker, Director at Heligan, said, “Cyber security remains a standout sector for Private Equity, offering scalable, recurring revenues and a fragmented market ideal for buy-and-build strategies that enhance returns. While Private Equity is now exploring buy-and-build approaches in other security and defence sectors, this trend is emerging but is expected to grow quickly." Renewed focus on national security Croker added: “More broadly, 2024 was a record year for new investments. Although volumes dipped in 2022 and 2023, activity remained robust and looking ahead, 2025 could exceed the level of activity experienced in 2024." "Government priorities have shifted with a renewed focus on national security amid conflicts like Ukraine-Russia and Israel Middle East. This geopolitical instability has driven structural change in governmental mindsets and budgets, expanding addressable markets - a crucial factor for investors." Demand for innovative dual-use technologies “The defence and national security technology industry is transforming significantly in response to increased challenges”, added Croker. “The government's increasing demand for innovative dual-use technologies is driving sector growth, which, in turn, is driving private market investment. Private Equity firms are looking to capitalise on this expanding market, which is often supported by government, military and law enforcement needs.” Private Equity platforms Bolt-on transactions for Private Equity platforms are also increasing in volume Bolt-on transactions for Private Equity platforms are also increasing in volume. Cyber security and defence are seeing more roll-up strategies driven by recurring revenue models that attract PE alongside attractive market dynamics. Croker continued: “Technological advances present both threats and opportunities, and the defence and security sectors are actively implementing AI, quantum computing, advanced robotics and novel materials." Security-Tech ecosystem Croker added: "As these technologies continue to evolve it creates new opportunities for Private Equity and Venture Capital investors and we expect the Security-Tech ecosystem to continue to thrive and grow in influence." “Cybersecurity, Intelligence & Security and Defence assets remain highly attractive. Private Equity investment is crucial for accelerating innovation, market readiness and maintaining our operation edge over our adversaries,” concluded Croker.
Expert commentary
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defences, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitisation of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of cyber resilience in protecting service availability Cyber resilience refers to organisation's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organisation's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimising the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimised, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organisation. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorised individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorised access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organisations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organisations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labelled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organisations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organisations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organisation can respond quickly and effectively to a breach, minimising its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organisations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
There’s a new security paradigm emerging across malls, server farms, smart office buildings, and warehouses, and its advantage over the status quo are so broad they are impossible to ignore. Instead of a lecture, let’s start with a short narrative scenario to illustrate my point. Darryl's work Darryl works as a security guard at the Eastwood Mall. Like any typical evening, tonight’s shift begins at 9:30 PM, as the stores close and the crowds thin. His first task: Ensure that by 10 pm, all mall visitors have actually left and that all doors, windows, and docks are locked securely. As he walks through most major areas throughout the mall, he checks them off his list. All’s quiet, so after a 45-minute patrol, he stops for a quick coffee break before heading out again. He repeats the process throughout the night, happy to finish each round’s checklist and rest his feet for a few minutes. Challenge: Vandalism during the shift A few cameras located sporadically throughout the mall recorded two dark figures moving in and out of the shadows As usual, there’s nothing notable to report, he clocks out and heads home. The next morning, however, he's greeted by an angry mall manager. He learns that sometime during his shift, three stores were robbed and a back hallway vandalised. A few closed-circuit cameras located sporadically throughout the mall recorded two dark figures moving in and out of the shadows at about 4 am. The mall manager demands an explanation, and Daryl has none, “They must have been hiding during closing time and then waited for me to pass before acting,” he says. “I can only be in one place at one time. And if they were hiding in a dark hallway, I would never have seen them.” Theft explanation “Actually,” explains the manager, “we found a loading door ajar near the furniture store. We’re guessing that’s how they got in, but we can’t be sure. Do you check all the docks? We need to know if we need to replace a lock. Look at your logs - tell me exactly what you saw and when.” Daryl tries to recall. “I'm pretty sure I checked that one a couple of times. I checked it off my list.” Darrell decides not to mention that at 4:00 AM, he was feeling the night's fatigue and might have skipped that area a couple of times. That's the end of our tale. Poor Daryl is not a bad security guard, but he’s only human. His job is repetitive and unstimulating. Darryl's work log He checks off each location for the record, but there's no way for him to record the thousands of details Let’s discuss his hourly log. He checks off each location for the record, but there's no way for him to record the thousands of details he sees to later zoom in on the few observations that might be helpful for an investigation. He has walked by that loading dock door hundreds of times, and it's all a blur. This isn’t an unusual story; Darryl is doing the same job that humans have been doing in almost precisely the same way for millennia. And, like last night, the criminals have always found a way to avoid them. But there is a better way. Solution: Fully-automated indoor drone Replacing a human guard with a fully-automated indoor drone eliminates virtually all the problems we've identified in this story as it flies through the facility: Drone teams can work 24/7: While each drone needs to dock to recharge its battery periodically, a fleet working in concert can patrol around the clock in multiple areas simultaneously. This makes it much more difficult for an intruder to move freely, without risk of discovery. A drone can even keep an eye out and keep recording while docked. Drones see and log everything: Everything is recorded and stored in full detail as they compare what they see with what they expect to see High-resolution onboard cameras and ultrasensitive sensors can detect heat, movement, and moisture, and see into dark areas much more effectively than the human eye. As they aren't limited to the floor, they can also fly high in the air to look above obstacles and at high windows or warehouse shelves. And they don’t lose focus or get bored as the night drags on: Everything is recorded and stored in full detail as they compare what they see with what they expect to see based on a previous flight. Anything unusual triggers an alert. Drones don’t need vacations, snack/bathroom breaks, or new-recruit training: Without the need to deal with biological requirements, you aren't paying for non-work hours, and there’s no overtime for extra hours or holiday shifts. In a high-turnover business like security, there's no time spent training new employees; adding drones to your fleet simply means installing your existing procedures onto each. There is certainly room for judgment calls that require human intervention, but these can often be handled remotely using a control panel that provides all relevant data and alerts from the drones on duty. That means no scrambling to the office in the middle of the night for a false alarm. Drones outshine stationary cameras and the people staring at those screens: A guard in the security office staring at dozens of these screens usually loses their attention span throughout the shift Close-circuit cameras are expensive to install, maintain, and periodically replace. In addition, they are limited in their scope and, almost by definition, leave large blind spots. A guard in the security office staring at dozens of these screens (that generally show nothing notable) usually loses their attention span throughout the shift. Conclusion In short, there is a good reason that our industry is following close on the heels of the manufacturing industry, which has been eagerly adopting robotics as a more cost-effective and precise solution for years. It is simply becoming harder and harder to justify the expense of the traditionally error-prone and monotonous work that we ask of our security guards.
Although video camera technology has been around since the early 1900s, it was not until the 1980s that video started to gain traction for security and surveillance applications. The pictures generated by these initial black and white tube cameras were grainy at best, with early colour cameras providing a wonderful new source of visual data for better identification accuracy. But by today’s standards, these cameras produced images that were about as advanced as crayons and coloring books. Fast forward to 2022, where most security cameras deliver HD performance, with more and more models offering 4K resolution with 8K on the horizon. Advanced processing techniques, with and without the use of infrared illuminators, also provide the ability to capture usable images in total darkness; and mobile devices such as drones, dash cams, body cams, and even cell phones have further expanded the boundaries for video surveillance. Additionally, new cameras feature on-board processing and memory to deliver heightened levels of intelligence at the edge. A new way of doing things But video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends: 1) Purpose-built performance Several video analytics technologies have become somewhat commoditised “intelligent” solutions over the past few years, including basic motion and object detection that can be found embedded in even the most inexpensive video cameras. New, more powerful, and intelligent video analytics solutions deliver much higher levels of video understanding. Vintra custom-built their platform to focus on what matters most to security professionals: speed and accuracy.” This is accomplished using purpose-built deep learning, employing advanced algorithms and training input capable of extracting the relevant data and information of specific events of interest defined by the user. This capability powers the automation of two important workflows: the real-time monitoring of hundreds or thousands of live cameras, and the lightning-fast post-event search of recorded video. Vintra video analytics, for example, accomplishes this with proprietary analytics technology that defines multi-class algorithms for specific subject detection, classification, tracking, and re-identification and correlation of subjects and events captured in fixed or mobile video from live or recorded sources. 2) Increased security with personal privacy protections The demand for increased security and personal privacy are almost contradictory given the need to accurately identify threatening and/or known individuals, whether due to criminal activity or the need to locate missing persons. But there is still societal pushback on the use of facial recognition technology to accomplish such tasks, largely surrounding the gathering and storage of Personally Identifiable Information (PII). The good news is that this can be effectively accomplished with great accuracy without facial recognition, using advanced video analytics that analyse an individual’s whole-body signature based on various visual characteristics rather than a face. This innovative approach provides a fast and highly effective means of locating and identifying individuals without impeding the personal privacy of any individuals captured on live or recorded video. 3) Creation and utilisation of computer vision Computer vision-driven video analytics transform professional video security systems from being purely reactive to proactive and pre-emptive solutions.” There are a lot of terminologies used to describe AI-driven video analytics, including machine learning (ML) and deep learning (DL). Machine learning employs algorithms to transform data into mathematical models that a computer can interpret and learn from, and then use to decide or predict. Add the deep learning component, and you effectively expand the machine learning model using artificial neural networks which teach a computer to learn by example. The combination of layering machine learning and deep learning produces what is now defined as computer vision (CV). A subset but more evolved form of machine learning, computer vision is where the work happens with advanced video analytics. It trains computers to interpret and categorize events much the way humans do to derive meaningful insights such as identifying individuals, objects, and behaviours. 4) Increased operational efficiencies Surveillance systems with a dozen or more cameras are manpower-intensive by nature, requiring continuous live or recorded monitoring to detect and investigate potentially harmful or dangerous situations. Intelligent video analytics, which provides real-time detection, analysis, and notification of events to proactively identify abnormalities and potential threats, transform traditional surveillance systems from reactive to proactive sources of actionable intelligence. In addition to helping better protect people, property, and assets, advanced video analytics can increase productivity and proficiency while reducing overhead. With AI-powered video analytics, security and surveillance are powered by 24/7 technology that doesn’t require sleep, taking breaks, or calling in sick. This allows security operations to redeploy human capital where it is most needed such as alarm response or crime deterrence. It also allows security professionals to quickly and easily scale operations in new and growing environments. 5) A return on security investment “With video analytics, what has always been regarded as a cost centre is now being looked at as a profit centre.” The advent of advanced video analytics is slowly but surely also transforming physical security systems from necessary operational expenses into potential sources of revenue with tangible ROI, or as it is better known in the industry, ROSI – Return on Security Investment. New video analytics provide vast amounts of data for business intelligence across the enterprise. Advanced solutions can do this with extreme cost-efficiency by leveraging an organization’s existing investment in video surveillance systems technology. This easy migration path and a high degree of cost-efficiency are amplified by the ability to selectively apply purpose-built video analytics at specific camera locations for specific applications. Such enterprise-grade software solutions make existing fixed or mobile video security cameras smarter, vastly improving how organizations and governments can automatically detect, monitor, search for and predict events of interest that may impact physical security, health safety, and business operations. For example, slip-and-fall analysis can be used to identify persons down or prevent future incidents, while building/area occupancy data can be used to limit crowds or comply with occupancy and distancing guidelines. In this way, the data gathered is a valuable asset that can deliver cost and safety efficiencies that manual processes cannot. 6) Endless applications The business intelligence applications for advanced video analytics platforms are virtually endless including production and manufacturing, logistics, workforce management, retail merchandising and employee deployment, and more. This also includes mobile applications utilising dashboard and body-worn cameras, drones, and other forms of robotics for agricultural, oil and gas, transportation, and numerous other outdoor and/or remote applications. An added benefit is the ability to accommodate live video feeds from smartphones and common web browsers, further extending the application versatility of advanced video analytics. Navigating a busy intersection The accelerated rate of development for new advanced video analytics makes the intersection of video and AI technologies a very busy one to navigate. Just like crossing the street, one needs to be cautious in their approach. There are a lot of players entering this space who are making big statements and claims about their solutions. When vetting a provider, consider that it’s all about how they develop their technology, the accuracy they deliver, and their ability to leverage this new source of data to improve the specific outcomes you need to achieve. And most of all, it’s about proof of performance and how they arrived at the desired outcomes. Navigate your way across this busy intersection pragmatically, and you will find intelligent video analytics to be a real game-changer for your organisation’s physical security operations.
Security beat
An attention-grabbing exhibit at GSX 2024 in Orlando involved a robot dog that could open a door. Boston Dynamics robot dog ASSA ABLOY impressed attendees with the robotics demonstration, featuring the Boston Dynamics robot dog that could open a door using either an HID credential or a mechanical grip. This innovation represents a shift toward more autonomous security solutions and is suitable for environments where human access may be limited. ASSA ABLOY impressed attendees with the Boston Dynamics robot dog Operational efficiency Eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology It was one of many eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology, and offering practical solutions to the industry's challenges. For security professionals, the advancements presented opportunities to enhance operational efficiency and to maintain a proactive stance in a rapidly evolving market. Control ID face identification Alongside their robot demonstration, ASSA ABLOY also highlighted the Control ID Face Identification. Access Controller, providing advanced facial recognition access control. From identity management to AI-driven surveillance systems, GSX 2024 offered a glimpse into the tools that can streamline processes, increase security, and reduce costs. Here are some other highlights. ASSA ABLOY also highlighted the Control ID Face Identification More integration with critical infrastructure A major theme at GSX 2024 was the increasing integration of security solutions with critical infrastructure. ALCEA (formerly ASSA ABLOY Critical Infrastructure) is an example. Their globalised software solution ALWIN is designed for managing access control, visitor management, and other security factors across multiple locations. ALCEA's approach involves not only internal collaborations within ASSA ABLOY but also partnerships with external organisations. An example of innovation is the Neenah Foundry lockable manhole cover, blending safety and security. Solving identity management challenges The solution simplifies onboarding and access request changes while ensuring compliance with policies Identity management continues to be a key focus in the security sector, and AMAG Technology addresses this need with its Symmetry Connect product. The solution simplifies onboarding and access request changes while ensuring compliance with policies. For professionals overseeing identity access management, Symmetry Connect provides a streamlined, automated approach, reducing human error and increasing operational efficiency. AMAG also sees a growing demand for efficient visitor management systems, especially in the post-COVID landscape. AMAG’s products cater to the need for enhanced security without overburdening staff. AI and cloud-based surveillance solutions Axis Communications highlighted its advancements in AI and cloud-based video management systems with its AXIS Camera Station Edge and Pro products. These solutions can connect seamlessly to cloud systems, providing security professionals with easy access to surveillance data anywhere. With the increasing need for centralised management, Axis’s offerings ensure that security teams can efficiently manage surveillance with minimal infrastructure. Axis also showcased its commitment to AI-driven analytics based on superior video quality. There were also networked audio solutions for public announcements and background music, among other uses. Body-worn cameras for corporate and school uses Traditionally focused on law enforcement, Axon is now expanding its body-worn cameras and TASER technology into corporate and school security environments. Their Axon Body Workforce camera is a practical solution for protecting frontline workers in high-risk environments. Axon also introduced drone-based solutions for real-time aerial awareness Axon also introduced drone-based solutions for real-time aerial awareness, a significant benefit for large campuses or remote locations. As more industries adopt corporate surveillance systems, Axon’s offerings provide flexible, scalable solutions that address the need for real-time, actionable intelligence. Cloud-based access for smart buildings Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options Brivo showcased how cloud technology is revolutionising access control by offering systems that integrate seamlessly with other smart building platforms. Their open API approach enables collaboration with IT teams, bridging the gap between physical security and IT management. Brivo’s new partnership with Comcast Smart Solutions illustrates how large enterprises can implement advanced solutions, including access control while maintaining flexibility. For professionals managing complex building environments, Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options. AI-powered multi-sensor camera Hanwha focused on an AI-powered multi-sensor camera, equipped with an NVIDIA processor capable of running complex analytics. In addition, Hanwha’s new AI camera technology can process multiple video streams simultaneously, either stream from its sensors or outside cameras, enabling better tracking of objects in complex environments. Their eight-channel AI Box, which converts legacy cameras into AI-enabled devices, is an attractive solution for professionals seeking to upgrade existing systems without the need for complete overhauls. For security teams looking to enhance situational awareness, Hanwha’s AI-based offerings provide advanced, scalable solutions. Workflow management and hybrid cloud security Genetec continued the theme of integrated solutions with their Operations Centre module for Security Centre, which consolidates work management into a single platform. Built on lean management principles, this system simplifies workflow for security professionals, promoting real-time collaboration across mobile and web platforms. As the industry shifts from on-premises systems to hybrid cloud solutions, Genetec’s products provide seamless transitions for organisations. Their new SaaS Security Centre also allows for natural language video searches in multiple languages, making it easier for global teams to manage operations across locations. Simplifying remote surveillance The company’s focus on scalability and efficiency is demonstrated by the “Eagle Eye Complete” subscription service Eagle Eye Networks showcased their continued international expansion, highlighting a new data centre opening in Saudi Arabia and new hiring initiatives in Australia and Europe. Their “Eagle Eye Anywhere” solar-powered camera system exemplifies the move towards flexible, easy-to-install solutions that can be deployed in remote locations. Integrators benefit from simplified maintenance through remote management, reducing the need for on-site support and ensuring operational continuity. The company’s focus on scalability and efficiency, as demonstrated by the “Eagle Eye Complete” subscription service, reflects the broader industry’s shift toward managed security services. Tailored solutions for commercial clients Everon continues its transition away from its former identity as ADT Commercial. Claiming the status of a competitive commercial integrator, Everon is reinventing itself by offering customised billing and monitoring solutions for a range of industries. Their cloud-based business intelligence platform, which combines video surveillance with data analysis, is aimed at enhancing operational awareness by detecting anomalies such as OSHA violations or retail point-of-sale exceptions. With AI-driven dashboards, clients can customise their security solutions to meet specific needs, reflecting a growing demand for tailored, data-driven security applications. Innovation through cloud and mobile LenelS2 is part of Honeywell, and they emphasised their investment in cloud and mobile solutions at GSX 2024. Their "Enterprise OnGuard Cloud" platform, launched in June 2024, is a testament to the growing demand for cloud-enabled access control systems. With the addition of NFC-enabled Blue Diamond credentials, LenelS2 is pushing towards smarter, more secure mobile access options. The strategic combination of Lenel’s solutions with Honeywell’s infrastructure offers users enhanced engineering capabilities and global reach. This reflects a broader market trend of integrating mobile devices into physical security protocols. Bringing AI to everyday security LPR system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying security risks March Networks highlighted their new AI-driven smart search feature, designed to help security teams quickly detect operational anomalies in retail and financial environments. From identifying misplaced cash in quick-service restaurants (QSRs) to detecting "jackpotting" attacks on ATMs, their solution highlights the increasing importance of AI in enhancing both security and operational efficiency. Their Licence Plate Recognition (LPR) system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying and responding to security risks in real-time, emphasising the practicality of AI in daily security operations. Driving sustainability in security Securitas showcased its commitment to sustainability, a growing concern for businesses across all industries. By providing CO2 data for clients and promoting digital tools like mobile credentials, Securitas is leading the charge in creating greener, more sustainable security solutions. Their focus on remote services and occupancy insights offers companies a way to reduce their environmental impact while enhancing security operations. The company’s alignment with science-based targets and circular economy practices signifies the increasing role sustainability will play in the security sector. Future lies in integration The GSX 2024 trade show revealed that the future of security lies in intelligent integration, AI-driven analytics, and cloud-based management systems. The innovations presented will help security professionals streamline their operations, enhance situational awareness, and future-proof their systems. As these technologies continue to evolve, professionals must stay informed about the latest advancements to maintain a competitive edge in the security marketplace. GSX was a great place to start. At the end of the day at GSX, it wasn’t just the robot dog that was opening doors …. to the future of security systems. {##Poll1727925373 - Of the important factors highlighted at GSX 2024, which do you consider most when adopting new security solutions?##}
Security applications for drones have evolved to provide benefits such as bird's-eye views of large areas, easy access to remote locations, and rapid deployment. However, to date, most drone applications have been outdoors. Not for long. Today, indoor drones are also finding unique opportunities for enhanced surveillance, security, and operational efficiency in indoor environments such as offices, warehouses, self-storage facilities, and malls. Indoor drones can navigate complex indoor spaces, providing real-time data and monitoring without the limitations of fixed cameras. New era of autonomous robotics A significant advantage of using drones indoors, as opposed to outdoors, is their ability to operate fully autonomously, circumventing U.S. Federal Aviation Administration (FAA) regulations that restrict such autonomy in outdoor environments. A new era of autonomous robotics enables drones to work seamlessly for users without the need for specialised flight training. A single security manager can oversee multiple indoor drones simultaneously with simple map clicks or prompts. A new era of autonomous robotics enables drones to work seamlessly for users Indoor monitoring and inspection Indoor Robotics is a company seeking to revolutionise indoor monitoring and inspection through its Control Bridge platform guiding indoor drones. Since its founding in 2018, Indoor Robotics has evolved through years of market engagement and product development. After initially recognising a demand for autonomous indoor monitoring, the company found that existing hardware fell short. “However, we understood the challenges of full autonomy and knew we would solve it using drones,” says Bar Biton, Marketing Manager of Indoor Robotics. Indoor Robotics has evolved through years of market engagement and product development Hardware challenges Seven years later, with the hardware challenges addressed, the company is shifting focus to continually increasing value for security managers, especially with generative AI (artificial intelligence). In 2018, the problem was charging methods, which has been solved with ceiling docking stations and five patents. “Today it’s about making indoor environments safer and even saving lives by identifying blocked emergency exits, missing safety gear, leaks, fire hazards and more,” says Biton. While indoor navigation presents challenges—such as the unreliability of GPS and the need for precision — Indoor Robotics has dedicated significant resources to achieve centimeter-level accuracy and ensure the utmost safety, maintaining a record of zero safety incidents to date, says Biton. Indoor navigation presents challenges—such as the unreliability of GPS and the need for precision Advanced AI-driven navigation systems Navigation challenges for indoor drones include manoeuvering through confined spaces, avoiding obstacles, and maintaining stable flight in varied lighting conditions. To address these, Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle avoidance technologies. These solutions enable drones to adapt to dynamic environments, ensuring precise and safe navigation. Additionally, the Control Bridge platform provides real-time data and monitoring, allowing drones to adjust their routes and respond to changing conditions effectively, thus enhancing their operational reliability. Highly versatile indoor drones find applications across numerous vertical markets such as retail, logistics, healthcare, and corporate settings. Key use cases encompass security surveillance, where drones monitor premises continuously; maintenance checks, especially in hard-to-reach areas; safety inspections to comply with regulations and company policies; and emergency response to provide real-time data during incidents. In warehouses, drones efficiently inspect high shelves. Healthcare facilities and data centres use them to oversee restricted zones. Additionally, corporate offices employ drones to automate after-hours security, safety and maintenance routines. Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle-avoidance technologies Alerts to the remote management team One Indoor Robotics client, a global tech company, deploys drones to enhance site surveillance and operational efficiency across six offices in three countries. The drones conduct regular security patrols after-hours, monitor facility activities, and ensure compliance with safety standards. This deployment has significantly improved the overall safety and security of their offices. The drones provide real-time alerts to the remote management team, enabling prompt responses to any anomalies, such as maintenance issues or unauthorised access. “The key advantage is the unified security standard provided by our Control Bridge operating system, allowing them to oversee all their sites from one centralised platform, ensuring consistent security management across all locations,” says Biton. When indoor drones co-exist with human workers, primary challenges include ensuring safety and preventing disruptions. Drones are equipped with advanced sensors and AI-driven obstacle avoidance systems to detect and navigate effectively around people. Strict operational protocols and designated flight paths are implemented to minimise interactions. Additionally, many drone operations are scheduled for after-hours to further reduce potential disruptions. “Safety is our top priority, and we invest significant resources to ensure it,” says Biton. “We are proud to report zero safety issues to date, reflecting our commitment to maintaining a secure environment for both drones and human workers.” Deploys drones to enhance site surveillance and operational efficiency across six offices in three countries Implementation of indoor drones Indoor drones are significantly more cost-effective and affordable when compared to traditional security methods like additional cameras, sensors, manpower, and even ground robots, says Biton. They cover larger areas and provide dynamic surveillance in less time, offering real-time data collection and enhanced flexibility. Unlike cameras or ground robots, drones eliminate blind spots and adapt to environmental changes autonomously. They also offer substantial indirect savings by optimising maintenance routines, according to Indoor Robotics. For instance, a drone can instantly identify issues in hard-to-reach areas, allowing for immediate, targeted responses, instead of requiring an inspector first and then a technician, thus streamlining maintenance processes. “The biggest obstacle to greater implementation of indoor drones is education and awareness,” says Biton. “Many people are not yet exposed to the concept of autonomous indoor drones and may find it hard to believe they really work.” To overcome this, Indoor Robotics focuses on creating awareness and educating customers about the reliability and benefits of the technology. Demonstrations, case studies, and clear communication about the capabilities and safety of drones are key. By showcasing successful implementations and providing hands-on experiences, Indoor Robotics seeks to build trust and drive wider adoption of indoor drone technology in security applications. Control Bridge operating system Drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms A common misconception is that indoor drones are intrusive and pose significant privacy risks. However, drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms. They operate primarily during off-hours and are programmed to avoid sensitive areas, focusing solely on enhancing security and operational efficiency. The solution also includes rigorous data protection measures to safeguard any collected information, ensuring compliance with privacy regulations and addressing concerns effectively. Soon, automation will become integral to tasks across all facility types, from manufacturing and logistics to retail and office spaces. Using Indoor Robotics’ Control Bridge operating system, facility managers will deploy fleets of robots to identify issues, collect data, and gain insights to enhance operations, maintenance, and safety. Facilities will benefit from 24/7 AI-driven monitoring, eliminating the need for occasional surveys. Managers will receive immediate alerts for any anomalies, with preventive maintenance tasks seamlessly integrated into building management platforms, ensuring optimal performance and safety. New standards in the industry The Indoor Robotics platform-agnostic approach provides flexibility and scalability. “As we continue to evolve, we support more and more platforms, enabling our clients to tailor their indoor monitoring solutions to their specific needs,” says Biton. “We believe that the future of security lies in intelligent, automated systems that can adapt to dynamic environments and provide real-time insights,” says Biton. Indoor Robotics seeks to be at the forefront of this transformation, setting new standards in the industry and paving the way for a safer, more efficient future.
New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the new technologies’ value to customers and some typical use cases. The Innovation Lab has been in place for just under a year and just moved into a 2,000-square-foot facility that is staffed with four dedicated ADT Commercial employees and teams from various commercial innovation partners. The idea of the lab is to close the gap between the incubation of new technologies and the needs and realities of the ultimate customer. The goal is to adapt the design of a product to meet the customer’s need, instead of forcing the customer to adapt their use of the technology to meet its limitations. Addressing a problem Every project or investment at the innovation lab starts with the identification of the problem, never the solution" "Every project or investment at the innovation lab starts with the identification of the problem, never the solution," says Ed Bacco, Vice President, Enterprise Security Risk Group for ADT Commercial. “Then we develop detailed functional requirements to address what this technology needs to do to address the problem.” “Then – and only then – do we move toward developing the technical specifications to answer how the technology needs to operate to address the problem,” he adds. Prioritising innovation The approach sets ADT Commercial apart from most labs. The last item they focus on is the creation of a business model to address how they can sell the technology. “Early on, the company recognised that if we truly want to focus on innovation, we need to prioritise invention over profits, which is why the lab doesn’t operate under a profit-and-loss model,” says Bacco. This article will describe two recent technologies the Innovation Lab has been working with, and how they can impact the future of the security industry. Halodi Humanoid Robotics Unlike other competitive robot solutions, Halodi Humanoid Robotics can interact with the built environment The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. Unlike some other competitive robot solutions, Halodi Humanoid Robotics can interact with the built environment, meaning that they can autonomously open doors, call elevators, present security badges, operate pins pads, and more. Observe and report functionality The basic use case for the bot is based on the fact that the role of 98% of all security guards is to “observe and report.” There is often a misconception in the public that guards are widely permitted to engage hands-on with alleged offenders, but most guarding contracts restrict that ability. Therefore, given the mundane and routine nature of guarding, humans find it a challenge to maintain the high degree of awareness that is needed, whereas the bots never waiver, never rest and never lose awareness. Alternative to human guards If a bot is to serve as an alternative to human guards, then it needs to interact with the human environment The bot wasn’t designed to be “human-like.” There is a general concept in humanoid robotics called the “uncanny valley” that defines a tipping point when humans become uncomfortable with humanoid robots if their design resembles humans too closely. However, if a bot is to serve as an alternative to human guards, then it needs to be capable of interacting with an environment that was designed for humans. That means opening doors, riding elevators, bending down, picking up items, etc. Remotely operated Current robotic devices are skilled at sensing/analysing the environments they are deployed in, but their ability to interact with them is limited. The other advantage of a humanoid robot is when it’s being remotely operated in the avatar mode, meaning virtually, the human operator finds the experience familiar and intuitively knows what to do. Access, intrusion, and VMS integration The bots can be integrated with access control, intrusion, and video management systems and can conduct patrols autonomously and report anomalies and/or respond to alarms via those same systems. The bots can be equipped with other sensors to constantly analyse the environment for threats to human life such as carbon monoxide, smoke, hazardous chemicals, or poor air quality. IR capabilities IR capabilities also enable the bot to detect the possible failing or overheating of equipment They are capable of “seeing” in the Infrared Range (IR), which makes them suitable for responding to the source of fire/smoke alarms while humans evacuate. IR capabilities also enable the bot to detect the possible failing or overheating of equipment. Although designed to operate autonomously, the bot can also be controlled by a simple point-and-click mapping device or using the avatar control system. Applications “The biggest challenge we’ve seen with customers who are conducting in-field pilots is aligning their excitement of how the bots can improve their traditionally non-security applications with the current capabilities,” says Bacco. These applications include using the bots to conduct safety audits of items like fire extinguishers and Automated External Defibrillators (AEDs), serving as a fire watch, greeting visitors in the lobby, and automating gates at industrial and distribution sites. Autonomous Indoor Drones COVID-19 has shown that customers are looking for predictable and repeatable solutions to meet their security needs" As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. “The COVID-19 pandemic has shown that customers are looking for predictable and repeatable solutions to meet their security needs that aren’t dependent on humans,” says Bacco. The three use cases for the drones are automated alarm response, random tours, and directed missions. Automated response mode In the automated response mode, when an alarm is triggered, the drone will automatically initiate a mission to the point of alarm and report any anomalies (i.e., people, heat signature, etc.). It can also be programmed to fly random patrols as a deterrent to a possible breach, and an operator can remotely initiate a mission using a simple point-and-click map interface. Drone mobility An obvious comparison is to fixed camera systems, which are an important component of any security system. But, unlike a fixed device, the mobility of a drone enables a view of an environment that is more easily understood by humans, meaning that we think and see in 3D, whereas fixed views are limited to 2D. Added to that, there is a deterrence factor that a mobile surveillance device has over a fixed. Noise consideration and applications Customers want to fly drones 24/7 in minimally manned locations such as data centres, warehouses The drone is designed to operate in environments that are being shared with humans. As an example, it will not initiate a mission if a person is standing under it, and it will autonomously alter course if a person is in its flight path. However, like all drones, the noise factor is a consideration, and the best applications in offices are after hours. Customers want to fly them 24/7 in more minimally manned locations such as data centres, warehouses, and manufacturing facilities, where noise is less a factor. Stand-alone and integrated system An indoor drone can be operated as a stand-alone system with its user interface, or it can be integrated fully with traditional security and VMS systems. “We are also developing additional computer vision-based analytics that will leverage the cameras on the drone,” says Bacco.
Case studies
The manufacturing sector is currently facing several challenges. Technological change, pressing environmental issues, and globalisation require several adjustments, such as investing in new technologies, conserving resources, and optimising and securing supply chains. Globally operating companies have to face a changing environment and at the same time manage problems in supply chains. Shifting production back to the domestic market is increasingly an option. This requires not only resilience but also compliance with strict environmental regulations and cost-efficient strategies to make domestic manufacturing competitive. Automation through robotics Moreover, those who want to ensure the competitiveness of domestic production must overcome personnel bottlenecks. Automation through robotics has long since become the driving force here, and artificial intelligence (AI) is increasingly taking on a key role. This technology is developing just as rapidly as the pressure for automation is increasing. To map production processes in one's own company with AI, the simplest possible AI integration and the shortening of training phases are already decisive factors. AI-based solution The easy-to-integrate system consists of a module for robot arms, a computing unit with pre-installed intelligent software This is where British start-up Cambrian Robotics Limited comes in with a fully AI-based solution for various robotics applications in manufacturing. It takes over fast bin picking or pick-and-place, the exact feeding of parts for machines as well as different work steps in material handling, for the benefit of more efficiency in assembly tasks or warehouse logistics. The easy-to-integrate system consists of a module for robot arms, a computing unit with pre-installed intelligent software, and a camera module, each equipped in series with two uEye+ XCP cameras from IDS. Self-learning software "The task of the cameras is to take a picture of the area with the objects to be handled. Based on the recordings, the software can analyse the scene and recognise where exactly the objects are located," explains Miika Satori, founder and CEO of Cambrian Robotics. Further processing of the images is carried out with the help of the heart of Cambrian Vision, a specially developed, self-learning software for predicting the position of the parts as well as their pick points. This takes care of the image matching on an AI basis so that no classic 3D point cloud is needed. GPU (Graphics Processing Unit) The AI models for part recognition and communication with the robot are controlled by a powerful GPU Based on simulated data, the AI learns independently and locates the removal points and parts extremely precisely. The AI models for part recognition and communication with the robot are controlled by a powerful GPU (Graphics Processing Unit). The software learns quickly, "With the Cambrian software package, pick points for new parts can be defined and the application configured within just two to five minutes," emphasises start-up founder Satori. uEye XCP industrial cameras The associated camera module is equipped with two space-saving uEye XCP industrial cameras. "The two IDS cameras provide images of the object scene from different viewing angles according to the stereo vision principle. The challenge is to determine the position of the part to be gripped as accurately as possible from these images. This is again the task of AI," says Miika Satori. CAD applications for 3D Standard CAD applications for 3D bin picking often use structured light or sensors to do this" The combination of image acquisition, AI models, and special image processing makes it possible to determine recording points and positions particularly precisely. "Standard CAD applications for 3D bin picking often use structured light or sensors to do this, projecting something onto the environment, creating a point cloud, and then trying to find the part in it. Cambrian uses only two standard IDS industrial cameras instead of a 3D camera." Precise vision With an accuracy of less than one millimetre, Cambrian Vision is also much more precise than competing systems. "The system reliably detects a wide range of parts, including shiny, reflective, or transparent components, where conventional machine vision systems often reach their limits. At the same time, it remains robust against external light conditions," says Miika Satori, describing the special requirements for the cameras, which are an elementary part of the solution. 170 milliseconds inference speed The one-shot system is currently one of the fastest AI image recognition systems on the market "It's also super-fast, with an inference speed of less than 170 milliseconds, whereas it often takes more than 1000 milliseconds for comparable solutions." The fast calculation time allows cycle times of two to three seconds in a bin-picking setting. "This ensures efficient, precise, and accurate execution in a single pass," Miika Satori underlines. This makes the One-Shot system currently one of the fastest AI image recognition systems on the market. This is made possible not least by the SuperSpeed USB 5 Gbps cameras, which reliably deliver high-resolution data for detailed image evaluations in any environment, explicitly in applications with low ambient light or changing light conditions. Back Side Illumination pixel technology Due to BSI ("Back Side Illumination") pixel technology, the integrated sensor (1/2.5" 5.04 MPixel rolling shutter CMOS sensor on semi AR0521) offers stable low-light performance as well as high sensitivity in the NIR (near infrared) range so that the uEye XCPs deliver high-quality images in almost any lighting situation with low pixel noise at the same time. With its compact, lightweight full housing (29 x 29 x 17 millimetres, 61 grams) and screwable USB Micro-B connector, the USB3 XCP is particularly suitable for use in combination with robots and cobots in the field of automation. XCP cameras XCP cameras can be easily integrated into any image processing system and can be used with any suitable software Due to USB3 and Vision Standard compatibility (U3V / GenICam), the XCP cameras can be easily integrated into any image processing system and can be used with any suitable software. The simple integration via the standard interface is particularly advantageous for Miika Satori, "Depending on the customer's requirements, we use other IDS cameras in our system. The standardised interface enables rapid deployment of a wide variety of uEye models." Custom Cambrian Vision solutions Compatible with popular lenses, a wide range of cameras from the IDS portfolio can be used as eyes for custom Cambrian Vision solutions, helping to maximise production performance.The top speed, the particularly high light insensitivity, and the wide component bandwidth that the system achieves due to the powerful IDS cameras and intelligent software make it particularly interesting for automation tasks in the production environment. Intelligent 3D vision system They conserve resources and save costs by operating more efficiently, competitively, and sustainably Another key to efficiency lies in the uncomplicated integration of Cambrian Vision. The intelligent 3D vision system is ready for immediate use without any real robot training, a remarkable acceleration compared to conventional methods. Companies can therefore quickly reap the benefits of automation: They conserve resources and save costs by operating more efficiently, competitively, and sustainably, while improving the quality of their products and the safety of their employees. AI in robotics "The use of AI in robotics is still in its infancy," says Miika Satori. Due to the growing demand, the development in the field of image processing with AI will be further advanced, cameras with higher data rates and faster and larger sensors will come onto the market, as well as further price-optimised models with reliable basic functions. Smaller and more affordable By using AI-powered robots for mundane and repetitive tasks, human resources can be redirected "Industrial cameras are getting smaller and more affordable. This will enable even more applications. Our vision is to give robots capabilities on the same level as humans." By using AI-powered robots for mundane and repetitive tasks, human resources can be redirected to more creative, productive, and valuable tasks. Camera uEye XCP - the industry's smallest housing camera with a C-mount. Model used: U3-3680XCP Camera family: uEye XCP Client By combining robotics and artificial intelligence, Cambrian Robotics is developing a productive tool that replaces human hands in the manufacturing of products. With the help of intelligent automation, costs are to be reduced and people are to be given more time for meaningful tasks. Cambrian Vision is a fully AI-based solution for various robotics applications in manufacturing such as bin picking, assembly, feature recognition and localisation, pick and place, placement, wire harness, and cable assembly.
Robots do monotonous workflows and less pleasant, repetitive tasks with brilliance. Combined with image processing, they become “seeing” and reliable supporters of humans. They are used in quality assurance to check components, help with the assembly and positioning of components, detect errors and deviations in production processes and thus increase the efficiency of entire production lines. An automobile manufacturer is taking advantage of this to improve the cycle time of its press lines. Together with the latter, VMT Vision Machine Technic Bildverarbeitungssysteme GmbH from Mannheim developed the robot-based 3D measuring system FrameSense for the fully automatic loading and unloading of containers. Pressed parts are thus safely and precisely inserted into or removed from containers. Four Ensenso 3D cameras from IDS Imaging Development Systems GmbH provide the basic data and thus the platform for process automation. Application The actual workflow that FrameSense is designed to automate is part of many manufacturing operations. A component comes out of a machine-here a press- and runs on a conveyor belt to a container. There it is stacked. As soon as the container is full, it is transported to the next production step, e.g., assembly into a vehicle. All these tasks are now to be taken over by a robot with a vision system-a technological challenge Up to now, employees have been responsible for loading the containers. This actually simple subtask is more complex than one might think at first glance. In addition to the actual insertion process, the first step is to determine the appropriate free space for the part. At the same time, any interfering factors, such as interlocks, must be removed and a general check of the “load box” for any defects must be carried out. All these tasks are now to be taken over by a robot with a vision system-a technological challenge. This is because the containers also come from different manufacturers, are of different types, and thus vary in some cases in their dimensions. Positioning of the components For their fully automatic loading and unloading, the position of several relevant features of the containers must be determined for a so-called multi-vector correction of the robot. The basis is a type, shape and position check of the respective container. This is the only way to ensure process-reliable and collision-free path guidance of the loading robot. All this has to be integrated into the existing production process. Time delays must be eliminated and the positioning of the components must be accurate to the millimetre. 3D point cloud These point clouds of all four sensors are combined for the subsequent evaluation To counter this, VMT uses four 3D cameras per system. The four sensors each record a part of the entire image field. This can consist of two containers, each measuring approximately 1.5 × 2 × 1.5 metres (D × W × H). Two of the cameras focus on one container. This results in data from two perspectives each for a higher information quality of the 3D point cloud. These point clouds of all four sensors are combined for the subsequent evaluation. In the process, registrations of relevant features of the container take place in Regions of Interest (ROIs) of the total point cloud. Interference contours Registration is the exact positioning of a feature using a model in all six degrees of freedom. In other ROIs, interference contours are searched for which could lead to collisions during loading. Finally, the overall picture is compared with a stored reference model. In this way, the containers can be simultaneously checked for their condition and position in a fully automated manner. Even deformed or slanted containers can be processed. All this information is also recorded for use in a quality management system where the condition of all containers can be traced. The calibration as well as the consolidation of the measurement data and their subsequent evaluation are carried out in a separate IPC (industrial computer) with screen visualisation, operating elements and connection to the respective robot control. Image processing solution The entire image processing takes place in the image processing software MSS developed by VMT The main result of the image processing solution is the multi-vector correction. In this way, the robot is adjusted to be able to insert the component at the next possible, suitable deposit position. Secondary results are error messages due to interfering edges or objects in the container that would prevent filling. Damaged containers that are in a generally poor condition can be detected and sorted out with the help of the data. The entire image processing takes place in the image processing software Multi-Sensor Systems (MSS) developed by VMT. FrameSense is designed to be easy to use and can also be converted to other components directly on site. Robust 3D camera system On the camera side, VMT relies on Ensenso 3D cameras-initially on the X36 model. The current expansion stage of FrameSense is equipped with the Ensenso C variant. The reasons for the change are mainly the better projector performance-thanks to a new projection process-as well as a higher recording speed. In addition, the Ensenso C enables a larger measuring volume. This is an important criterion for FrameSense, because the robot can only reach the containers to be filled up to a certain distance. The specifications of the Ensenso C thus correspond exactly to VMT's requirements, as project manager and technology manager Andreas Redekop explains: "High projector performance and resolution together with fast data processing were our main technical criteria when selecting the camera. The installation in a fixed housing was also an advantage.” Ensenso models Housing of a robust 3D camera system meets the requirements of protection class IP65/67 The Ensenso C addresses current challenges in the automation and robotics industry. Compared to other Ensenso models, it provides both 3D and RGB colour information. Customers thus benefit from even more meaningful image data. The housing of the robust 3D camera system meets the requirements of protection class IP65/67. It offers a resolution of 5 MP and is available with baselines from current to approx. 455 mm. This means that even large objects can be reliably detected. The camera is quick and easy to use and addresses primarily large-volume applications, e.g., in medical technology, logistics or factory automation. Outlook By automatically loading and unloading containers and the integrated 3D container inspection, manual workstations can be automated with the help of FrameSense. Against the background of the shortage of skilled workers, the system can thus make an important contribution to process automation in the automotive industry, among others. It meets the prevailing challenges of the industry. Ensenso C provides the crucial basis for data generation and exceeds the requirements of many applications. Lukas Neumann from Product Management sees their added value especially here: “The high projector power and large sensor resolutions are particularly advantageous in the field of intralogistics. Here, high-precision components have to be gripped from a great distance with a large measuring volume.” For other stacking or bin-picking applications in classic logistics, he could imagine a similar camera with high projector power but lower resolution and fast recording. So nothing stands in the way of further developments and automation solutions in conjunction with "seeing" robots.
Artificial Intelligence Technology Solutions, Inc., a pioneer in AI-driven security and productivity solutions along with its wholly owned subsidiary, Robotic Assistance Devices, Inc. (RAD), published a case study reviewing the overwhelmingly positive results from the successful deployment of multiple ROSA security robots at a multi-family community in San Jose, California. Innovative security technology The case study titled "From Break-Ins to Breakthroughs: How a Multiple RAD ROSA System Reshaped an HOA Community’s Security" highlights the transformation of Westside Manor Homeowners Association from a vulnerable community plagued by often dangerous break-ins to a secure environment through the adoption of RAD’s innovative security technology. Struggling with limited funds and frustrated with previously ineffective measures Struggling with limited funds and frustrated with previously ineffective measures, the HOA partnered with EPIC Security Works, a RAD authorised dealer, to deploy multiple ROSA devices equipped with AI analytics, lights, audio, and visual messaging. This innovative approach led to a significant reduction in break-ins, effectively transforming the community's security landscape. Author's quote “This case study summarises the detailed and coordinated efforts that RAD, its dealers, remote monitoring partners, property managers and end users perform as we successfully disrupt the security and #proptech marketplaces,” said Steve Reinharz, CEO of AITX and RAD. “I am so proud of this winning combination where everything and everybody worked together enabling a safe and more secure environment for the community’s residents.” RAD’s software suite notification ROSA is a multiple award-winning, compact, self-contained, portable, security and communication solution that can be deployed in about 15 minutes. Like other RAD solutions, it only requires power as it includes all necessary communications hardware. ROSA’s AI-driven security analytics include human, firearm, vehicle detection, licence plate recognition, responsive digital signage and audio messaging, and complete integration with RAD’s software suite notification and autonomous response library. RAD has published four Case Studies detailing how ROSA has helped eliminate instances of theft Two-way communication is optimised for cellular, including live video from ROSA’s dual high-resolution, full-colour, always-on cameras. RAD has published four Case Studies detailing how ROSA has helped eliminate instances of theft, trespassing and loitering at multi-family communities, car rental locations and construction sites across the country. RAD solutions AITX, through its subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the $25 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. RAD solutions are specifically designed to provide cost savings to businesses of between 35% and 80% when compared to the industry’s existing and costly manned security guarding and monitoring model. RAD delivers this tremendous cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics and software platforms are developed in-house.
Artificial Intelligence Technology Solutions, Inc., a global pioneer in AI-driven security and productivity solutions along with its wholly owned subsidiary, Robotic Assistance Devices, Inc. (RAD), announced that it is in preparation to ship an order of 10 ROSA™ security devices to a major urban East Coast University. This multiple ROSA deployment will also see the implementation of RAD Light My Way™, providing the students and university staff with an additional layer of safety and security as they move about the campus. ROSA's cutting-edge AI ROSA units will also allow students and staff to instantly summon powerful deterrence This major deal marks a game-changer for campus safety, as the tech-savvy school aims to replace outdated call boxes with ROSA's cutting-edge AI and security capabilities. Equipped with RAD's innovative RAD Light My Way system, the ROSA units will also allow students and staff to instantly summon powerful deterrence and emergency assistance. Enhanced safety measures The CEO of AITX and RAD, Steve Reinharz, expressed that the deployment of RAD's security devices and solutions is an essential step in updating obsolete security measures. The robots will be positioned in busy areas on the campus, replacing old call boxes and enhancing the safety measures currently in place. AI-driven security solutions The university's decision to implement these AI-driven security solutions reflects the ongoing trend of using advanced technology to combat campus crime. According to findings published in June 2022 from the School Survey on Crime and Safety, postsecondary education campuses experienced a total of 27,300 crimes during the 2019-2020 period. Crimes reported Forcible sex offences accounted for 43%, burglaries for 33%, and motor vehicle thefts for 11% The reported crimes amounted to approximately 19 incidents per 10,000 full-time students. Among these reported offences, forcible sex offences accounted for 43%, burglaries for 33%, and motor vehicle thefts for 11%. The Company confirmed that one of RAD’s largest dealers has received the purchase order from the university. The names of the university and dealers are expected to be announced in the future. RAD Light My Way “This marks another highly visible deployment of RAD Light My Way,” said Steve Reinharz, adding “The ROSA devices will be positioned in busy locations throughout the campus replacing obsolete and ineffective call boxes." He continues, "Like so many other colleges and universities, this school has experienced an increase in crime and a sharp decline of student confidence in the safety measures that are in place.” Easy-to-use devices “We welcomed a large contingent of the university’s administrative and security staff to the REX a few months ago,” said Mark Folmer, CPP, PSP, FSyI, President of RAD. He adds, “They were so impressed with RAD Light My Way and how easy it is to use. We are looking forward to having much of the school enrolled in RAD Light My Way soon. Collectively, we expect this and the deployment of the ROSAs to be welcomed throughout the campus.” Ship and deploy units The Company stated that all units are expected to be shipped and deployed within the next 2 weeks The Company stated that all units are expected to be shipped and deployed within the next 2 weeks. The Company anticipates receiving permission from its largest RAD Light My Way user, an East Coast regional hospital group, to be named and provide testimonials on its application and use in the near future. ROSA AI-driven security analytics ROSA is a multiple award-winning, compact, self-contained, portable, security and communication solution that can be installed and activated in about 15 minutes. Like other RAD solutions, it only requires power as it includes all necessary communications hardware. ROSA’s AI-driven security analytics include human, firearm, and vehicle detection, licence plate recognition, responsive digital signage and audio messaging, and complete integration with RAD’s software suite notification and autonomous response library. Two-way communication Two-way communication is optimised for cellular, including live video from ROSA’s dual high-resolution, full-colour, always-on cameras. RAD has published three case studies detailing how ROSA has helped eliminate instances of theft, trespassing, and loitering at car rental locations and construction sites across the country. RAD Light My Way has been the recipient of two Secure Campus 2022 Awards from Campus Security & Life Safety Magazine. In October 2021 RAD Light My Way along with RAD's ROSA won CBRE’s 2021 Best Workplace Experience Solution Award. AI-driven Solutions-as-a-Service business model RAD solutions are specifically designed to provide cost savings to businesses of between 35%-80% AITX, through its subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the $25 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. RAD solutions are specifically designed to provide cost savings to businesses of between 35%-80%, when compared to the industry’s existing and costly manned security guarding and monitoring model. Cost savings RAD delivers this tremendous cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics, and software platforms are developed in-house. Sales opportunities RAD has a prospective sales pipeline of over 35 Fortune 500 companies and numerous other client opportunities. RAD expects to continue to attract new business as it converts its existing sales opportunities into deployed clients generating a recurring revenue stream. Each Fortune 500 client has the potential of making numerous reorders over time.
Round table discussion
The Metaverse sounds like the plot of the latest summer action movie. In reality, it’s a technology - or, more accurately, a group of technologies - that will likely have a transformational impact on a host of markets. For security, the Metaverse has an extensive list of needs. It also presents some opportunities. We asked this week’s Expert Panel Roundtable: What does the Metaverse mean for security?
Perimeter security is the first line of defence against intruders entering a business or premises. Traditionally associated with low-tech options such as fencing, the field of perimeter security has expanded in recent years and now encompasses a range of high-tech options. We asked this week’s Expert Panel Roundtable: What are the latest trends in perimeter security technology?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?